[openssl/openssl] ea9e16: Check for EVP_MD being NULL inside ssl.

2022-07-13 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: ea9e16d16b17d9aa1544e54e79c6438aef9b2e6e
  
https://github.openssl.org/openssl/openssl/commit/ea9e16d16b17d9aa1544e54e79c6438aef9b2e6e
  Author: slontis 
  Date:   2022-07-13 (Wed, 13 Jul 2022)

  Changed paths:
M ssl/s3_lib.c
M ssl/ssl_ciph.c
M ssl/statem/extensions_srvr.c
M ssl/statem/statem_clnt.c
M ssl/tls13_enc.c

  Log Message:
  ---
  Check for EVP_MD being NULL inside ssl.

Fix multiple places that could potentially segfault if memory
allocations fail. e.g. ssl_load_ciphers() could fail while calling
ssl_evp_md_fetch().

Found by #18355

Reviewed-by: Paul Dale 
Reviewed-by: Hugo Landau 
Reviewed-by: Dmitry Belyavskiy 
(Merged from https://github.com/openssl/openssl/pull/18784)

(cherry picked from commit b740012f77aed97cb4b3cd8a4f1fb2f668542795)




[openssl/openssl] b74001: Check for EVP_MD being NULL inside ssl.

2022-07-13 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: b740012f77aed97cb4b3cd8a4f1fb2f668542795
  
https://github.openssl.org/openssl/openssl/commit/b740012f77aed97cb4b3cd8a4f1fb2f668542795
  Author: slontis 
  Date:   2022-07-13 (Wed, 13 Jul 2022)

  Changed paths:
M ssl/s3_lib.c
M ssl/ssl_ciph.c
M ssl/statem/extensions_srvr.c
M ssl/statem/statem_clnt.c
M ssl/tls13_enc.c

  Log Message:
  ---
  Check for EVP_MD being NULL inside ssl.

Fix multiple places that could potentially segfault if memory
allocations fail. e.g. ssl_load_ciphers() could fail while calling
ssl_evp_md_fetch().

Found by #18355

Reviewed-by: Paul Dale 
Reviewed-by: Hugo Landau 
Reviewed-by: Dmitry Belyavskiy 
(Merged from https://github.com/openssl/openssl/pull/18784)




[openssl/openssl] f6b635: Fix memory leak in EVP_PKEY_get1_encoded_public_key.

2022-07-11 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: f6b6356fdbee336fa2169643ca3e9ad3db19caea
  
https://github.openssl.org/openssl/openssl/commit/f6b6356fdbee336fa2169643ca3e9ad3db19caea
  Author: slontis 
  Date:   2022-07-12 (Tue, 12 Jul 2022)

  Changed paths:
M crypto/evp/p_lib.c

  Log Message:
  ---
  Fix memory leak in EVP_PKEY_get1_encoded_public_key.

Occurs if a failure happens after the malloc call in the second call to
EVP_PKEY_get_octet_string_param().

Detected by PR #18355

Some calling code assumes that nothing is allocated in the returned
pointer if there was a failure. Other calling code always trys freeing.
The third case is in ecdh_cms_encrypt() where it does not check the
return value. I am assuming this change is ok since the legacy path in
EVP_PKEY_get1_encoded_public_key() also does not return the pointer on
failure.

Reviewed-by: Hugo Landau 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18739)

(cherry picked from commit 4e9a4997c540e64647d4e1708a1dbda51fb59a68)




[openssl/openssl] 4e9a49: Fix memory leak in EVP_PKEY_get1_encoded_public_key.

2022-07-11 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 4e9a4997c540e64647d4e1708a1dbda51fb59a68
  
https://github.openssl.org/openssl/openssl/commit/4e9a4997c540e64647d4e1708a1dbda51fb59a68
  Author: slontis 
  Date:   2022-07-12 (Tue, 12 Jul 2022)

  Changed paths:
M crypto/evp/p_lib.c

  Log Message:
  ---
  Fix memory leak in EVP_PKEY_get1_encoded_public_key.

Occurs if a failure happens after the malloc call in the second call to
EVP_PKEY_get_octet_string_param().

