The branch master has been updated
via 1ff030c0a6f0415577b07366861a41b101e6af92 (commit)
from 8b7b32921e63c492fa7233d81b11ee4d7ba266de (commit)
- Log -
commit 1ff030c0a6f0415577b07366861a41b101e6af92
Author: Matt
-
commit a1998897f66858ec7d2d184e98f2be1e46ae2d78
Author: Matt Caswell
Date: Wed Jun 19 10:31:39 2019 +0100
Add some internal documentation for some thread related functions
Reviewed-by: Richard Levitte
(Merged from https://github.com/openssl/openssl/pull/9186)
commit
The branch master has been updated
via 03361afb3ca27a32e1215e482236c2185f5df1ac (commit)
from b720949ec09f4dfbff1becc75ca808997e5b51bd (commit)
- Log -
commit 03361afb3ca27a32e1215e482236c2185f5df1ac
Author: Matt
)
- Log -
commit d8bb277f76612ec9a659ef7b3df75a99d912662b
Author: Matt Caswell
Date: Tue Jun 18 11:45:26 2019 +0100
Following the previous 2 commits also move ecpointformats out of session
The previous 2 commits moved
-
commit cd0fb43cbe2774220f2702b8289faec590a72d01
Author: Matt Caswell
Date: Tue Jun 18 11:45:26 2019 +0100
Following the previous 2 commits also move ecpointformats out of session
The previous 2 commits moved supported groups
)
- Log -
commit 2be8c56a39b0ec2ec5af6ceaf729df154d784a43
Author: Matt Caswell
Date: Mon Jun 17 15:16:36 2019 +0100
Standardise the function naming conventions in initthread.c
Reviewed-by: Richard Levitte
(Merged from
-
commit 65dc5c3cc10af7c6f24ecd922adb7b6d17a9fe65
Author: Matt Caswell
Date: Thu Jun 13 19:34:37 2019 +0100
Fix no-ec with no-dh
Make sure that the combination of no-ec with no-dh builds successfully.
If neither ec or dh are available then TLSv1.3 is not possible.
Reviewed
The branch master has been updated
via 6597d62b8b95046370212bfd3c0767c970798085 (commit)
from b1d14c412a0ff06d191ef5640bd90bbcd590035c (commit)
- Log -
commit 6597d62b8b95046370212bfd3c0767c970798085
Author: Matt
Author: Matt Caswell
Date: Wed Jun 12 12:12:07 2019 +0100
Update the d2i docs to reflect reality
The d2i docs state that if an error occurs then |*a| is not freed. This
is not correct. On error it is freed and set to NULL. We update the docs
to say this, and also discuss the
The branch master has been updated
via b1d14c412a0ff06d191ef5640bd90bbcd590035c (commit)
from 02f209bb47bdf6a03489d57ac1ba6ae5f2ed8c78 (commit)
- Log -
commit b1d14c412a0ff06d191ef5640bd90bbcd590035c
Author: Matt
-
commit dfa1f5476e86f330f708c1396f577c01d10c545c
Author: raja-ashok
Date: Sat May 11 23:28:26 2019 +0530
Update docs for TLS1.3 FFDHE
Reviewed-by: Tomas Mraz
Reviewed-by: Matt Caswell
(Merged from https://github.com
51583cb8f464b49d2ea33b2be027274ac0d4b1a0 (commit)
- Log -
commit a03749a8f14c397f57ef956650f5db5da6523595
Author: Matt Caswell
Date: Thu Jun 6 12:35:37 2019 +0100
Enable find-doc-nits to find undocumented symbols since 1.1.1
: Matt Caswell
Date: Tue Jun 11 13:49:43 2019 +0100
Ensure code is compiled with correct BIGNUM assembler defines
Reviewed-by: Richard Levitte
Reviewed-by: Shane Lontis
(Merged from https://github.com/openssl/openssl/pull/9130)
commit
The branch master has been updated
via a2e520447e17a58b52cdf41ab1218b020f44e4a6 (commit)
from e98e586b31386af2b2212729da85561a207e7af3 (commit)
- Log -
commit a2e520447e17a58b52cdf41ab1218b020f44e4a6
Author: Matt
Author: Matt Caswell
Date: Tue Jun 11 13:27:45 2019 +0100
Move a fall through comment
When compiling with --strict-warnings using gcc 7.4.0 the compiler
complains that a case falls through, even though there is an explicit
comment stating this. Moving the comment outside of the
Author: Shigeki Ohtsu
Date: Fri Jun 7 11:49:48 2019 +0900
Fix doc to remove const arg in GEN_SESSION_CB
ae3947de095 changed the callback arg not to have a const parameter.
