#rb ben.woodhouse
#ROBOMERGE-SOURCE: CL 6605801 via CL 6605803 via CL 6607800
#ROBOMERGE-BOT: (v357-6606154)
[CL 6607835 by david harvey in Main branch]
- Add timing information to the log
- If pak is signed, use a faster method where we just read one byte from each signing block
- Still invoked with the -checkpak command line parameter
[FYI] bart.hawthorne, steve.white
#ROBOMERGE-OWNER: robert.manuszewski
#ROBOMERGE-AUTHOR: graeme.thornton
#ROBOMERGE-SOURCE: CL 6251572 via CL 6251573 via CL 6251574 via CL 6251688 via CL 6251693
#ROBOMERGE-BOT: CORE (Main -> Dev-Core)
[CL 6269944 by graeme thornton in Dev-Core branch]
This is disabled in shipping.
[at]Daniel.Lamb
#ROBOMERGE-SOURCE: CL 6258473 via CL 6258479 via CL 6258480 via CL 6266092
[CL 6266227 by justin marcus in Main branch]
- Add timing information to the log
- If pak is signed, use a faster method where we just read one byte from each signing block
- Still invoked with the -checkpak command line parameter
[FYI] bart.hawthorne, steve.white
#ROBOMERGE-SOURCE: CL 6251572 via CL 6251573 via CL 6251574 via CL 6251688
[CL 6251693 by graeme thornton in Main branch]
Treat a missing .sig file like a signature failure. Log it and ignore the pak file.
#ROBOMERGE-SOURCE: CL 5993822 via CL 5994244 via CL 5995533 via CL 5995549 via CL 5997449
[CL 5997477 by graeme thornton in Main branch]
doesn't solve thread safety, but better collision detection and 30MB on FN
#rb graeme.thornton, josh.adams
#ROBOMERGE-SOURCE: CL 5764474 via CL 5764475 via CL 5764476 via CL 5764477 via CL 5765310
[CL 5765340 by peter sauerbrei in Main branch]
- This allows it to be hotfixed off
#rb chris.babcock
#ROBOMERGE-SOURCE: CL 5714583 via CL 5714586 via CL 5714590 via CL 5714986 via CL 5717097
[CL 5717275 by josh adams in Main branch]
#rb anthony.bills
#ROBOMERGE-SOURCE: CL 5630089 via CL 5630203 via CL 5630220 via CL 5630238 via CL 5632396
[CL 5632706 by david harvey in Main branch]
#rb Graeme.Thornton
#ROBOMERGE-OWNER: hongyi.yu
#ROBOMERGE-AUTHOR: hongyi.yu
#ROBOMERGE-SOURCE: CL 5484250 via CL 5487362
[CL 5487860 by hongyi yu in Main branch]
- Future plan would be not to use OpenSSL directly, but to go via PlatformCrypto or something like it which could provide platform specific RSA functionality if it exists
- Also contains some compensation code for platforms that are still stuck on an older version of OpenSSL (everything except windows)
- On platforms that use OpenSSL < 1.1.1, register a locking callback so we can provide mutexes and stop it crashing horribly when the same RSA key is used concurrently on different threads
Changed default key size in the CryptoKeys plugin to 4096 bits.
#jira UE-71377
#rb ian.fox, robert.manuszewski, ryan.gerleve
#ROBOMERGE-OWNER: graeme.thornton
#ROBOMERGE-AUTHOR: graeme.thornton
#ROBOMERGE-SOURCE: CL 5447433 in //UE4/Release-4.22/...
#ROBOMERGE-BOT: RELEASE (Release-4.22 -> Main)
[CL 5447485 by graeme thornton in Main branch]
- CryptoKeys plugin can now be told how many bits to use for keys. Defaults to 2048 as a happy medium between security and performance
- After creating the OpenSSL RSA key, use the exp/mod values directly rather than recomputing from primes
- Added RSA.h with some TBigInt based helpers for RSA keys
- Added FPakSignatureFile to wrap the contents of the pak .sig file, including determining that it is of a new format that supports versioning. Wraps the encryption and decryption of he master table hash
- Changed pak master signature hash from crc to SHA1
- Modified access to executable embedded public key data so that it is just an array of bytes. Will allow custom key sizes in the future.
#rb joe.barrett, stefan.boberg
#jira UE-71280, UE-71377
#ROBOMERGE-OWNER: graeme.thornton
#ROBOMERGE-AUTHOR: graeme.thornton
#ROBOMERGE-SOURCE: CL 5381335 in //UE4/Release-4.22/...
#ROBOMERGE-BOT: RELEASE (Release-4.22 -> Main)
[CL 5383057 by graeme thornton in Main branch]