History log of /openbsd-src/lib/libcrypto/rsa/rsa.h (Results 1 – 25 of 67)
Revision Date Author Comments
# 515aa502 25-Jan-2025 tb <tb@openbsd.org>

Remove #error if OPENSSL_NO_FOO is defined

discussed with jsing


# 5158016f 19-May-2024 jsg <jsg@openbsd.org>

remove prototypes with no matching function
feedback and ok tb@


# aa88ce08 28-Jul-2023 tb <tb@openbsd.org>

Make BN_BLINDING internal

RSA is pretty bad. In my most optimistic moments I dream of a world that
stopped using it. That won't happen during my lifetime, unfortunately.
Blinding is one way of makin

Make BN_BLINDING internal

RSA is pretty bad. In my most optimistic moments I dream of a world that
stopped using it. That won't happen during my lifetime, unfortunately.
Blinding is one way of making it a little less leaky. Unfortunately this
side-channel leak mitigation leaked out of the library for no good reason.
Let's at least fix that aspect of it.

ok jsing

show more ...


# 17b59ed4 05-May-2023 tb <tb@openbsd.org>

Salt shares the blame of the continued existence of the X9.31 padding mode


# 3a50714b 25-Apr-2023 tb <tb@openbsd.org>

Remove X9.31 support

ok jsing


# 7e2b557a 18-Apr-2023 tb <tb@openbsd.org>

Bring includes into canonical order

Requested by jsing


# c6a6590f 18-Apr-2023 tb <tb@openbsd.org>

Move some includes out of OPENSSL_NO_DEPRECATED

Some headers were included conditionally on OPENSSL_NO_DEPRECATED in hopes
that eventually the mess of everything includes everything will magically
r

Move some includes out of OPENSSL_NO_DEPRECATED

Some headers were included conditionally on OPENSSL_NO_DEPRECATED in hopes
that eventually the mess of everything includes everything will magically
resolve itself. Of course everyone would end up building openssl with
OPENSSL_NO_DEPRECATED over time... Right.

Surprisingly, the ecosystem has come to rely on these implicit inclusions,
so about two dozen ports would fail to build because of this. Patching this
would be easy but really not worth the effort.

ok jsing

show more ...


# da590e31 15-Apr-2023 tb <tb@openbsd.org>

Prepare rsa.h for X9.31 support removal

This wraps the three public functions in the usual #if stanza.

RSA_X931_PADDING is unfortunately exposed by rust-openssl and erlang.
Therefore it will remain

Prepare rsa.h for X9.31 support removal

This wraps the three public functions in the usual #if stanza.

RSA_X931_PADDING is unfortunately exposed by rust-openssl and erlang.
Therefore it will remain visible to avoid breaking the build of
lang/rust. Its use in the library will be neutered shortly.

ok jsing

show more ...


# e4c559e8 09-Apr-2023 tb <tb@openbsd.org>

Move a few functions out of OPENSSL_NO_DEPRECATED

Geoff Thorpe added OPENSSL_NO_DEPRECATED nearly two decades ago. The hope
was that at some point some functions can be dropped. Most of the function

Move a few functions out of OPENSSL_NO_DEPRECATED

Geoff Thorpe added OPENSSL_NO_DEPRECATED nearly two decades ago. The hope
was that at some point some functions can be dropped. Most of the functions
marked deprecated are actually unused nowadays but unfortunately some of
them are still used in the ecosystem. Move them out of OPENSSL_NO_DEPRECATED
so we can define it without breaking the consumers in the next bump.

ERR_remove_state() is still used by a dozen or so ports. This isn't a big
deal since it is just a stupid wrapper for the not quite as deprecated
ERR_remove_thread_state(). It's not worth patching these ports.

Annoyingly, {DH,DSA}_generate_parameters() and RSA_generate_key() are still
used. They "make use" of the old-style BN_GENCB callback, which is therefore
more difficult to remove - in case you don't know know: that's the thing
responsible for printing pretty '.', '+' and '*' when you generate keys.

