#
515aa502 |
| 25-Jan-2025 |
tb <tb@openbsd.org> |
Remove #error if OPENSSL_NO_FOO is defined
discussed with jsing
|
#
5158016f |
| 19-May-2024 |
jsg <jsg@openbsd.org> |
remove prototypes with no matching function feedback and ok tb@
|
#
aa88ce08 |
| 28-Jul-2023 |
tb <tb@openbsd.org> |
Make BN_BLINDING internal
RSA is pretty bad. In my most optimistic moments I dream of a world that stopped using it. That won't happen during my lifetime, unfortunately. Blinding is one way of makin
Make BN_BLINDING internal
RSA is pretty bad. In my most optimistic moments I dream of a world that stopped using it. That won't happen during my lifetime, unfortunately. Blinding is one way of making it a little less leaky. Unfortunately this side-channel leak mitigation leaked out of the library for no good reason. Let's at least fix that aspect of it.
ok jsing
show more ...
|
#
17b59ed4 |
| 05-May-2023 |
tb <tb@openbsd.org> |
Salt shares the blame of the continued existence of the X9.31 padding mode
|
#
3a50714b |
| 25-Apr-2023 |
tb <tb@openbsd.org> |
Remove X9.31 support
ok jsing
|
#
7e2b557a |
| 18-Apr-2023 |
tb <tb@openbsd.org> |
Bring includes into canonical order
Requested by jsing
|
#
c6a6590f |
| 18-Apr-2023 |
tb <tb@openbsd.org> |
Move some includes out of OPENSSL_NO_DEPRECATED
Some headers were included conditionally on OPENSSL_NO_DEPRECATED in hopes that eventually the mess of everything includes everything will magically r
Move some includes out of OPENSSL_NO_DEPRECATED
Some headers were included conditionally on OPENSSL_NO_DEPRECATED in hopes that eventually the mess of everything includes everything will magically resolve itself. Of course everyone would end up building openssl with OPENSSL_NO_DEPRECATED over time... Right.
Surprisingly, the ecosystem has come to rely on these implicit inclusions, so about two dozen ports would fail to build because of this. Patching this would be easy but really not worth the effort.
ok jsing
show more ...
|
#
da590e31 |
| 15-Apr-2023 |
tb <tb@openbsd.org> |
Prepare rsa.h for X9.31 support removal
This wraps the three public functions in the usual #if stanza.
RSA_X931_PADDING is unfortunately exposed by rust-openssl and erlang. Therefore it will remain
Prepare rsa.h for X9.31 support removal
This wraps the three public functions in the usual #if stanza.
RSA_X931_PADDING is unfortunately exposed by rust-openssl and erlang. Therefore it will remain visible to avoid breaking the build of lang/rust. Its use in the library will be neutered shortly.
ok jsing
show more ...
|
#
e4c559e8 |
| 09-Apr-2023 |
tb <tb@openbsd.org> |
Move a few functions out of OPENSSL_NO_DEPRECATED
Geoff Thorpe added OPENSSL_NO_DEPRECATED nearly two decades ago. The hope was that at some point some functions can be dropped. Most of the function
Move a few functions out of OPENSSL_NO_DEPRECATED
Geoff Thorpe added OPENSSL_NO_DEPRECATED nearly two decades ago. The hope was that at some point some functions can be dropped. Most of the functions marked deprecated are actually unused nowadays but unfortunately some of them are still used in the ecosystem. Move them out of OPENSSL_NO_DEPRECATED so we can define it without breaking the consumers in the next bump.
ERR_remove_state() is still used by a dozen or so ports. This isn't a big deal since it is just a stupid wrapper for the not quite as deprecated ERR_remove_thread_state(). It's not worth patching these ports.
Annoyingly, {DH,DSA}_generate_parameters() and RSA_generate_key() are still used. They "make use" of the old-style BN_GENCB callback, which is therefore more difficult to remove - in case you don't know know: that's the thing responsible for printing pretty '.', '+' and '*' when you generate keys.
