ca3245a6 | 25-Jun-2020 |
Matt Caswell |
If an empty password is supplied still try to use it If an empty password was supplied we ignored it and were trying to use the fallback method to read the password instead (i.e. read fr
If an empty password is supplied still try to use it If an empty password was supplied we ignored it and were trying to use the fallback method to read the password instead (i.e. read from stdin). However if that failed (which it always does if the cmp option -batch is used) then we were reporting that we had successfully read the password without actually setting one. Instead, if an empty password is explicitly provided we should use it. If no password is supplied explicitly and we have no fallback method then we assume the empty password. [extended tests] Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12275)
show more ...
|
5a640713 | 25-Jun-2020 |
Matt Caswell |
Ensure a string is properly terminated in http_client.c In HTTP_new_bio(), if the host has a trailing '/' we took a copy of the hostname but failed to terminate it properly. Rev
Ensure a string is properly terminated in http_client.c In HTTP_new_bio(), if the host has a trailing '/' we took a copy of the hostname but failed to terminate it properly. Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12275)
show more ...
|
64bb6276 | 23-Jun-2020 |
Dr. David von Oheimb |
81-test_cmp_cli.t: Correct subroutine quote_spc_empty and its use Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12280) |
89137609 | 23-Jun-2020 |
Dr. David von Oheimb |
81-test_cmp_cli.t: Streamline {start,stop}_mock_server and improve port setting Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12280) |
94fcec09 | 27-Jun-2020 |
Dr. David von Oheimb |
test/run_tests.pl: Add alias REPORT_FAILURES{,_PROGRESS} for VF and VFP Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12279) |
a8125491 | 24-Jun-2020 |
Dr. David von Oheimb |
test/run_tests.pl: Add visual separator after failed test case for VFP and VFP modes Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12
test/run_tests.pl: Add visual separator after failed test case for VFP and VFP modes Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12279)
show more ...
|
e4522e10 | 24-Jun-2020 |
Dr. David von Oheimb |
test/run_tests.pl: Enhance the semantics of HARNESS_VERBOSE_FAILURES (VF) Make the improved semantics of VFO replace the previous VF and remove VFO Add warnings about overriding use of H
test/run_tests.pl: Enhance the semantics of HARNESS_VERBOSE_FAILURES (VF) Make the improved semantics of VFO replace the previous VF and remove VFO Add warnings about overriding use of HARNESS_VERBOSE* variables Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12279)
show more ...
|
ea4ee152 | 01-Jul-2020 |
Richard Levitte |
Configure: fix handling of build.info attributes with value This line wasn't properly handled: SCRIPTS{misc,linkname=tsget}=tsget.pl It generated an attribute "linkname
Configure: fix handling of build.info attributes with value This line wasn't properly handled: SCRIPTS{misc,linkname=tsget}=tsget.pl It generated an attribute "linkname=tsget" with the value 1, instead of what it should have, an attribute "linkname" with the value "tsget". Fixes #12341 Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12344)
show more ...
|
e7869ef1 | 01-Jul-2020 |
Jon Spillett |
Fix up build issue when running cpp tests Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/ope
Fix up build issue when running cpp tests Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12334)
show more ...
|
0c444412 | 30-Jun-2020 |
Jakub Wilk |
doc: Remove stray backtick CLA: trivial Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/open
doc: Remove stray backtick CLA: trivial Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12329)
show more ...
|
610e2b3b | 01-Jul-2020 |
Richard Levitte |
Configure: Check source and build dir equality a little more thoroughly 'absolutedir' does a thorough job ensuring that we have a "real" path to both source and build directory, unencumb
Configure: Check source and build dir equality a little more thoroughly 'absolutedir' does a thorough job ensuring that we have a "real" path to both source and build directory, unencumbered by symbolic links. However, that isn't enough on case insensitive file systems on Unix flavored platforms, where it's possible to stand in, for example, /PATH/TO/Work/openssl, and then do this: perl ../../work/openssl/Configure ... and thereby having it look like the source directory and the build directory aren't the same. We solve this by having a closer look at the computed source and build directories, and making sure they are exactly the same strings if they are in fact the same directory. This is especially important when making symbolic links based on this directories, but may have other ramifications as well. Fixes #12323 Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12337)
show more ...
|
9576c498 | 30-Jun-2020 |
Nicola Tuveri |
[test/README.md] minor fix of examples missing the test target Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/12326) |
af3e8c29 | 30-Jun-2020 |
Nicola Tuveri |
Travis: default to HARNESS_JOBS=4 We can run tests in parallel by setting the HARNESS_JOBS environment variable. Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Travis: default to HARNESS_JOBS=4 We can run tests in parallel by setting the HARNESS_JOBS environment variable. Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/12326)
show more ...