CLA: trivial
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https
Ohtsu
Date: Fri Jun 7 11:49:48 2019 +0900
Fix doc to remove const arg in GEN_SESSION_CB
ae3947de095 changed the callback arg not to have a const parameter.
CLA: trivial
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com
allows third party distributors to change the defaults for their
installations.
Reviewed-by: Paul Yang
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8686)
---
Summary of
: MouriNaruto
Date: Sun May 12 05:10:58 2019 +0800
Improve the Windows OneCore target support. (Add targets for building
libraries for Windows Store apps.)
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8917
bab6046146c4fc8f088c1aaca11598ede7609c04 (commit)
- Log -
commit 37ca204b96b036f949b8bc8389c1f8e806e1cbec
Author: Matt Caswell
Date: Wed May 29 16:03:57 2019 +0100
Add documentation for new functions taking an OPENSSL_CTX
Berchtold
Date: Thu May 30 07:25:31 2019 +0200
Add missing parentheses in macro
Add missing parentheses in macro
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/9044
The branch master has been updated
via cb30e46b45589166a83703f923aa89881dab1e0c (commit)
from 41525ed62802afd9f125bcf33e986d82bbacd635 (commit)
- Log -
commit cb30e46b45589166a83703f923aa89881dab1e0c
Author: Matt
-
commit 41525ed62802afd9f125bcf33e986d82bbacd635
Author: Matt Caswell
Date: Thu May 30 14:40:57 2019 +0100
Ensure we get all the right defines for AES assembler in FIPS module
There are various C macro definitions that are passed via the compiler
to enable AES assembler optimisation
-
commit c8feb1039ccc4cd11e6db084df1446bf863bee1e
Author: Matt Caswell
Date: Wed Apr 17 10:30:53 2019 +0100
Write a test for receiving a KeyUpdate (update requested) while writing
Reviewed-by: Ben Kaduk
(Merged from https://github.com/openssl/openssl/pull/8773
-
commit a77b4dba237d001073d2d1c5d55c674a196c949f
Author: Matt Caswell
Date: Wed Apr 17 10:30:53 2019 +0100
Write a test for receiving a KeyUpdate (update requested) while writing
Reviewed-by: Ben Kaduk
(Merged from https://github.com/openssl/openssl/pull/8773)
commit
Author: agnosticdev
Date: Wed May 29 10:27:26 2019 -0500
issue-8998: Ensure that the alert is generated and reaches the remote
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/9041)
(cherry picked from commit
: agnosticdev
Date: Wed May 29 10:27:26 2019 -0500
issue-8998: Ensure that the alert is generated and reaches the remote
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/9041
ensive man pages and tests. Integration into build scripts.
Incremental pull request based on OpenSSL commit 1362190b1b78 of 2018-09-26
3rd chunk: CMP ASN.1 structures (in crypto/cmp/cmp_asn.c) and related files
Reviewed-by: Bernd Edlinger
Reviewed-by: Ma
ecb0f148a94c9b0076240ca1d7904ab50a7dc9a4 (commit)
- Log -
commit b1eb3fd732adc9afaae730426f48bbfec17694d1
Author: Matt Caswell
Date: Tue May 21 16:25:24 2019 +0100
Add more commentary about recursive Provider intialisation in the
Author: Matt Caswell
Date: Tue May 21 09:31:32 2019 +0100
Revert "EVP_*Update: ensure that input NULL with length 0 isn't passed"
This reverts commit dcb982d792d6064ed3493e79749208d8c257ff04.