Detected by PR #18355

Some calling code assumes that nothing is allocated in the returned
pointer if there was a failure. Other calling code always trys freeing.
The third case is in ecdh_cms_encrypt() where it does not check the
return value. I am assuming this change is ok since the legacy path in
EVP_PKEY_get1_encoded_public_key() also does not return the pointer on
failure.

Reviewed-by: Hugo Landau 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18739)




[openssl/openssl] c4a7b4: Make evp_test skip mac tests if digest or ciphers ...

2022-07-10 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: c4a7b4ce8990e71f1c881c9f9d24a851deddf0c7
  
https://github.openssl.org/openssl/openssl/commit/c4a7b4ce8990e71f1c881c9f9d24a851deddf0c7
  Author: slontis 
  Date:   2022-07-11 (Mon, 11 Jul 2022)

  Changed paths:
M test/evp_test.c

  Log Message:
  ---
  Make evp_test skip mac tests if digest or ciphers are disabled.

Fixes test error in #18714
This only happens currently during minimal builds.

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18737)

(cherry picked from commit c8a016cac44d5402df3106f46c9725aa1b480e40)




[openssl/openssl] c8a016: Make evp_test skip mac tests if digest or ciphers ...

2022-07-10 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: c8a016cac44d5402df3106f46c9725aa1b480e40
  
https://github.openssl.org/openssl/openssl/commit/c8a016cac44d5402df3106f46c9725aa1b480e40
  Author: slontis 
  Date:   2022-07-11 (Mon, 11 Jul 2022)

  Changed paths:
M test/evp_test.c

  Log Message:
  ---
  Make evp_test skip mac tests if digest or ciphers are disabled.

Fixes test error in #18714
This only happens currently during minimal builds.

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18737)




[openssl/openssl] 6495ca: Fix bn_gcd code to check return value when calling...

2022-07-04 Thread slontis
  Branch: refs/heads/OpenSSL_1_1_1-stable
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 6495cab1c876ad80ce983d848ccaa1dc286a63e1
  
https://github.openssl.org/openssl/openssl/commit/6495cab1c876ad80ce983d848ccaa1dc286a63e1
  Author: slontis 
  Date:   2022-07-05 (Tue, 05 Jul 2022)

  Changed paths:
M crypto/bn/bn_gcd.c

  Log Message:
  ---
  Fix bn_gcd code to check return value when calling BN_one()

BN_one() uses the expand function which calls malloc which may fail.
All other places that reference BN_one() check the return value.

The issue is triggered by a memory allocation failure.
Detected by PR #18355

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18697)

(cherry picked from commit 7fe7cc57af3db1e497877f0329ba17609b2efc8b)




[openssl/openssl] c6b5c0: Fix bn_gcd code to check return value when calling...

2022-07-04 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: c6b5c00c0e6a95eb68b936e0a2a55741717c642a
  
https://github.openssl.org/openssl/openssl/commit/c6b5c00c0e6a95eb68b936e0a2a55741717c642a
  Author: slontis 
  Date:   2022-07-05 (Tue, 05 Jul 2022)

  Changed paths:
M crypto/bn/bn_gcd.c

  Log Message:
  ---
  Fix bn_gcd code to check return value when calling BN_one()

BN_one() uses the expand function which calls malloc which may fail.
All other places that reference BN_one() check the return value.

The issue is triggered by a memory allocation failure.
Detected by PR #18355

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18697)

(cherry picked from commit 7fe7cc57af3db1e497877f0329ba17609b2efc8b)




[openssl/openssl] 7fe7cc: Fix bn_gcd code to check return value when calling...

2022-07-04 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 7fe7cc57af3db1e497877f0329ba17609b2efc8b
  
https://github.openssl.org/openssl/openssl/commit/7fe7cc57af3db1e497877f0329ba17609b2efc8b
  Author: slontis 
  Date:   2022-07-05 (Tue, 05 Jul 2022)

  Changed paths:
M crypto/bn/bn_gcd.c

  Log Message:
  ---
  Fix bn_gcd code to check return value when calling BN_one()

BN_one() uses the expand function which calls malloc which may fail.
All other places that reference BN_one() check the return value.