|
a20c9075 | 30-Jun-2020 |
Nicola Tuveri |
Run tests in parallel The environment variable `HARNESS_JOBS` can be used to control how many jobs to run in parallel. The default is still to run jobs sequentially. This commi
Run tests in parallel The environment variable `HARNESS_JOBS` can be used to control how many jobs to run in parallel. The default is still to run jobs sequentially. This commit does not define custom `rules`, and different versions of `TAP::Harness` come with different strategies regarding the default `rules` that define which test recipes can be run in parallel. In recent versions of Perl, unless specified otherwise any task can be run in parallel. Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> (Merged from https://github.com/openssl/openssl/pull/12326)
show more ...
|
587e4e53 | 28-Jun-2020 |
Nicola Tuveri |
Fix memory leaks on OSSL_SERIALIZER_CTX_new_by_EVP_PKEY Fixes #12303 Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1230
Fix memory leaks on OSSL_SERIALIZER_CTX_new_by_EVP_PKEY Fixes #12303 Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12304)
show more ...
|
94941cad | 30-Jun-2020 |
Miłosz Kaniewski |
Free pre_proc_exts in SSL_free() Usually it will be freed in tls_early_post_process_client_hello(). However if a ClientHello callback will be used and will return SSL_CLIENT_HELLO_RE
Free pre_proc_exts in SSL_free() Usually it will be freed in tls_early_post_process_client_hello(). However if a ClientHello callback will be used and will return SSL_CLIENT_HELLO_RETRY then tls_early_post_process_client_hello() may never come to the point where pre_proc_exts is freed. Fixes #12194 CLA: trivial Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/openssl/openssl/pull/12330)
show more ...
|
69f98267 | 30-Jun-2020 |
Pauli |
doc: remove reference to the predecessor of SHA-1. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12322) |
0577959c | 22-Jun-2020 |
Matt Caswell |
Don't forget our provider ctx when resetting A number of the KDF reset functions were resetting a little too much Fixes #12225 Reviewed-by: Shane Lontis <shane.lontis@oracl
Don't forget our provider ctx when resetting A number of the KDF reset functions were resetting a little too much Fixes #12225 Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12229)
show more ...
|
b4cb9498 | 27-Jun-2020 |
Dr. David von Oheimb |
X509v3_cache_extensions(): Improve coding style and doc, fix case 'sha1 == NULL' Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10
X509v3_cache_extensions(): Improve coding style and doc, fix case 'sha1 == NULL' Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587)
show more ...
|
0d8dbb52 | 28-Dec-2019 |
Dr. David von Oheimb |
Add X509_self_signed(), extending and improving documenation and tests Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587) |
4cec750c | 27-Jun-2020 |
Dr. David von Oheimb |
Move doc of X509{,_REQ,_CRL}_verify{,_ex}() from X509_sign.pod to new X509_verify.pod Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pu
Move doc of X509{,_REQ,_CRL}_verify{,_ex}() from X509_sign.pod to new X509_verify.pod Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587)
show more ...
|
0e7b1383 | 24-Dec-2019 |
Dr. David von Oheimb |
Fix issue 1418 by moving check of KU_KEY_CERT_SIGN and weakening check_issued() Move check that cert signing is allowed from x509v3_cache_extensions() to where it belongs: internal_verif
Fix issue 1418 by moving check of KU_KEY_CERT_SIGN and weakening check_issued() Move check that cert signing is allowed from x509v3_cache_extensions() to where it belongs: internal_verify(), generalize it for proxy cert signing. Correct and simplify check_issued(), now checking self-issued (not: self-signed). Add test case to 25-test_verify.t that demonstrates successful fix Fixes #1418 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587)
show more ...
|
d18c7ad6 | 24-Dec-2019 |
Dr. David von Oheimb |
Optimization and safety precaution in find_issuer() of x509_vfy.c: candidate issuer cert cannot be the same as the subject cert 'x' Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Optimization and safety precaution in find_issuer() of x509_vfy.c: candidate issuer cert cannot be the same as the subject cert 'x' Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587)
show more ...
|
da1f88bf | 23-Dec-2019 |
Dr. David von Oheimb |
Add four more verify test cases on the self-signed Ed25519 and self-issed X25519 certs Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/p
Add four more verify test cases on the self-signed Ed25519 and self-issed X25519 certs Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587)
show more ...
|
4acd484d | 23-Dec-2019 |
Dr. David von Oheimb |
Make x509 -force_pubkey test case with self-issued cert more realistic by adding CA basic constraints, CA key usage, and key IDs to the cert and by add -partial_chain to the verify call that
Make x509 -force_pubkey test case with self-issued cert more realistic by adding CA basic constraints, CA key usage, and key IDs to the cert and by add -partial_chain to the verify call that trusts this cert Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10587)
show more ...
|