This change is causing extended tests to fail.
The branch master has been updated
via 2c23689402f1894861519d0c1ad762a3e52f4677 (commit)
from 54af7f5502e7f46ef08618ae14fd8005f83b0dc0 (commit)
- Log -
commit 2c23689402f1894861519d0c1ad762a3e52f4677
Author: Matt
This commit also adds a test case for setting the tag after supplying
plaintext length and AAD.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/7243)
(cherry picked from commit 67c81ec311d696464bdbf4c6d6f8a887a3d
also adds a test case for setting the tag after supplying
plaintext length and AAD.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/7243)
---
Summary of ch
Author: Matt Caswell
Date: Fri May 3 15:56:08 2019 +0100
Reject obviously invalid DSA parameters during signing
Fixes #8875
Reviewed-by: Paul Dale
(Merged from https://github.com/openssl/openssl/pull/8876)
(cherry picked from commit
The branch master has been updated
via 9acbe07d2300d34a7ea846d9756f33b4595e32fb (commit)
from 7c3a7561b536264b282f604efc959edad18807d7 (commit)
- Log -
commit 9acbe07d2300d34a7ea846d9756f33b4595e32fb
Author: Matt
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8727)
commit 72fb59c72186c327e047cd29d8a66a4a323b9f3b
Author: Boris Pismenny
Date: Thu Apr 11 16:24:42 2019 +0300
Linux ktls sendfile
This commit introduces
61783db5b5c4c5edbdb47d6a7d0393782e72685d (commit)
- Log -
commit 25b25b0f80f2b3f0c5449a6d5a8e7639187f9bf3
Author: Matt Caswell
Date: Thu May 2 14:32:44 2019 +0100
Update internal documentation after global data move to
The branch master has been updated
via e8fb288cc5057bb198a7f1c6e46f3b64b5d7a476 (commit)
from 1ccf49737c89cf1b37cfb0de2370f62ef136062e (commit)
- Log -
commit e8fb288cc5057bb198a7f1c6e46f3b64b5d7a476
Author: Matt
ce matters.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8750)
---
Summary of changes:
crypto/ec/ec2_oct.c | 10 +++---
crypto/ec/ec_lib.c | 20 +
-
commit 3119ab3c9e6d211c461a245f3744893e17b6c193
Author: Matt Caswell
Date: Fri Apr 19 13:55:08 2019 +0100
Fix error in BIO_get_ktls_send() and BIO_get_ktls_recv()
If we were using a different type of BIO than a socket BIO then
BIO_get_ktls_send() and BIO_get_ktls_recv() could
mains
uninitialized after an otherwise succesfull call to
CRYPTO_ccm128_tag.
Bug found by OSS-Fuzz.
Fix suggested by Kurt Roeckx.
Signed-off-by: Guido Vranken
Reviewed-by: Matthias St. Pierre
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(M
mains
uninitialized after an otherwise succesfull call to
CRYPTO_ccm128_tag.
Bug found by OSS-Fuzz.
Fix suggested by Kurt Roeckx.
Signed-off-by: Guido Vranken
Reviewed-by: Matthias St. Pierre
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from
-
commit 33b40a1027bfa6c400f24938093e80579c37586c
Author: Matt Caswell
Date: Fri Apr 19 16:48:09 2019 +0100
If key or iv is NULL set the respective length to 0
[extended tests]
Reviewed-by: Bernd Edlinger
(Merged from https://github.com/openssl/openssl/pull/8794)
commit
The branch master has been updated
via a5cf198bad4c49c2850e16c34d929c28a37afcc3 (commit)
from b8621bdde70690361a36dca52688a3d946c3fe0f (commit)
- Log -
commit a5cf198bad4c49c2850e16c34d929c28a37afcc3
Author: Matt
Date: Mon Apr 15 11:01:58 2019 -0500
Check if num is 0 before trying to malloc memory. Otherwise for client
hellos without extensions SSL_client_hello_get1_extensions_present will return
MALLOC_FAILURE.
