- Sep 16, 2024
-
-
Dmitry Belyavskiy authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25434)
-
Dmitry Belyavskiy authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25434)
-
Dmitry Belyavskiy authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25434)
-
Dmitry Belyavskiy authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25434)
-
- Sep 14, 2024
-
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
* Add resumption and multiplexing tests * Remove needless head -n operation when patching implementation.json Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
We have a limited number of streams to use send requests in accordance with the number of streams we have and batch requests according to that limit Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
1) Limit clone depth to allow faster fetches 2) Supply OPENSSL_URL and OPENSSL_BRANCH args to allow for branch testing Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25426)
-
Neil Horman authored
SSL_poll indicates that a stream which has had the fin bit set on it, should generate SSL_POLL_EVENT_R events, so that applications can detect stream completion via SSL_read_ex and SSL_get_error returning SSL_ERROR_ZERO_RETURN. However, the quic polling code misses on this, as a client that completely reads a buffer after receipt has its underlying stream buffer freed, loosing the fin status We can however detect stream completion still, as a stream which has been finalized, and had all its data read will be in the QUIC_RSTREAM_STATE_DATA_READ state, iff the fin bit was set. Fix it by checking in test_poll_event_r for that state, and generating a SSL_POLL_EVENT_R if its found to be true, so as to stay in line with the docs. Fixes openssl/private#627 Reviewed-by:
Tomas Mraz <tomas@openssl.org> Reviewed-by:
Sasa Nedvedicky <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25399)
-
- Sep 13, 2024
-
-
Richard Levitte authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25423)
-
Richard Levitte authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25423)
-
Sahana Prasad authored
https://www.ietf.org/archive/id/draft-kwiatkowski-tls-ecdhe-mlkem-01.html#name-iana-considerations Signed-off-by:
Sahana Prasad <sahana@redhat.com> Reviewed-by:
Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25477)
-
erbsland-dev authored
Related to #8331 Addressing found issues by adding specific error messages to improve feedback when tag length checks fail for the `EVP_CTRL_AEAD_SET_TAG` parameter in the AES-OCB algorithm. - Added PROV_R_INVALID_TAG_LENGTH error to indicate when the current tag length exceeds the maximum tag length of the algorithm. - Added `PROV_R_INVALID_TAG_LENGTH` error to indicate when the current tag length in the context does not match a custom tag length provided as a parameter. - Added `ERR_R_PASSED_INVALID_ARGUMENT` error to handle cases where an invalid pointer is passed in encryption mode. Reviewed-by:
Paul Dale <ppzgs1@gmail.com> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25425)
-
Holger Dengler authored
The CPACF instruction KM provides support for accelerating the full AES-XTS algorithm on newer machines for AES_XTS_128 and AES_XTS_256. Preliminary measurements showed performance improvements of up to 50%, dependent on the message size. Signed-off-by:
Holger Dengler <dengler@linux.ibm.com> Reviewed-by:
Tomas Mraz <tomas@openssl.org> Reviewed-by:
Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25414)
-
Tomas Mraz authored
Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Tim Hudson <tjh@openssl.org> Reviewed-by:
Richard Levitte <levitte@openssl.org> Reviewed-by:
Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25437)
-
- Sep 12, 2024
-
-
Richard Levitte authored
The details for RSA and EdDSA have already been documented, albeit the RSA documentation wasn't conforming properly to the POD format. Reviewed-by:
Matt Caswell <matt@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25422)
-
Daiki Ueno authored
This would be useful when testing with browsers / downloaders which support 0-RTT only through HTTP. Signed-off-by:
Daiki Ueno <dueno@redhat.com> Reviewed-by:
Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/16055)
-
Gerd Hoffmann authored
Building with '-D OPENSSL_SMALL_FOOTPRINT' for aarch64 fails due to 'gcm_ghash_4bit' being undeclared. Fix that by not setting the function pointer when building with OPENSSL_SMALL_FOOTPRINT, matching openssl behavior on x86. Signed-off-by:
Gerd Hoffmann <kraxel@redhat.com> Reviewed-by:
Tomas Mraz <tomas@openssl.org> Reviewed-by:
Tim Hudson <tjh@openssl.org> Reviewed-by:
Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25419)
-
- Sep 11, 2024
-
-
Michael Baentsch authored
Reviewed-by:
Paul Dale <ppzgs1@gmail.com> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24884)
-
Frederik Wedel-Heinen authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Paul Dale <ppzgs1@gmail.com> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24648)
-
Jonathan M. Wilbur authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25244)
-
Jonathan M. Wilbur authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25244)
-
Jonathan M. Wilbur authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25244)
-
Jonathan M. Wilbur authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25244)
-
Randall S. Becker authored
This fix supports the new NonStop KLT threading model, including configurations and documentation for using this model. Fixes: fix-24175 Signed-off-by:
Randall S. Becker <randall.becker@nexbridge.ca> Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25016)
-
- Sep 10, 2024
-
-
Neil Horman authored
Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25256)
-
Neil Horman authored
Makes for smaller more consistent coding Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25256)
-
Neil Horman authored
Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25256)
-
Neil Horman authored
Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25256)
-
Neil Horman authored
Reviewed-by:
Viktor Dukhovni <viktor@openssl.org> Reviewed-by:
Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25256)
-
Tomas Mraz authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by:
Hugo Landau <hlandau@devever.net> (Merged from https://github.com/openssl/openssl/pull/25378)
-
Tomas Mraz authored
Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by:
Hugo Landau <hlandau@devever.net> (Merged from https://github.com/openssl/openssl/pull/25378)
-
Tomas Mraz authored
thread/arch/thread_win.c must be included into libcrypto as rcu depends on ossl_crypto_mutex implementation on Windows. Fixes #25337 Reviewed-by:
Neil Horman <nhorman@openssl.org> Reviewed-by:
Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by:
Hugo Landau <hlandau@devever.net> (Merged from https://github.com/openssl/openssl/pull/25378)
-