cac30a69 | 12-Aug-2020 |
Dr. David von Oheimb |
cmp_msg.c: Copy libctx and propq of CMP_CTX to newly enrolled certificate Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
28e9f62b | 13-May-2020 |
Dr. David von Oheimb |
cmp_util.c: Add OPENSSL_CTX parameter to ossl_cmp_build_cert_chain(), improve its doc Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/
cmp_util.c: Add OPENSSL_CTX parameter to ossl_cmp_build_cert_chain(), improve its doc Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
1930b586 | 13-May-2020 |
Dr. David von Oheimb |
cmp_hdr.c: Adapt ossl_cmp_hdr_init() to use OPENSSL_CTX for random number generation Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/p
cmp_hdr.c: Adapt ossl_cmp_hdr_init() to use OPENSSL_CTX for random number generation Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
23000838 | 12-Aug-2020 |
Dr. David von Oheimb |
crypto/cmp: Prevent misleading errors in case x509v3_cache_extensions() fails Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/118
crypto/cmp: Prevent misleading errors in case x509v3_cache_extensions() fails Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
ab28b590 | 14-May-2020 |
Shane Lontis |
Add libctx/provider support to cmp_server_test Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
97e00da9 | 13-May-2020 |
Dr. David von Oheimb |
Add OPENSSL_CTX parameter to OSSL_CRMF_pbmp_new() and improve its doc Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
1a7cd250 | 13-May-2020 |
Dr. David von Oheimb |
Add libctx and propq parameters to OSSL_CMP_{SRV_},CTX_new() and ossl_cmp_mock_srv_new() Also remove not really to-the-point error message if call fails in apps/cmp.c Reviewed-by: S
Add libctx and propq parameters to OSSL_CMP_{SRV_},CTX_new() and ossl_cmp_mock_srv_new() Also remove not really to-the-point error message if call fails in apps/cmp.c Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
7b1a3a50 | 18-Aug-2020 |
Dr. David von Oheimb |
cmp_vfy.c: Fix bug: must verify msg signature also in 3GPP mode Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
cef3a008 | 13-May-2020 |
Dr. David von Oheimb |
Update CMP header file references in internal CMP documentation Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
ded346fa | 14-May-2020 |
Dr. David von Oheimb |
Add libctx and propq param to ASN.1 sign/verify/HMAC/decrypt Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
4cdf44c4 | 12-Aug-2020 |
Dr. David von Oheimb |
x_x509.c: Simplify X509_new_with_libctx() using x509_set0_libctx() Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
09c2e26e | 14-May-2020 |
Dr. David von Oheimb |
Re-word null->empty property; improve iteration.count example in property.pod Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/118
Re-word null->empty property; improve iteration.count example in property.pod Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
1bb6f70d | 12-Aug-2020 |
Dr. David von Oheimb |
testutil: Add provider.c with test_get_libctx(), to use at least for SSL and CMP Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/
testutil: Add provider.c with test_get_libctx(), to use at least for SSL and CMP Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
06cee80a | 12-Aug-2020 |
Dr. David von Oheimb |
testutil: Make SETUP_TEST_FIXTURE return 0 on fixture == NULL Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
1a7ceb6c | 15-May-2020 |
Dr. David von Oheimb |
Correct the #define's of EVP_PKEY_CTRL_SET1_ID and EVP_PKEY_CTRL_GET1_ID{,_LEN} Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/1
Correct the #define's of EVP_PKEY_CTRL_SET1_ID and EVP_PKEY_CTRL_GET1_ID{,_LEN} Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808)
show more ...
|
bc03cfad | 12-Aug-2020 |
Dr. David von Oheimb |
Add prerequisite #include directives to include/crypto/x509.h Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
de3713d4 | 12-Aug-2020 |
Dr. David von Oheimb |
Make sure x509v3_cache_extensions() does not modify the error queue Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/11808) |
be63e587 | 19-Aug-2020 |
Shane Lontis |
Fix incorrect selection flags for ec serializer. Fixes #12630 ec_import requires domain parameters to be part of the selection. The public and private serialisers were not selec
Fix incorrect selection flags for ec serializer. Fixes #12630 ec_import requires domain parameters to be part of the selection. The public and private serialisers were not selecting the correct flags so the import was failing. Added a test that uses the base provider so that a export/import happens for serialization. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12681)
show more ...
|
8ca6c666 | 18-Aug-2020 |
Matt Caswell |
Test mte with stitched ciphersuites in TLSv1.0 The previous commit fixed a bug with mte, stitched ciphersuites and TLSv1.0. We now add a test for that scenario. Reviewed-by: Tom
Test mte with stitched ciphersuites in TLSv1.0 The previous commit fixed a bug with mte, stitched ciphersuites and TLSv1.0. We now add a test for that scenario. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12670)
show more ...
|
a361cb84 | 18-Aug-2020 |
Matt Caswell |
Fix stitched ciphersuites in TLS1.0 TLS1.0 does not have an explicit IV in the record, and therefore we should not attempt to remove it. Reviewed-by: Tomas Mraz <tmraz@fedorapro
Fix stitched ciphersuites in TLS1.0 TLS1.0 does not have an explicit IV in the record, and therefore we should not attempt to remove it. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12670)
show more ...
|
2a33470b | 16-Aug-2020 |
Dr. David von Oheimb |
Make better use of new load_cert_pass() variant of load_cert() in apps/ allows loading password-protected PKCS#12 files in x509, ca, s_client, s_server Reviewed-by: Richard Levitte
Make better use of new load_cert_pass() variant of load_cert() in apps/ allows loading password-protected PKCS#12 files in x509, ca, s_client, s_server Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12647)
show more ...
|
b3c5aadf | 14-Aug-2020 |
Dr. David von Oheimb |
apps: make use of OSSL_STORE for generalized certs and CRLs loading Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12647) |
ed4faae0 | 12-Aug-2020 |
Dr. David von Oheimb |
Fix mem leaks on PKCS#12 read error in PKCS12_key_gen_{asc,utf8} Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from htt
Fix mem leaks on PKCS#12 read error in PKCS12_key_gen_{asc,utf8} Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12639)
show more ...
|
5f2b7db0 | 18-Aug-2020 |
Richard Levitte |
TEST: Use PEM_read_bio_PUBKEY_ex() and PEM_read_bio_PrivateKey_ex() test/evp_test.c and test/sslapitest.c are affected. This allows them to decode keys found in stanza files via provide
TEST: Use PEM_read_bio_PUBKEY_ex() and PEM_read_bio_PrivateKey_ex() test/evp_test.c and test/sslapitest.c are affected. This allows them to decode keys found in stanza files via provider decoder implementations when a library context other than the default should be used. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12673)
show more ...
|
6e5ccd58 | 18-Aug-2020 |
Richard Levitte |
PEM: Add more library context aware PEM readers PEM_read_bio_PUBKEY_ex() and PEM_read_bio_Parameters_ex() are added to complete PEM_read_bio_PrivateKey_ex(). They are all refactored to
PEM: Add more library context aware PEM readers PEM_read_bio_PUBKEY_ex() and PEM_read_bio_Parameters_ex() are added to complete PEM_read_bio_PrivateKey_ex(). They are all refactored to be wrappers around the same internal function. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12673)
show more ...
|