Reviewed-by: Paul Yang
Reviewed-by: Ben Kaduk
Reviewed-by: Matt
-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8756)
(cherry picked from commit 6fda11ae5a06e28fd9463e5afb60735d074904b3)
---
Summary of changes:
doc/man3/SSL_CTX_set_client_hello_cb.pod | 2
-
commit a595b10d343845eca32cffb35f1d0a2f15ce40a9
Author: Matt Caswell
Date: Thu Apr 18 10:55:11 2019 +0100
Add some more test vectors for ChaCha20
Reviewed-by: Tim Hudson
(Merged from https://github.com/openssl/openssl/pull/8780)
commit 6f3aae256d62cfcc48c07cc0ead5080b070f371b
-
commit af0bab32273847c14ea7635f714466a5d497905c
Author: Matt Caswell
Date: Thu Apr 18 10:55:11 2019 +0100
Add some more test vectors for ChaCha20
Reviewed-by: Tim Hudson
(Merged from https://github.com/openssl/openssl/pull/8780)
(cherry picked from commit
(commit)
from 1393722af384cdf310645c598bbd06a3bbaa2f31 (commit)
- Log -
commit 6caf7f3aec5484ee65067e9671299d3411565dc1
Author: Matt Caswell
Date: Thu Apr 18 17:43:05 2019 +0100
Create provider errors and use them
Sorce
Date: Wed Apr 17 10:48:49 2019 -0400
Add SSHKDF in evp_kdf_test
Signed-off-by: Simo Sorce
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8774
test for the BIO_s_mem rdwr->rdonly->rdwr use-case
Reviewed-by: Bernd Edlinger
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8649)
commit 3d42833d389134b7b05b655c264e4dba5a2179e9
Author: Tomas Mraz
Date: Thu Apr 4 09:48:47 2019 +0200
+0200
Add test for the BIO_s_mem rdwr->rdonly->rdwr use-case
Reviewed-by: Bernd Edlinger
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8649)
(cherry picked from commit 06add280d90de9625e9c18985f376ef8d0419a46)
minimal, but
+ this issue was never fixed for backwards compatibility reasons. New code
+ should not use these modes.
+ [Matt Caswell]
+
*) Add prediction resistance to the DRBG reseeding process.
[Paul Dale]
diff --git a/apps/speed.c b/apps/speed.c
index e9ed8b5..72826f8 100644
Author: Matt Caswell
Date: Mon Apr 8 11:22:37 2019 +0100
Fix crash in X509_STORE_CTX_get_by_subject
If using a custom X509_LOOKUP_METHOD then calls to
X509_STORE_CTX_get_by_subject may crash due to an incorrectly initialised
X509_OBJECT being passed to the callback
The branch master has been updated
via b926f9deb3dc79d00f0a989370e95867516a3a17 (commit)
from d030892312a2e7076511205e7fe1a5eae98e5102 (commit)
- Log -
commit b926f9deb3dc79d00f0a989370e95867516a3a17
Author: Matt
-
commit d030892312a2e7076511205e7fe1a5eae98e5102
Author: Matt Caswell
Date: Fri Apr 5 10:47:05 2019 +0100
Add a legacy provider and put MD2 in it
Reviewed-by: Richard Levitte
(Merged from https://github.com/openssl/openssl/pull/8541)
commit dc46e3dde58c781b5f29942d787a2c8765ba5514
ecbfaef2aad61fae0c29c04287913af11981b82e (commit)
- Log -
commit 0be2cc5eb3faa2c79a705fee5977fa49841c1799
Author: Matt Caswell
Date: Thu Mar 21 16:41:25 2019 +
Complain if there are missing symbols when creating a provider
The branch master has been updated
via 69539990a8152e90dbe1df1124263db126b1e6f3 (commit)
from fd3a904636aa45401c40e8b86ebacd5135fea2f1 (commit)
- Log -
commit 69539990a8152e90dbe1df1124263db126b1e6f3
Author: Matt
Author: Matt Caswell
Date: Wed Apr 3 23:13:59 2019 +0100
Correct the documentation about SSL_CIPHER_description()
There are some ciphersuites that were introduced in TLSv1.0/TLSv1.1 but
are backwards compatible with SSLv3.
