History log of /openssl/ (Results 9426 – 9450 of 36077)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
1b2873e406-Aug-2020 Matt Caswell

Prepare for 3.0 alpha 7

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>

e3ec802006-Aug-2020 Matt Caswell

Prepare for release of 3.0 alpha 6

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>

0f84cbc306-Aug-2020 Matt Caswell

Update copyright year

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/12595)


crypto/bio/bss_mem.c
crypto/bn/bn_mont.c
crypto/evp/cmeth_lib.c
crypto/objects/obj_dat.c
crypto/pem/pem_local.h
crypto/x509/v3err.c
demos/bio/sconnect.c
doc/internal/man3/ossl_algorithm_do_all.pod
doc/internal/man3/ossl_method_construct.pod
doc/man3/BIO_connect.pod
doc/man3/BIO_f_cipher.pod
doc/man3/BIO_printf.pod
doc/man3/BIO_read.pod
doc/man3/BIO_s_accept.pod
doc/man3/BIO_s_file.pod
doc/man3/BIO_s_mem.pod
doc/man3/BN_add.pod
doc/man3/BN_generate_prime.pod
doc/man3/BN_mod_mul_montgomery.pod
doc/man3/BN_set_bit.pod
doc/man3/DH_get_1024_160.pod
doc/man3/ERR_new.pod
doc/man3/ERR_print_errors.pod
doc/man3/EVP_MD_meth_new.pod
doc/man3/EVP_PKEY_meth_get_count.pod
doc/man3/EVP_PKEY_meth_new.pod
doc/man3/EVP_bf_cbc.pod
doc/man3/EVP_cast5_cbc.pod
doc/man3/EVP_chacha20.pod
doc/man3/EVP_desx_cbc.pod
doc/man3/EVP_idea_cbc.pod
doc/man3/EVP_rc2_cbc.pod
doc/man3/EVP_rc4.pod
doc/man3/EVP_rc5_32_12_16_cbc.pod
doc/man3/EVP_seed_cbc.pod
doc/man3/OBJ_nid2obj.pod
doc/man3/OPENSSL_init_ssl.pod
doc/man3/OpenSSL_add_all_algorithms.pod
doc/man3/PEM_read.pod
doc/man3/RAND_cleanup.pod
doc/man3/RAND_load_file.pod
doc/man3/RSA_blinding_on.pod
doc/man3/SSL_COMP_add_compression_method.pod
doc/man3/SSL_CTX_dane_enable.pod
doc/man3/SSL_CTX_get0_param.pod
doc/man3/SSL_CTX_set_alpn_select_cb.pod
doc/man3/SSL_CTX_set_cert_cb.pod
doc/man3/SSL_CTX_set_client_cert_cb.pod
doc/man3/SSL_CTX_set_info_callback.pod
doc/man3/SSL_CTX_set_max_cert_list.pod
doc/man3/SSL_CTX_set_mode.pod
doc/man3/SSL_CTX_set_read_ahead.pod
doc/man3/SSL_CTX_set_security_level.pod
doc/man3/SSL_CTX_set_srp_password.pod
doc/man3/SSL_SESSION_get0_id_context.pod
doc/man3/SSL_SESSION_set1_id.pod
doc/man3/SSL_alloc_buffers.pod
doc/man3/SSL_load_client_CA_file.pod
doc/man3/SSL_set1_host.pod
doc/man3/SSL_set_fd.pod
doc/man3/SSL_state_string.pod
doc/man3/SSL_want.pod
doc/man3/SSL_write.pod
doc/man3/X509_SIG_get0.pod
doc/man3/X509_new.pod
include/crypto/serializer.h
include/crypto/siv.h
ssl/ssl_mcnf.c
test/pkey_meth_test.c
test/recipes/30-test_engine.t
test/recipes/30-test_evp_data/evpkdf.txt
test/recipes/80-test_tsa.t
test/smime-certs/mksmime-certs.sh
test/testutil/tests.c
914f97ee04-Aug-2020 Shane Lontis

Fix provider cipher reinit after init/update with a partial update block.

The test added previously used a 16 byte block during the update which does not cause internal buffering in the prov

Fix provider cipher reinit after init/update with a partial update block.