The issue is triggered by a memory allocation failure.
Detected by PR #18355

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18697)




[openssl/openssl] 9c6b98: Documentation update for EVP_set_default_properties

2022-06-30 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 9c6b986b4a8d5222d82ebd0c81f51ce527232ae3
  
https://github.openssl.org/openssl/openssl/commit/9c6b986b4a8d5222d82ebd0c81f51ce527232ae3
  Author: slontis 
  Date:   2022-07-01 (Fri, 01 Jul 2022)

  Changed paths:
M doc/man3/EVP_set_default_properties.pod

  Log Message:
  ---
  Documentation update for EVP_set_default_properties

Explicitly state that it is not thread safe.
Fixes #18613

Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
Reviewed-by: Hugo Landau 
(Merged from https://github.com/openssl/openssl/pull/18678)

(cherry picked from commit 5c535e4692a5a4f2ec7691de4efc6290193a0882)




[openssl/openssl] 5c535e: Documentation update for EVP_set_default_properties

2022-06-30 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 5c535e4692a5a4f2ec7691de4efc6290193a0882
  
https://github.openssl.org/openssl/openssl/commit/5c535e4692a5a4f2ec7691de4efc6290193a0882
  Author: slontis 
  Date:   2022-06-30 (Thu, 30 Jun 2022)

  Changed paths:
M doc/man3/EVP_set_default_properties.pod

  Log Message:
  ---
  Documentation update for EVP_set_default_properties

Explicitly state that it is not thread safe.
Fixes #18613

Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
Reviewed-by: Hugo Landau 
(Merged from https://github.com/openssl/openssl/pull/18678)




[openssl/openssl] bf2f9e: Fix memory leak in cmp_calc_protection()

2022-06-29 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: bf2f9e8b3117bbc2f4528bc91cf23b7ae689324c
  
https://github.openssl.org/openssl/openssl/commit/bf2f9e8b3117bbc2f4528bc91cf23b7ae689324c
  Author: slontis 
  Date:   2022-06-29 (Wed, 29 Jun 2022)

  Changed paths:
M crypto/cmp/cmp_protect.c

  Log Message:
  ---
  Fix memory leak in cmp_calc_protection()

Triggered by a  memory allocation failure.
Detected by PR #18355

Reviewed-by: Paul Dale 
Reviewed-by: David von Oheimb 
(Merged from https://github.com/openssl/openssl/pull/18670)




[openssl/openssl] 74c929: Fix memory leak in cmp_calc_protection()

2022-06-29 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 74c929d00dce3a4755164859c600aabb3838a87b
  
https://github.openssl.org/openssl/openssl/commit/74c929d00dce3a4755164859c600aabb3838a87b
  Author: slontis 
  Date:   2022-06-29 (Wed, 29 Jun 2022)

  Changed paths:
M crypto/cmp/cmp_protect.c

  Log Message:
  ---
  Fix memory leak in cmp_calc_protection()

Triggered by a  memory allocation failure.
Detected by PR #18355

Reviewed-by: Paul Dale 
Reviewed-by: David von Oheimb 
(Merged from https://github.com/openssl/openssl/pull/18670)




[openssl/openssl] 47741c: kdf objects missing a return if malloc fails.

2022-06-28 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 47741c539f70b26389268fdbc9b160b3a174bbca
  
https://github.openssl.org/openssl/openssl/commit/47741c539f70b26389268fdbc9b160b3a174bbca
  Author: slontis 
  Date:   2022-06-28 (Tue, 28 Jun 2022)

  Changed paths:
M providers/implementations/kdfs/tls1_prf.c
M providers/implementations/kdfs/x942kdf.c

  Log Message:
  ---
  kdf objects missing a return if malloc fails.

I have searched through all references of ERR_R_MALLOC_FAILURE for any
other instances..

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
Reviewed-by: Hugo Landau 
(Merged from https://github.com/openssl/openssl/pull/18638)

(cherry picked from commit 7260709e9ef155c8b3fccaa32e8ba496a3059905)




[openssl/openssl] 726070: kdf objects missing a return if malloc fails.

2022-06-28 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 7260709e9ef155c8b3fccaa32e8ba496a3059905
  
https://github.openssl.org/openssl/openssl/commit/7260709e9ef155c8b3fccaa32e8ba496a3059905
  Author: slontis 
  Date:   2022-06-28 (Tue, 28 Jun 2022)

  Changed paths:
M providers/implementations/kdfs/tls1_prf.c
M providers/implementations/kdfs/x942kdf.c

  Log Message:
  ---
  kdf objects missing a return if malloc fails.