Fixes #8655
Reviewed-by: Paul Dale
The branch master has been updated
via fd3a904636aa45401c40e8b86ebacd5135fea2f1 (commit)
from 2a2bc6fc12c6f6fc47c7c66dd4d0e3ef4be1 (commit)
- Log -
commit fd3a904636aa45401c40e8b86ebacd5135fea2f1
Author: Matt
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/5274)
---
Summary of changes:
apps/ocsp.c | 34 +++---
doc/man1/ocsp.pod | 7 +++
2 files changed, 34
-
commit 64f4fff7967057ba2b963bd0a6ad5cdc64f27417
Author: Matt Caswell
Date: Fri Mar 29 15:38:10 2019 +
Add a test for EVP_MD_block_size()
Reviewed-by: Paul Dale
(Merged from https://github.com/openssl/openssl/pull/8604)
commit 7556b9df597ce43c1c31b294512d5146560f37c6
Author
-
commit 5a2bd6bc66a902ed7aa681e93f0e339c0441e228
Author: Matt Caswell
Date: Fri Mar 29 16:29:54 2019 +
Add an EVP_MD_CTX_md() test
Reviewed-by: Richard Levitte
(Merged from https://github.com/openssl/openssl/pull/8614)
commit b7c913c820a80f8534ead1dc49b569280fcb1f9a
Author
: Boris Pismenny
Date: Thu Dec 6 21:36:08 2018 +0200
add documentation
Reviewed-by: Bernd Edlinger
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/7848)
commit 005080aa62a8da4a64cd749a2620a89b29e5be26
Author: Boris Pismenny
Date: Thu Dec 6
.
Revert win32_pathbyaddr() which is used in DSO_dsobyaddr().
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8596)
commit 3d098890b23598d1f9455b354f46045a231459cd
Author: Soujyu Tanaka
Date: Wed Mar 27 16:21:58
route for WinCE.
Revert win32_pathbyaddr() which is used in DSO_dsobyaddr().