Most annoyingly, DH_generate_parameters() was added to rust-openssl in 2020 for "advanced DH support". This is very unfortunate since cargo bundles a rust-openssl and updates it only every few years or so. As a consequence we're going to be stuck with this nonsense for a good while.
ok beck jsing
show more ...
|
#
aeccd9ed |
| 12-Jul-2022 |
kn <kn@openbsd.org> |
Remove mkerr.pl remnants from LibreSSL
This script is not used at all and files are edited by hand instead. Thus remove misleading comments incl. the obsolete script/config.
Feedback OK jsing tb
|
#
d30c34e0 |
| 07-Jul-2022 |
tb <tb@openbsd.org> |
Expose new API in headers.
These are mostly security-level related, but there are also ASN1_TIME and ASN_INTEGER functions here, as well as some missing accessors.
ok jsing
|
#
2c113c36 |
| 27-Jun-2022 |
tb <tb@openbsd.org> |
Prepare to provide RSA_security_bits()
ok beck jsing
|
#
e3ac9fd6 |
| 14-Jan-2022 |
tb <tb@openbsd.org> |
Make RSA, RSA_PSS_PARAMS and RSA_METHOD opaque
Move the struct internals to rsa_locl.h and provide a missing typedef in ossl_typ.h.
ok inoguchi jsing
|
#
568bf0f6 |
| 14-Jan-2022 |
tb <tb@openbsd.org> |
Remove obsolete key formats
This removes NETSCAPE_X509, NETSCAPE{,_ENCRYPTED}_PKEY, RSA_NET, Netscape_RSA things. Some of the nasty tentacles that could go in principle are used in some test suites,
Remove obsolete key formats
This removes NETSCAPE_X509, NETSCAPE{,_ENCRYPTED}_PKEY, RSA_NET, Netscape_RSA things. Some of the nasty tentacles that could go in principle are used in some test suites, so we need to keep them...
All this was removed as part of OpenSSL commit 0bc2f365.
ok inoguchi jsing
show more ...
|
#
326063fd |
| 14-Jan-2022 |
tb <tb@openbsd.org> |
Unifdef LIBRESSL_OPAQUE_* and LIBRESSL_NEXT_API
This marks the start of major surgery in libcrypto. Do not attempt to build the tree for a while (~50 commits).
|
#
e9d41195 |
| 05-Jan-2022 |
tb <tb@openbsd.org> |
Prepare to provide a number of RSA accessors
This adds RSA_get0_{n,e,d,p,q,dmp1,dmq1,iqmp,pss_params}() which will be exposed in the upcoming bump.
ok inoguchi jsing
|
#
92d0d160 |
| 04-Nov-2019 |
jsing <jsing@openbsd.org> |
Reshuffle RSA_PSS_PARAMS and RSA_OAEP_PARAMS to avoid duplicate typedef.
Issue spotted by bcook@
ok bcook@ inoguchi@
|
#
c778c399 |
| 02-Nov-2019 |
jsing <jsing@openbsd.org> |
Provide RSA_PKCS1_OpenSSL().
Prompted by inoguchi@
|
#
4df279eb |
| 02-Nov-2019 |
jsing <jsing@openbsd.org> |
Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.
|
#
184daf41 |
| 02-Nov-2019 |
jsing <jsing@openbsd.org> |
Make RSA_OAEP_PARAMs public.
|
#
c4380ae9 |
| 01-Nov-2019 |
jsing <jsing@openbsd.org> |
Add RSA CMS support.
From OpenSSL 1.1.1d.
ok tb@
|
#
e119b44a |
| 01-Nov-2019 |
jsing <jsing@openbsd.org> |
Update RSA ASN.1 code to handle RSA-PSS.
From OpenSSL 1.1.1d.
ok tb@
|
#
ba05ae2d |
| 31-Oct-2019 |
jsing <jsing@openbsd.org> |
Add support for RSA-PSS.
From OpenSSL 1.1.1d.
ok inoguchi@
|
#
95285806 |
| 29-Oct-2019 |
jsing <jsing@openbsd.org> |
Update RSA OAEP code.
This syncs the RSA OAEP code with OpenSSL 1.1.1d, correctly handling OAEP padding and providing various OAEP related controls.
ok inoguchi@ tb@
|
#
ccd59b6a |
| 24-Oct-2019 |
jsing <jsing@openbsd.org> |
Add RSA_PSS_PARAMS pointer to RSA struct.
This will be used by upcoming RSA-PSS code.
ok tb@
|