I have searched through all references of ERR_R_MALLOC_FAILURE for any
other instances..

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
Reviewed-by: Hugo Landau 
(Merged from https://github.com/openssl/openssl/pull/18638)




[openssl/openssl] a99b37: Fix memory leak in ossl_rsa_fromdata.

2022-06-28 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: a99b372157561560da526e212a5c6a74e1cd2d82
  
https://github.openssl.org/openssl/openssl/commit/a99b372157561560da526e212a5c6a74e1cd2d82
  Author: slontis 
  Date:   2022-06-28 (Tue, 28 Jun 2022)

  Changed paths:
M crypto/rsa/rsa_backend.c

  Log Message:
  ---
  Fix memory leak in ossl_rsa_fromdata.

Occurs if a malloc failure happens inside collect_numbers()

Reported via #18365

Reviewed-by: Matt Caswell 
Reviewed-by: Bernd Edlinger 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18646)

(cherry picked from commit 28adea95975c3ea53fc590efda35dee13efd4767)




[openssl/openssl] 28adea: Fix memory leak in ossl_rsa_fromdata.

2022-06-28 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 28adea95975c3ea53fc590efda35dee13efd4767
  
https://github.openssl.org/openssl/openssl/commit/28adea95975c3ea53fc590efda35dee13efd4767
  Author: slontis 
  Date:   2022-06-28 (Tue, 28 Jun 2022)

  Changed paths:
M crypto/rsa/rsa_backend.c

  Log Message:
  ---
  Fix memory leak in ossl_rsa_fromdata.

Occurs if a malloc failure happens inside collect_numbers()

Reported via #18365

Reviewed-by: Matt Caswell 
Reviewed-by: Bernd Edlinger 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18646)




[openssl/openssl] 2b84a6: RSA keygen fixes

2022-06-13 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 2b84a620d299b9614ab59342eb2911617b1bb3c3
  
https://github.openssl.org/openssl/openssl/commit/2b84a620d299b9614ab59342eb2911617b1bb3c3
  Author: slontis 
  Date:   2022-06-13 (Mon, 13 Jun 2022)

  Changed paths:
M crypto/bn/bn_rsa_fips186_4.c

  Log Message:
  ---
  RSA keygen fixes

Fixes #18321

Increase the iteration factor used when 'Computing a Probable Prime Factor 
Based on Auxiliary Primes' from 5 to 20.
This matches the algorithm update made in FIPS 186-5.

Reviewed-by: Bernd Edlinger 
Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18429)

(cherry picked from commit ad7e0fd550a9eb2946edf38003ebc6d5b988dac7)


  Commit: d5a749b883eb7bcf8bbf28d8be1ef64353b4f7aa
  
https://github.openssl.org/openssl/openssl/commit/d5a749b883eb7bcf8bbf28d8be1ef64353b4f7aa
  Author: slontis 
  Date:   2022-06-13 (Mon, 13 Jun 2022)

  Changed paths:
M crypto/rsa/rsa_gen.c

  Log Message:
  ---
  RSA Keygen update - When using the default provider fallback to default 
multiprime keygen if e is < 65537

Reviewed-by: Bernd Edlinger 
Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18429)

(cherry picked from commit 27c1cfd7653b7204af3301f93ccd2a3decfc309b)


  Commit: 7b92153cfb8ffe1c90ac0a02be8e8d271b342caa
  
https://github.openssl.org/openssl/openssl/commit/7b92153cfb8ffe1c90ac0a02be8e8d271b342caa
  Author: slontis 
  Date:   2022-06-13 (Mon, 13 Jun 2022)

  Changed paths:
M crypto/bn/bn_err.c
M crypto/bn/bn_rsa_fips186_4.c
M crypto/err/openssl.txt
M include/crypto/bnerr.h
M include/openssl/bnerr.h

  Log Message:
  ---
  RSA keygen update: Raise an error if no prime candidate q is found.

