Go to file
Richard Levitte 4c627d8635 EVP: Fix EVP_Digest{Sign,Verify}Init() to handle no default digest
EVP_DigestSignInit() and EVP_DigestVerifyInit() would detect if there
is no default digest when using legacy (EVP_PKEY_ASN1_METHOD)
implementations.  However, it doesn't do that when provider side keys
are used.

Furthermore, because EVP_PKEY_get_default_digest_name() was used in
the portion of the code that uses the provider implementation, the
EVP_PKEY_ASN1_METHOD would be used if the key has one attached.  This
is now changed to use evp_keymgmt_util_get_deflt_digest_name()
instead.

Finally, we make sure to detect if the provider implementation
supports the digest name parameters (default or mandatory), and
returns with error if not.  This is what the legacy portion of the
code does.

Fixes #11571

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/11576)
2020-04-23 10:44:37 +01:00
.github Add CIFuzz action 2020-03-05 17:34:11 +00:00
apps gendsa: remove unnecessary OPENSSL_SUPPRESS_DEPRECATED definition 2020-04-21 13:25:23 +10:00
boringssl@2070f8ad91
Configurations Build files: add module installation targets 2020-04-19 23:36:51 +02:00
crypto EVP: Fix EVP_Digest{Sign,Verify}Init() to handle no default digest 2020-04-23 10:44:37 +01:00
demos pkcs12 demo: output correct file names on error. 2020-03-13 07:30:33 +10:00
dev Developer scripts: Release script 2020-04-21 10:11:41 +02:00
doc EVP: add internal evp_keymgmt_util_get_deflt_digest_name() and use it 2020-04-23 10:44:37 +01:00
engines Deprecate the low level RSA functions. 2020-02-20 18:58:40 +10:00
external/perl
fuzz Add CMP fuzzing to fuzz/cmp.c, including a couple of helpers in crypto/cmp/ 2020-04-18 19:54:17 +02:00
include EVP: add internal evp_keymgmt_util_get_deflt_digest_name() and use it 2020-04-23 10:44:37 +01:00
krb5@890ca2f401
ms
os-dep
providers FIPS: remove algorithms that are not being validated. 2020-04-23 10:30:23 +01:00
pyca-cryptography@09403100de
ssl GOST2012 TLS Supported Groups Identifiers Support 2020-04-22 11:22:00 +03:00
test Skip a no-dsa test in the fipsinstall test 2020-04-22 10:32:47 +01:00
tools
util params: add functionality to test if an OSSL_PARAM has been set. 2020-04-22 13:56:44 +10:00
VMS
.gitattributes Developer scripts: Release script 2020-04-21 10:11:41 +02:00
.gitignore Add the auto generated der files to .gitignore 2020-04-09 15:02:30 +01:00
.gitmodules
.travis-apt-pin.preferences
.travis-create-release.sh
.travis.yml Travis build matrix adjustments 2020-04-09 09:20:37 +02:00
ACKNOWLEDGEMENTS.md doc: introduce some minimalistic markdown without essential changes 2020-02-26 21:04:38 +01:00
appveyor.yml Add a minimal build target for Travis and Appveyor 2020-02-11 13:22:39 +01:00
AUTHORS.md doc: introduce some minimalistic markdown without essential changes 2020-02-26 21:04:38 +01:00
build.info
CHANGES.md [crypto/ec] deprecate Jprojective_coordinates_GFp functions 2020-04-22 02:06:50 +03:00
config config, Configure: move the check of removed crypto/ sub-systems 2020-03-04 17:12:52 +01:00
config.com
configdata.pm.in
Configure GOST2012 TLS Supported Groups Identifiers Support 2020-04-22 11:22:00 +03:00
CONTRIBUTING.md doc: introduce some minimalistic markdown without essential changes 2020-02-26 21:04:38 +01:00
e_os.h Make secure-memory be a config option 2020-02-14 15:18:27 +01:00
FAQ.md doc: introduce some minimalistic markdown without essential changes 2020-02-26 21:04:38 +01:00
HACKING
INSTALL.md Build files: add module installation targets 2020-04-19 23:36:51 +02:00
LICENSE
NEWS.md news: note the addition of ECX and SHAKE256 to the FIPS provider as non-approved algorithms 2020-04-17 19:51:37 +10:00
NOTES.ANDROID Andoid cross compile: change ANDROID_NDK_HOME to ANDROID_NDK_ROOT 2020-03-14 04:26:56 +01:00
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX
NOTES.VALGRIND Replace util/shlib_wrap.sh with util/wrap.pl in diverse docs 2020-02-27 08:49:14 +01:00
NOTES.VMS
NOTES.WIN
README.ENGINE
README.FIPS
README.md Add a link to wiki 3.0 upgrade notes 2020-04-22 10:21:56 +01:00
SUPPORT.md doc: revamp the SUPPORT file 2020-02-26 21:06:17 +01:00
VERSION