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8596)
(cherry picked from commit 9c98aa354df8b144a238346b63de8b82f04175dd)
commit
Author: Paul Monson
Date: Tue Mar 26 15:25:19 2019 -0700
conn_is_closed should return 1 if get_last_sys_error is WSAECONNRESET
CLA: trivial
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8590)
(cherry picked
Monson
Date: Tue Mar 26 15:25:19 2019 -0700
conn_is_closed should return 1 if get_last_sys_error is WSAECONNRESET
CLA: trivial
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8590
Lontis
Date: Sun Mar 24 19:11:42 2019 +1000
coverity fixes for SSKDF + mac_app + kdf test cleanup
Reviewed-by: Tim Hudson
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8566
Belyavskiy
Date: Fri Feb 22 16:58:55 2019 +0300
Add some checks of OCSP functions
Reviewed-by: Tim Hudson
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8308)
---
Summary of
Author: Dmitry Belyavskiy
Date: Fri Feb 22 16:58:55 2019 +0300
Add some checks of OCSP functions
Reviewed-by: Tim Hudson
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8308)
(cherry picked from commit
The branch master has been updated
via cc6d92619fc3678817b2e09894683b40860563a7 (commit)
from a9e34e9ef103835d73683945cdf4606613c1b89b (commit)
- Log -
commit cc6d92619fc3678817b2e09894683b40860563a7
Author: Matt
Author: Matt Caswell
Date: Wed Mar 27 11:16:44 2019 +
Make OCSP_id_cmp and OCSP_id_issuer_cmp accept const params
Fixes #8589
Reviewed-by: Paul Dale
(Merged from https://github.com/openssl/openssl/pull/8597)
(cherry picked from commit
64 as used in
srp_Verify_N_and_g in openssl/apps/s_client.c.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8593)
(cherry picked from commit 2500c093aa1e9c90c11c415053c0a27a00661d0d
srp_Verify_N_and_g in openssl/apps/s_client.c.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8593)
---
Summary of changes:
crypto/dh/dh_check.c | 8
Author: Matt Caswell
Date: Tue Mar 26 13:32:39 2019 +
Don't allow SHAKE128/SHAKE256 with HMAC
See discussion in github issue #8563
Fixes #8563
Reviewed-by: Matthias St. Pierre
(Merged from https://github.com/openssl/openssl/pull
-
commit 48fdeca01dab31237a711d9fdf4452ebf8443716
Author: Matt Caswell
Date: Tue Mar 26 13:32:39 2019 +
Don't allow SHAKE128/SHAKE256 with HMAC
See discussion in github issue #8563
Fixes #8563
Reviewed-by: Matthias St. Pierre
(Merged from https://githu
Author: Matt Caswell
Date: Tue Mar 26 14:42:14 2019 +
Fix a memory leak in ARIA GCM
Fixes #8567
Reviewed-by: Paul Dale
(Merged from https://github.com/openssl/openssl/pull/8586)
(cherry picked from commit 183f52e29af27285ea4ed7c947b71c83618f8702
The branch master has been updated
via 183f52e29af27285ea4ed7c947b71c83618f8702 (commit)
from a8274ea351988aa754cb9983b27d7059613ee11e (commit)
- Log -
commit 183f52e29af27285ea4ed7c947b71c83618f8702
Author: Matt
Author: Matt Caswell
Date: Tue Mar 26 15:25:15 2019 +
Tolerate 0 byte input length for Update functions
We treat that as automatic success. Other EVP_*Update functions already do
this (e.g. EVP_EncryptUpdate, EVP_DecryptUpdate etc). EVP_EncodeUpdate is
a bit of an anomoly
The branch master has been updated
via a8274ea351988aa754cb9983b27d7059613ee11e (commit)
from 1f019cd0ac9343c51dfdcef1df9a1859cf8fbe03 (commit)
- Log -
commit a8274ea351988aa754cb9983b27d7059613ee11e
Author: Matt
The branch master has been updated
via 1f019cd0ac9343c51dfdcef1df9a1859cf8fbe03 (commit)
from fc4e500b037fcbe89238b1c9f0c1ccf46a7c6559 (commit)
- Log -
commit 1f019cd0ac9343c51dfdcef1df9a1859cf8fbe03
Author: Matt
: Matt Caswell
Date: Mon Mar 18 16:15:58 2019 +
Document the functions EVP_MD_fetch() and EVP_MD_upref()
Reviewed-by: Paul Dale
(Merged from https://github.com/openssl/openssl/pull/8513)
commit 847d0f81bb6f38662aa9d3d448282eda30ed5193
Author: Matt Caswell
Date: Mon Mar
Author: Dmitry Belyavskiy
Date: Tue Mar 19 14:07:37 2019 +0300
Providing missing accessor to EVP_PKEY.engine
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8526
ble
'show_nm'
to indicate if we should show 'nm'.
Also coding-styles fixes from matcaswell
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8445)
(cherry picked fr
ow_nm'
to indicate if we should show 'nm'.