Reviewed-by: Bernd Edlinger 
Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18429)

(cherry picked from commit d2399d8cd29f56e6614f0b3db4e7e563a745902a)


Compare: 
https://github.openssl.org/openssl/openssl/compare/e8c886104f94...7b92153cfb8f


[openssl/openssl] ad7e0f: RSA keygen fixes

2022-06-13 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: ad7e0fd550a9eb2946edf38003ebc6d5b988dac7
  
https://github.openssl.org/openssl/openssl/commit/ad7e0fd550a9eb2946edf38003ebc6d5b988dac7
  Author: slontis 
  Date:   2022-06-13 (Mon, 13 Jun 2022)

  Changed paths:
M crypto/bn/bn_rsa_fips186_4.c

  Log Message:
  ---
  RSA keygen fixes

Fixes #18321

Increase the iteration factor used when 'Computing a Probable Prime Factor 
Based on Auxiliary Primes' from 5 to 20.
This matches the algorithm update made in FIPS 186-5.

Reviewed-by: Bernd Edlinger 
Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18429)


  Commit: 27c1cfd7653b7204af3301f93ccd2a3decfc309b
  
https://github.openssl.org/openssl/openssl/commit/27c1cfd7653b7204af3301f93ccd2a3decfc309b
  Author: slontis 
  Date:   2022-06-13 (Mon, 13 Jun 2022)

  Changed paths:
M crypto/rsa/rsa_gen.c

  Log Message:
  ---
  RSA Keygen update - When using the default provider fallback to default 
multiprime keygen if e is < 65537

Reviewed-by: Bernd Edlinger 
Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18429)


  Commit: d2399d8cd29f56e6614f0b3db4e7e563a745902a
  
https://github.openssl.org/openssl/openssl/commit/d2399d8cd29f56e6614f0b3db4e7e563a745902a
  Author: slontis 
  Date:   2022-06-13 (Mon, 13 Jun 2022)

  Changed paths:
M crypto/bn/bn_err.c
M crypto/bn/bn_rsa_fips186_4.c
M crypto/err/openssl.txt
M include/crypto/bnerr.h
M include/openssl/bnerr.h

  Log Message:
  ---
  RSA keygen update: Raise an error if no prime candidate q is found.

Reviewed-by: Bernd Edlinger 
Reviewed-by: Paul Dale 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18429)


Compare: 
https://github.openssl.org/openssl/openssl/compare/a644cb7c1c19...d2399d8cd29f


[openssl/openssl] 89e326: Add Windows VERSIONINFO resource to fips provider ...

2022-06-02 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 89e326951c7f8b5bdff645168a1cfc38b7b522ce
  
https://github.openssl.org/openssl/openssl/commit/89e326951c7f8b5bdff645168a1cfc38b7b522ce
  Author: slontis 
  Date:   2022-06-02 (Thu, 02 Jun 2022)

  Changed paths:
M providers/build.info

  Log Message:
  ---
  Add Windows VERSIONINFO resource to fips provider dll.

Fixes #18388

This just looks like an omission, as this is added to libcrypto and libssl

Reviewed-by: Richard Levitte 
Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
Reviewed-by: Todd Short 
(Merged from https://github.com/openssl/openssl/pull/18416)

(cherry picked from commit 18f0870d39eb055c8c67af8025fd1b9e01ce6a43)


  Commit: 6fd014f32257b63a0b17e5793faab3e70c979851
  
https://github.openssl.org/openssl/openssl/commit/6fd014f32257b63a0b17e5793faab3e70c979851
  Author: slontis 
  Date:   2022-06-02 (Thu, 02 Jun 2022)

  Changed paths:
M providers/build.info

  Log Message:
  ---
  Add VERSIONINFO resource to legacy provider if it is not builtin

Reviewed-by: Richard Levitte 
Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
Reviewed-by: Todd Short 
(Merged from https://github.com/openssl/openssl/pull/18416)

(cherry picked from commit 9510661400470d357c74c5c4d0ff01c7b813b974)


Compare: 
https://github.openssl.org/openssl/openssl/compare/5bc6a962fd86...6fd014f32257


[openssl/openssl] 18f087: Add Windows VERSIONINFO resource to fips provider ...