The test added previously used a 16 byte block during the update which does not cause internal buffering in the provider.
Some internal variables related to the buffering were not being cleared in the init, which meant that the second
update would use the buffered data from the first update.
Added test for this scenario with exclusions for ciphers that do not support partial block updates.

Found by guidovranken.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/12523)

show more ...

c5b356d516-Jul-2020 Peter Eisentraut

Mark an argument of an inline function as unused

This allows users of this header file to compile their own code with
the gcc option -Wunused-parameter.

CLA: trivial

Re

Mark an argument of an inline function as unused

This allows users of this header file to compile their own code with
the gcc option -Wunused-parameter.

CLA: trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/12459)

show more ...

ebc1e8fc25-Jul-2020 Dr. David von Oheimb

openssl-cmp.pod.in: Update and extend example using Insta Demo CA

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12534)

4c525cb503-Aug-2020 Richard Levitte

DESERIALIZER: Fix EVP_PKEY construction by export

When the keymgmt provider and the deserializer provider differ,
deserialization uses the deserializer export function instead of the

DESERIALIZER: Fix EVP_PKEY construction by export

When the keymgmt provider and the deserializer provider differ,
deserialization uses the deserializer export function instead of the
keymgmt load, with a selection of what parts should be exported. That
selection was set to OSSL_KEYMGMT_SELECT_ALL_PARAMETERS when it should
have been OSSL_KEYMGMT_SELECT_ALL.

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12571)

show more ...

aff8c0a427-Jun-2020 Dr. David von Oheimb

Fix error message on setting cert validity period in apps/cmp.c

Fixes #12268

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/1

Fix error message on setting cert validity period in apps/cmp.c

Fixes #12268

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

show more ...

57c05c5727-Jun-2020 Dr. David von Oheimb

apps: Correct and extend diagnostics of parse_name()

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

02ae130e26-Jun-2020 Dr. David von Oheimb

Add 'section=...' info in error output of X509V3_EXT_nconf() as far as appropriate

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/1229

Add 'section=...' info in error output of X509V3_EXT_nconf() as far as appropriate

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

show more ...

1ac658ac26-Jun-2020 Dr. David von Oheimb

Rename misleading X509V3_R_INVALID_NULL_NAME to X509V3_R_INVALID_EMPTY_NAME

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

c90c469326-Jun-2020 Dr. David von Oheimb

Correct confusing X509V3 conf error output by removing needless 'section:<NULL>' etc.

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/1

Correct confusing X509V3 conf error output by removing needless 'section:<NULL>' etc.

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

show more ...

b516a4b126-Jun-2020 Dr. David von Oheimb

Correct misleading diagnostics of OBJ_txt2obj on unknown object name

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

8f7e897926-Jun-2020 Dr. David von Oheimb

apps/cmp.c: Defer diagnostic output on server+proxy to be contacted

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12296)

b5b6669f02-Aug-2020 Richard Levitte

PROV: Make the DER to KEY deserializer decode parameters too

It should be noted that this may be dodgy if we ever encounter
parameter objects that look like something else. However, exp

PROV: Make the DER to KEY deserializer decode parameters too

It should be noted that this may be dodgy if we ever encounter
parameter objects that look like something else. However, experience
with the OSSL_STORE 'file:' loader, which does exactly this kind of
thing, has worked fine so far.

A possibility could be that to decode parameters specifically, we
demand that there's an incoming data type specifying this, which
demands by extension that parameters can only come from a file format
that has the parameter type encoded, such as PEM. This would be a
future effort.

Fixes #12568

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12569)

show more ...

19b4e6f804-Aug-2020 Norman Ashley

Coverity Fixes for issue #12531

Fixes #12531 on master branch.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from

Coverity Fixes for issue #12531

Fixes #12531 on master branch.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12557)

show more ...

e5b2cd5804-Aug-2020 Shane Lontis

Change the provider implementation of X942kdf to use wpacket to do der encoding of sharedInfo

Added der_writer functions for writing octet string primitives.
Generate OID's for key wrapp

Change the provider implementation of X942kdf to use wpacket to do der encoding of sharedInfo

Added der_writer functions for writing octet string primitives.
Generate OID's for key wrapping algorithms used by X942 KDF.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/12554)

show more ...