openssl logo

travis badge appveyor badge

Welcome to the OpenSSL Project

OpenSSL is a robust, commercial-grade, full-featured Open Source Toolkit for the Transport Layer Security (TLS) protocol formerly known as the Secure Sockets Layer (SSL) protocol. The protocol implementation is based on a full-strength general purpose cryptographic library, which can also be used stand-alone.

OpenSSL is descended from the SSLeay library developed by Eric A. Young and Tim J. Hudson.

The official Home Page of the OpenSSL Project is www.openssl.org.

Table of Contents

Overview

The OpenSSL toolkit includes:

  • libssl an implementation of all TLS protocol versions up to TLSv1.3 (RFC 8446).

  • libcrypto a full-strength general purpose cryptographic library. It constitutes the basis of the TLS implementation, but can also be used independently.

  • openssl the OpenSSL command line tool, a swiss army knife for cryptographic tasks, testing and analyzing. It can be used for

    • creation of key parameters
    • creation of X.509 certificates, CSRs and CRLs
    • calculation of message digests
    • encryption and decryption
    • SSL/TLS client and server tests
    • handling of S/MIME signed or encrypted mail
    • and more...

Download

For Production Use

Source code tarballs of the official releases can be downloaded from www.openssl.org/source. The OpenSSL project does not distribute the toolkit in binary form.

However, for a large variety of operating systems precompiled versions of the OpenSSL toolkit are available. In particular on Linux and other Unix operating systems it is normally recommended to link against the precompiled shared libraries provided by the distributor or vendor.

For Testing and Development

Although testing and development could in theory also be done using the source tarballs, having a local copy of the git repository with the entire project history gives you much more insight into the code base.

The official OpenSSL Git Repository is located at git.openssl.org. There is a GitHub mirror of the repository at github.com/openssl/openssl, which is updated automatically from the former on every commit.

A local copy of the Git Repository can be obtained by cloning it from the original OpenSSL repository using

    git clone git://git.openssl.org/openssl.git

or from the GitHub mirror using

    git clone https://github.com/openssl/openssl.git

If you intend to contribute to OpenSSL, either to fix bugs or contribute new features, you need to fork the OpenSSL repository openssl/openssl on GitHub and clone your public fork instead.

    git clone https://github.com/yourname/openssl.git

This is necessary, because all development of OpenSSL nowadays is done via GitHub pull requests. For more details, see Contributing.

Build and Install

After obtaining the Source, have a look at the INSTALL file for detailed instructions about building and installing OpenSSL. For some platforms, the installation instructions are amended by a platform specific document.

Specific notes on upgrading to OpenSSL 3.0 from previous versions, as well as known issues are available on the OpenSSL wiki.

Documentation

Manual Pages

The manual pages for the master branch and all current stable releases are available online.

Wiki

There is a Wiki at wiki.openssl.org which is currently not very active. It contains a lot of useful information, not all of which is up to date.

License

OpenSSL is licensed under the Apache License 2.0, which means that you are free to get and use it for commercial and non-commercial purposes as long as you fulfill its conditions.

See the LICENSE file for more details.

Support

There are various ways to get in touch. The correct channel depends on your requirement. see the SUPPORT file for more details.

Contributing

If you are interested and willing to contribute to the OpenSSL project, please take a look at the CONTRIBUTING file.

Since 2016, development takes place in public on the GitHub open source platform. The OpenSSL Project Pages at openssl.github.io are a valuable source of information if you want to get familiar with our development process on GitHub.

Legalities

A number of nations restrict the use or export of cryptography. If you are potentially subject to such restrictions you should seek legal advice before attempting to develop or distribute cryptographic code.

Copyright

Copyright (c) 1998-2020 The OpenSSL Project

Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson

All rights reserved.