2022-06-02 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 18f0870d39eb055c8c67af8025fd1b9e01ce6a43
  
https://github.openssl.org/openssl/openssl/commit/18f0870d39eb055c8c67af8025fd1b9e01ce6a43
  Author: slontis 
  Date:   2022-06-02 (Thu, 02 Jun 2022)

  Changed paths:
M providers/build.info

  Log Message:
  ---
  Add Windows VERSIONINFO resource to fips provider dll.

Fixes #18388

This just looks like an omission, as this is added to libcrypto and libssl

Reviewed-by: Richard Levitte 
Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
Reviewed-by: Todd Short 
(Merged from https://github.com/openssl/openssl/pull/18416)


  Commit: 9510661400470d357c74c5c4d0ff01c7b813b974
  
https://github.openssl.org/openssl/openssl/commit/9510661400470d357c74c5c4d0ff01c7b813b974
  Author: slontis 
  Date:   2022-06-02 (Thu, 02 Jun 2022)

  Changed paths:
M providers/build.info

  Log Message:
  ---
  Add VERSIONINFO resource to legacy provider if it is not builtin

Reviewed-by: Richard Levitte 
Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
Reviewed-by: Todd Short 
(Merged from https://github.com/openssl/openssl/pull/18416)


Compare: 
https://github.openssl.org/openssl/openssl/compare/48b571fe771f...951066140047


[openssl/openssl] b40c75: Add documentation for key validation that indicate...

2022-05-08 Thread slontis
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: b40c753b6e09eb6df06c161cdf771c704898b050
  
https://github.openssl.org/openssl/openssl/commit/b40c753b6e09eb6df06c161cdf771c704898b050
  Author: slontis 
  Date:   2022-05-09 (Mon, 09 May 2022)

  Changed paths:
M doc/man3/DSA_sign.pod
M doc/man3/ECDSA_SIG_new.pod
M doc/man3/EC_GROUP_copy.pod
M doc/man3/EVP_DigestSignInit.pod
M doc/man3/EVP_DigestVerifyInit.pod
M doc/man3/EVP_PKEY_check.pod
M doc/man7/EVP_KDF-PBKDF2.pod
M doc/man7/EVP_PKEY-DH.pod
M doc/man7/EVP_PKEY-DSA.pod
M doc/man7/EVP_PKEY-EC.pod
M doc/man7/EVP_PKEY-FFC.pod
M doc/man7/EVP_PKEY-RSA.pod
M doc/man7/OSSL_PROVIDER-FIPS.pod
M doc/man7/OSSL_PROVIDER-default.pod
M doc/man7/fips_module.pod
M doc/man7/migration_guide.pod

  Log Message:
  ---
  Add documentation for key validation that indicates the difference between the
EVP_PKEY_XXX_check() calls for the default and fips providers.

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18235)

(cherry picked from commit 0b3d2594d060dc19269d3740ad672f065ec6398a)




[openssl/openssl] 0b3d25: Add documentation for key validation that indicate...

2022-05-08 Thread slontis
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 0b3d2594d060dc19269d3740ad672f065ec6398a
  
https://github.openssl.org/openssl/openssl/commit/0b3d2594d060dc19269d3740ad672f065ec6398a
  Author: slontis 
  Date:   2022-05-09 (Mon, 09 May 2022)

  Changed paths:
M doc/man3/DSA_sign.pod
M doc/man3/ECDSA_SIG_new.pod
M doc/man3/EC_GROUP_copy.pod
M doc/man3/EVP_DigestSignInit.pod
M doc/man3/EVP_DigestVerifyInit.pod
M doc/man3/EVP_PKEY_check.pod
M doc/man7/EVP_KDF-PBKDF2.pod
M doc/man7/EVP_PKEY-DH.pod
M doc/man7/EVP_PKEY-DSA.pod
M doc/man7/EVP_PKEY-EC.pod
M doc/man7/EVP_PKEY-FFC.pod
M doc/man7/EVP_PKEY-RSA.pod
M doc/man7/OSSL_PROVIDER-FIPS.pod
M doc/man7/OSSL_PROVIDER-default.pod
M doc/man7/fips_module.pod
M doc/man7/migration_guide.pod

  Log Message:
  ---
  Add documentation for key validation that indicates the difference between the
EVP_PKEY_XXX_check() calls for the default and fips providers.

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/18235)