37d898df19-May-2020 David Woodhouse

Add CHANGES.md entry for SSL_set1_host()/SSL_add1_host() taking IP literals

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merge

Add CHANGES.md entry for SSL_set1_host()/SSL_add1_host() taking IP literals

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9201)

show more ...

892a9e4c11-May-2020 David Woodhouse

Disallow setting more than one IP address with SSL_add1_host()

The X509_VERIFY_PARAM can only take a single IP address, although it can
have multiple hostnames. When SSL_add1_host() is g

Disallow setting more than one IP address with SSL_add1_host()

The X509_VERIFY_PARAM can only take a single IP address, although it can
have multiple hostnames. When SSL_add1_host() is given an IP address,
don't accept it if there is already one configured.

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9201)

show more ...

396e720920-Jun-2019 David Woodhouse

Fix certificate validation for IPv6 literals in sconnect demo

Instead of naïvely trying to truncate at the first colon, use
BIO_get_conn_hostname(). That handles IPv6 literals correctly,

Fix certificate validation for IPv6 literals in sconnect demo

Instead of naïvely trying to truncate at the first colon, use
BIO_get_conn_hostname(). That handles IPv6 literals correctly, even
stripping the [] from around them.

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9201)

show more ...

c832840e14-Oct-2019 David Woodhouse

Make SSL_set1_host() and SSL_add1_host() take IP addresses

There is a slight mismatch here because X509_VERIFY_PARAM copes only
with a single IP address, and doesn't let it be cleared on

Make SSL_set1_host() and SSL_add1_host() take IP addresses

There is a slight mismatch here because X509_VERIFY_PARAM copes only
with a single IP address, and doesn't let it be cleared once it's set.
But this fixes up the major use case, making things easier for users to
get it right.

The sconnect demo now works for Legacy IP literals; for IPv6 it needs to
fix up the way it tries to split the host:port string, which will happen
in a subsequent patch.

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9201)

show more ...

a677190727-Jul-2020 Dr. David von Oheimb

81-test_cmp_cli.t: Skip tests with mock server if server cannot be started

Fixes #12514

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/ope

81-test_cmp_cli.t: Skip tests with mock server if server cannot be started

Fixes #12514

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12537)

show more ...

0f9fdefe30-Jul-2020 Matt Caswell

Fix an ENGINE leak in asn1_item_digest_with_libctx

Commit 6725682d introduced a call to ENGINE_get_digest_engine() into
the function asn1_item_digest_with_libctx() to determine whether t

Fix an ENGINE leak in asn1_item_digest_with_libctx

Commit 6725682d introduced a call to ENGINE_get_digest_engine() into
the function asn1_item_digest_with_libctx() to determine whether there
is an ENGINE registered to handle the specified digest. However that
function increases the ref count on the returned ENGINE object, so it
must be freed.

Fixes #12558

[extended tests]

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/12560)

show more ...

790a1b0327-Jul-2020 Richard Levitte

DESERIALIZER: Small bugfix in the deser_process()

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12544)

1dbf453727-Jul-2020 Richard Levitte

DESERIALIZER: Make OSSL_DESERIALIZER_from_{bio,fp} use BIO_tell() / BIO_seek()

Depending on the BIO used, using BIO_reset() may lead to "interesting"
results. For example, a BIO_f_buffe

DESERIALIZER: Make OSSL_DESERIALIZER_from_{bio,fp} use BIO_tell() / BIO_seek()

Depending on the BIO used, using BIO_reset() may lead to "interesting"
results. For example, a BIO_f_buffer() on top of another BIO that
handles BIO_reset() as a BIO_seek(bio, 0), the deserialization process
may find itself with a file that's rewound more than expected.

Therefore, OSSL_DESERIALIZER_from_{bio,fp}'s behaviour is changed to
rely purely on BIO_tell() / BIO_seek(), and since BIO_s_mem() is used
internally, it's changed to handle BIO_tell() and BIO_seek() better.

This does currently mean that OSSL_DESERIALIZER can't be easily used
with streams that don't support BIO_tell() / BIO_seek().

Fixes #12541

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/12544)

show more ...

1...<<371372373374375376377378379380>>...1444