Most annoyingly, DH_generate_parameters() was added to rust-openssl in 2020
for "advanced DH support". This is very unfortunate since cargo bundles a
rust-openssl and updates it only every few years or so. As a consequence
we're going to be stuck with this nonsense for a good while.

ok beck jsing

show more ...


# aeccd9ed 12-Jul-2022 kn <kn@openbsd.org>

Remove mkerr.pl remnants from LibreSSL

This script is not used at all and files are edited by hand instead.
Thus remove misleading comments incl. the obsolete script/config.

Feedback OK jsing tb


# d30c34e0 07-Jul-2022 tb <tb@openbsd.org>

Expose new API in headers.

These are mostly security-level related, but there are also ASN1_TIME
and ASN_INTEGER functions here, as well as some missing accessors.

ok jsing


# 2c113c36 27-Jun-2022 tb <tb@openbsd.org>

Prepare to provide RSA_security_bits()

ok beck jsing


# e3ac9fd6 14-Jan-2022 tb <tb@openbsd.org>

Make RSA, RSA_PSS_PARAMS and RSA_METHOD opaque

Move the struct internals to rsa_locl.h and provide a missing
typedef in ossl_typ.h.

ok inoguchi jsing


# 568bf0f6 14-Jan-2022 tb <tb@openbsd.org>

Remove obsolete key formats

This removes NETSCAPE_X509, NETSCAPE{,_ENCRYPTED}_PKEY, RSA_NET,
Netscape_RSA things. Some of the nasty tentacles that could go in
principle are used in some test suites,

Remove obsolete key formats

This removes NETSCAPE_X509, NETSCAPE{,_ENCRYPTED}_PKEY, RSA_NET,
Netscape_RSA things. Some of the nasty tentacles that could go in
principle are used in some test suites, so we need to keep them...

All this was removed as part of OpenSSL commit 0bc2f365.

ok inoguchi jsing

show more ...


# 326063fd 14-Jan-2022 tb <tb@openbsd.org>

Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_API

This marks the start of major surgery in libcrypto. Do not attempt to
build the tree for a while (~50 commits).


# e9d41195 05-Jan-2022 tb <tb@openbsd.org>

Prepare to provide a number of RSA accessors

This adds RSA_get0_{n,e,d,p,q,dmp1,dmq1,iqmp,pss_params}() which will
be exposed in the upcoming bump.

ok inoguchi jsing


# 92d0d160 04-Nov-2019 jsing <jsing@openbsd.org>

Reshuffle RSA_PSS_PARAMS and RSA_OAEP_PARAMS to avoid duplicate typedef.

Issue spotted by bcook@

ok bcook@ inoguchi@


# c778c399 02-Nov-2019 jsing <jsing@openbsd.org>

Provide RSA_PKCS1_OpenSSL().

Prompted by inoguchi@


# 4df279eb 02-Nov-2019 jsing <jsing@openbsd.org>

Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.


# 184daf41 02-Nov-2019 jsing <jsing@openbsd.org>

Make RSA_OAEP_PARAMs public.


# c4380ae9 01-Nov-2019 jsing <jsing@openbsd.org>

Add RSA CMS support.

From OpenSSL 1.1.1d.

ok tb@


# e119b44a 01-Nov-2019 jsing <jsing@openbsd.org>

Update RSA ASN.1 code to handle RSA-PSS.

From OpenSSL 1.1.1d.

ok tb@


# ba05ae2d 31-Oct-2019 jsing <jsing@openbsd.org>

Add support for RSA-PSS.

From OpenSSL 1.1.1d.

ok inoguchi@


# 95285806 29-Oct-2019 jsing <jsing@openbsd.org>

Update RSA OAEP code.

This syncs the RSA OAEP code with OpenSSL 1.1.1d, correctly handling OAEP
padding and providing various OAEP related controls.

ok inoguchi@ tb@


# ccd59b6a 24-Oct-2019 jsing <jsing@openbsd.org>

Add RSA_PSS_PARAMS pointer to RSA struct.

This will be used by upcoming RSA-PSS code.

ok tb@


123