History log of /openbsd-src/lib/libssl/ssl_sigalgs.h (Results 1 – 25 of 27)
Revision Date Author Comments
# 689a9b7e 03-Feb-2024 beck <beck@openbsd.org>

Remove GOST and STREEBOG support from libssl.

This version of GOST is old and not anywhere close to compliant with
modern GOST standards. It is also very intrusive in libssl and
makes a mess everywh

Remove GOST and STREEBOG support from libssl.

This version of GOST is old and not anywhere close to compliant with
modern GOST standards. It is also very intrusive in libssl and
makes a mess everywhere. Efforts to entice a suitably minded anyone
to care about it have been unsuccessful.

At this point it is probably best to remove this, and if someone
ever showed up who truly needed a working version, it should be
a clean implementation from scratch, and have it use something
closer to the typical API in libcrypto so it would integrate less
painfully here.

This removes it from libssl in preparation for it's removal from
libcrypto with a future major bump

ok tb@

show more ...


# c5270c5d 02-Jul-2022 tb <tb@openbsd.org>

Rename uses 'curve' to 'group' and rework tls1 group API.

This reworks various tls1_ curve APIs to indicate success via a boolean
return value and move the output to an out parameter. This makes the

Rename uses 'curve' to 'group' and rework tls1 group API.

This reworks various tls1_ curve APIs to indicate success via a boolean
return value and move the output to an out parameter. This makes the
caller code easier and more consistent.

Based on a suggestion by jsing

ok jsing

show more ...


# 678f3880 29-Jun-2022 tb <tb@openbsd.org>

Check the security level when building sigalgs

ok beck jsing


# fe57aeed 29-Jun-2022 tb <tb@openbsd.org>

Annotate sigalgs with their security level.

ok beck jsing


# 58ed3333 29-Jun-2021 jsing <jsing@openbsd.org>

Make various sigalg functions static now that they're only used internally.


# 21424b10 29-Jun-2021 jsing <jsing@openbsd.org>

Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.

Provide an ssl_sigalg_for_peer() function that knows how to figure out
which signature algorithm should be used for a peer provi

Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.

Provide an ssl_sigalg_for_peer() function that knows how to figure out
which signature algorithm should be used for a peer provided signature,
performing appropriate validation to ensure that the peer provided value
is suitable for the protocol version and key in use.

In the TLSv1.3 code, this replaces the need for separate calls to lookup
the sigalg from the peer provided value, then perform validation.

ok inoguchi@ tb@

show more ...


# 9bba4ac0 29-Jun-2021 jsing <jsing@openbsd.org>

Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().

Also, rather than passing in a check_curve flag, pass in the SSL * and
handle version checks internally to ssl_sigalg_pkey_ok(), simplifyi

Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().

Also, rather than passing in a check_curve flag, pass in the SSL * and
handle version checks internally to ssl_sigalg_pkey_ok(), simplifying
the callers.

ok inoguchi@ tb@

show more ...


# d2a2fa5f 27-Jun-2021 jsing <jsing@openbsd.org>

Change ssl_sigalgs_from_value() to perform sigalg list selection.

Rather that passing in a sigalg list at every call site, pass in the
appropriate TLS version and have ssl_sigalgs_from_value() perfo

Change ssl_sigalgs_from_value() to perform sigalg list selection.

Rather that passing in a sigalg list at every call site, pass in the
appropriate TLS version and have ssl_sigalgs_from_value() perform the
sigalg list selection itself. This allows the sigalg lists to be made
internal to the sigalgs code.

ok tb@

show more ...


# 36e55595 27-Jun-2021 jsing <jsing@openbsd.org>

Rename ssl_sigalg() to ssl_sigalg_from_value().

This makes the code more self-documenting and avoids the ambiguity between
ssl_sigalg the struct and ssl_sigalg the function.

ok tb@


# c4b0c3ce 27-Jun-2021 jsing <jsing@openbsd.org>

Change ssl_sigalgs_build() to perform sigalg list selection.

Rather that doing sigalg list selection at every call site, pass in the
appropriate TLS version and have ssl_sigalgs_build() perform the

Change ssl_sigalgs_build() to perform sigalg list selection.