Also coding-styles fixes from matcaswell
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8445)
-
Author: Matt Caswell
Date: Thu Mar 7 14:02:56 2019 +
Update pkeyutl documentation about the digest option
DSA can accept other digests other than SHA1. EC ignores the digest option
altogether.
Fixes #8425
Reviewed-by: Richard Levitte
(Merged from https
The branch master has been updated
via 6a6d9ecd1dff669c162e8ab940dac5db2e82679d (commit)
from 9537fe5757bb07761fa275d779bbd40bcf5530e4 (commit)
- Log -
commit 6a6d9ecd1dff669c162e8ab940dac5db2e82679d
Author: Matt
Lontis
Date: Fri Jan 4 18:41:21 2019 +1000
Single step kdf implementation
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8230)
---
Summary of changes
-
commit 770dfe8dfae33e814198ad6e190d22981066a583
Author: Dmitry Belyavskiy
Date: Mon Feb 25 18:24:46 2019 +0300
EVP_PKEY_get0_engine documentation
Reviewed-by: Nicola Tuveri
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/8329)
commit
constants won't match
and would actually access the ecdh_c out-of-bounds.
Use enum instead of a macro to define the curve indexes so they're
within the bounds of the ecdh_c array.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.c
x27;t match
and would actually access the ecdh_c out-of-bounds.
Use enum instead of a macro to define the curve indexes so they're
within the bounds of the ecdh_c array.
Reviewed-by: Paul Dale
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/op
ation when printing X.509
signature value
Reviewed-by: Richard Levitte
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/6226)
commit 0742eb9f6675e2dde7b437f3d6d9aa37e7a5919e
Author: David von Oheimb
Date: Fri May 11 12:01:49 2018 +0200
update
The branch master has been updated
via 4acd79ff46323df526d7778d32a12a0d5b97c11e (commit)
from c37e635065a5bcb744dfb282f59e978e41490ce4 (commit)
- Log -
commit 4acd79ff46323df526d7778d32a12a0d5b97c11e
Author: Matt
The branch master has been updated
via ee633ace7397ebc9829b845e7e7bbd8283b455f6 (commit)
from 6bc62a620e715f7580651ca932eab052aa527886 (commit)
- Log -
commit ee633ace7397ebc9829b845e7e7bbd8283b455f6
Author: Matt
The branch master has been updated
via 80889e41a72ea2520959505537f38343958b761a (commit)
from 5810bbd8c71003d7644fe802ff233a0d2a7f6778 (commit)
- Log -
commit 80889e41a72ea2520959505537f38343958b761a
Author: Matt
The branch master has been updated
via 5810bbd8c71003d7644fe802ff233a0d2a7f6778 (commit)
from 81cd023f1dc5a8c9094f8e91c1e85e3c9b98a551 (commit)
- Log -
commit 5810bbd8c71003d7644fe802ff233a0d2a7f6778
Author: Matt
The branch master has been updated
via 81cd023f1dc5a8c9094f8e91c1e85e3c9b98a551 (commit)
from 8267becb8b2e3b5ec4d46e3df5656b747930be79 (commit)
- Log -
commit 81cd023f1dc5a8c9094f8e91c1e85e3c9b98a551
Author: Matt
Author: Matt Caswell
Date: Tue Mar 12 10:21:39 2019 +
Fix memory leaks in pkread.c demo file
Also make various changes to bring the file into line with current coding
style.
Fixes #8456
Reviewed-by: Paul Dale
Reviewed-by: Paul Yang
(Merged from https
updated:) util/libcrypto.num
Reviewed-by: Bernd Edlinger
Reviewed-by: Matt Caswell
(Merged from https://github.com/openssl/openssl/pull/7646)
commit 2a3b52eacd098a74157f5d4cbbb34ad8f863f04e
Author: David von Oheimb
Date: Wed Oct 17 15:51:19 2018 +0200
Certificate Management
801 - 900 of 2710 matches
Mail list logo