Rather that doing sigalg list selection at every call site, pass in the
appropriate TLS version and have ssl_sigalgs_build() perform the sigalg
list selection itself. This reduces code duplication, simplifies the
calling code and is the first step towards internalising the sigalg lists.

ok tb@

show more ...


# e3d56dc6 27-Jun-2021 jsing <jsing@openbsd.org>

Keep sigalg initialiser order consistent - key type, then hash.

This matches the order that sigalgs are specified in.

ok tb@


# d18a6424 16-May-2021 jsing <jsing@openbsd.org>

Add a missing space.


# 5b35b8bb 11-Oct-2020 guenther <guenther@openbsd.org>

Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them into
.data.rel.ro and .rodata respectively.

ok tb@ jsing@


# 89036584 25-Mar-2019 jsing <jsing@openbsd.org>

Strip out all of the pkey to sigalg and sigalg to pkey linkages.

These are no longer used now that we defer signature algorithm selection.

ok beck@


# 96b13b45 25-Mar-2019 jsing <jsing@openbsd.org>

Defer sigalgs selection until the certificate is known.

Previously the signature algorithm was selected when the TLS extension was
parsed (or the client received a certificate request), however the

Defer sigalgs selection until the certificate is known.

Previously the signature algorithm was selected when the TLS extension was
parsed (or the client received a certificate request), however the actual
certificate to be used is not known at this stage. This leads to various
problems, including the selection of a signature algorithm that cannot be
used with the certificate key size (as found by jeremy@ via ruby regress).

Instead, store the signature algorithms list and only select a signature
algorithm when we're ready to do signature generation.

Joint work with beck@.

show more ...


# 8b21e38a 23-Jan-2019 beck <beck@openbsd.org>

Correct ECDSA_SECP512R1 typo to ECDSA_SECP521R1
spotted by naddy@


# 3e29903b 23-Jan-2019 beck <beck@openbsd.org>

Modify sigalgs extension processing to accomodate TLS 1.3.
- Make a separate sigalgs list for TLS 1.3 including only modern
algorithm choices which we use when the handshake will not negotiate
TLS 1.

Modify sigalgs extension processing to accomodate TLS 1.3.
- Make a separate sigalgs list for TLS 1.3 including only modern
algorithm choices which we use when the handshake will not negotiate
TLS 1.2.
- Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as
mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2
from a 1.3 handshake.
ok jsing@ tb@

show more ...


# 174eabd6 23-Jan-2019 beck <beck@openbsd.org>

revert previous, accidentally contained another diff in addition
to the one I intended to commit


# fbffb329 23-Jan-2019 beck <beck@openbsd.org>

Modify sigalgs extension processing for TLS 1.3.
- Make a separate sigalgs list for TLS 1.3 including only modern
algorithm choices which we use when the handshake will not negotiate
TLS 1.2
- Mo

Modify sigalgs extension processing for TLS 1.3.
- Make a separate sigalgs list for TLS 1.3 including only modern
algorithm choices which we use when the handshake will not negotiate
TLS 1.2
- Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as
mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2
ok jsing@ tb@

show more ...


# 2fab3c32 16-Nov-2018 beck <beck@openbsd.org>

Unbreak legacy ciphers for prior to 1.1 by setting having a legacy
sigalg for MD5_SHA1 and using it as the non sigalgs default
ok jsing@


# 81230f72 11-Nov-2018 beck <beck@openbsd.org>

Add check function to verify that pkey is usable with a sigalg.
Include check for appropriate RSA key size when used with PSS.
ok tb@


# 4ec01807 10-Nov-2018 beck <beck@openbsd.org>

Remove dead code
ok jsing@


# fbe97c86 10-Nov-2018 beck <beck@openbsd.org>

Stop keeping track of sigalgs by guessing it from digest and pkey,
just keep the sigalg around so we can remember what we actually
decided to use.
ok jsing@


# 2b3aa98d 09-Nov-2018 beck <beck@openbsd.org>

Ensure we only choose sigalgs from our prefernce list, not the whole list
ok jsing@


# d924cf6a 09-Nov-2018 beck <beck@openbsd.org>

Add the ability to have a separate priority list for sigalgs.
Add a priority list for tls 1.2
ok jsing@


12