#
689a9b7e |
| 03-Feb-2024 |
beck <beck@openbsd.org> |
Remove GOST and STREEBOG support from libssl.
This version of GOST is old and not anywhere close to compliant with modern GOST standards. It is also very intrusive in libssl and makes a mess everywh
Remove GOST and STREEBOG support from libssl.
This version of GOST is old and not anywhere close to compliant with modern GOST standards. It is also very intrusive in libssl and makes a mess everywhere. Efforts to entice a suitably minded anyone to care about it have been unsuccessful.
At this point it is probably best to remove this, and if someone ever showed up who truly needed a working version, it should be a clean implementation from scratch, and have it use something closer to the typical API in libcrypto so it would integrate less painfully here.
This removes it from libssl in preparation for it's removal from libcrypto with a future major bump
ok tb@
show more ...
|
#
c5270c5d |
| 02-Jul-2022 |
tb <tb@openbsd.org> |
Rename uses 'curve' to 'group' and rework tls1 group API.
This reworks various tls1_ curve APIs to indicate success via a boolean return value and move the output to an out parameter. This makes the
Rename uses 'curve' to 'group' and rework tls1 group API.
This reworks various tls1_ curve APIs to indicate success via a boolean return value and move the output to an out parameter. This makes the caller code easier and more consistent.
Based on a suggestion by jsing
ok jsing
show more ...
|
#
678f3880 |
| 29-Jun-2022 |
tb <tb@openbsd.org> |
Check the security level when building sigalgs
ok beck jsing
|
#
fe57aeed |
| 29-Jun-2022 |
tb <tb@openbsd.org> |
Annotate sigalgs with their security level.
ok beck jsing
|
#
58ed3333 |
| 29-Jun-2021 |
jsing <jsing@openbsd.org> |
Make various sigalg functions static now that they're only used internally.
|
#
21424b10 |
| 29-Jun-2021 |
jsing <jsing@openbsd.org> |
Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.
Provide an ssl_sigalg_for_peer() function that knows how to figure out which signature algorithm should be used for a peer provi
Provide a ssl_sigalg_for_peer() function and use in the TLSv1.3 code.
Provide an ssl_sigalg_for_peer() function that knows how to figure out which signature algorithm should be used for a peer provided signature, performing appropriate validation to ensure that the peer provided value is suitable for the protocol version and key in use.
In the TLSv1.3 code, this replaces the need for separate calls to lookup the sigalg from the peer provided value, then perform validation.
ok inoguchi@ tb@
show more ...
|
#
9bba4ac0 |
| 29-Jun-2021 |
jsing <jsing@openbsd.org> |
Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().
Also, rather than passing in a check_curve flag, pass in the SSL * and handle version checks internally to ssl_sigalg_pkey_ok(), simplifyi
Move the RSA-PSS check for TLSv1.3 to ssl_sigalg_pkey_ok().
Also, rather than passing in a check_curve flag, pass in the SSL * and handle version checks internally to ssl_sigalg_pkey_ok(), simplifying the callers.
ok inoguchi@ tb@
show more ...
|
#
d2a2fa5f |
| 27-Jun-2021 |
jsing <jsing@openbsd.org> |
Change ssl_sigalgs_from_value() to perform sigalg list selection.
Rather that passing in a sigalg list at every call site, pass in the appropriate TLS version and have ssl_sigalgs_from_value() perfo
Change ssl_sigalgs_from_value() to perform sigalg list selection.
Rather that passing in a sigalg list at every call site, pass in the appropriate TLS version and have ssl_sigalgs_from_value() perform the sigalg list selection itself. This allows the sigalg lists to be made internal to the sigalgs code.
ok tb@
show more ...
|
#
36e55595 |
| 27-Jun-2021 |
jsing <jsing@openbsd.org> |
Rename ssl_sigalg() to ssl_sigalg_from_value().
This makes the code more self-documenting and avoids the ambiguity between ssl_sigalg the struct and ssl_sigalg the function.
ok tb@
|
#
c4b0c3ce |
| 27-Jun-2021 |
jsing <jsing@openbsd.org> |
Change ssl_sigalgs_build() to perform sigalg list selection.
Rather that doing sigalg list selection at every call site, pass in the appropriate TLS version and have ssl_sigalgs_build() perform the
Change ssl_sigalgs_build() to perform sigalg list selection.
Rather that doing sigalg list selection at every call site, pass in the appropriate TLS version and have ssl_sigalgs_build() perform the sigalg list selection itself. This reduces code duplication, simplifies the calling code and is the first step towards internalising the sigalg lists.
ok tb@
show more ...
|
#
e3d56dc6 |
| 27-Jun-2021 |
jsing <jsing@openbsd.org> |
Keep sigalg initialiser order consistent - key type, then hash.
This matches the order that sigalgs are specified in.
ok tb@
|
#
d18a6424 |
| 16-May-2021 |
jsing <jsing@openbsd.org> |
Add a missing space.
|
#
5b35b8bb |
| 11-Oct-2020 |
guenther <guenther@openbsd.org> |
Constipate ssl3_ciphers and tls1[23]_sigalgs*, pushing them into .data.rel.ro and .rodata respectively.
ok tb@ jsing@
|
#
89036584 |
| 25-Mar-2019 |
jsing <jsing@openbsd.org> |
Strip out all of the pkey to sigalg and sigalg to pkey linkages.
These are no longer used now that we defer signature algorithm selection.
ok beck@
|
#
96b13b45 |
| 25-Mar-2019 |
jsing <jsing@openbsd.org> |
Defer sigalgs selection until the certificate is known.
Previously the signature algorithm was selected when the TLS extension was parsed (or the client received a certificate request), however the
Defer sigalgs selection until the certificate is known.
Previously the signature algorithm was selected when the TLS extension was parsed (or the client received a certificate request), however the actual certificate to be used is not known at this stage. This leads to various problems, including the selection of a signature algorithm that cannot be used with the certificate key size (as found by jeremy@ via ruby regress).
Instead, store the signature algorithms list and only select a signature algorithm when we're ready to do signature generation.
Joint work with beck@.
show more ...
|
#
8b21e38a |
| 23-Jan-2019 |
beck <beck@openbsd.org> |
Correct ECDSA_SECP512R1 typo to ECDSA_SECP521R1 spotted by naddy@
|
#
3e29903b |
| 23-Jan-2019 |
beck <beck@openbsd.org> |
Modify sigalgs extension processing to accomodate TLS 1.3. - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.
Modify sigalgs extension processing to accomodate TLS 1.3. - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@
show more ...
|
#
174eabd6 |
| 23-Jan-2019 |
beck <beck@openbsd.org> |
revert previous, accidentally contained another diff in addition to the one I intended to commit
|
#
fbffb329 |
| 23-Jan-2019 |
beck <beck@openbsd.org> |
Modify sigalgs extension processing for TLS 1.3. - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Mo
Modify sigalgs extension processing for TLS 1.3. - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 ok jsing@ tb@
show more ...
|
#
2fab3c32 |
| 16-Nov-2018 |
beck <beck@openbsd.org> |
Unbreak legacy ciphers for prior to 1.1 by setting having a legacy sigalg for MD5_SHA1 and using it as the non sigalgs default ok jsing@
|
#
81230f72 |
| 11-Nov-2018 |
beck <beck@openbsd.org> |
Add check function to verify that pkey is usable with a sigalg. Include check for appropriate RSA key size when used with PSS. ok tb@
|
#
4ec01807 |
| 10-Nov-2018 |
beck <beck@openbsd.org> |
Remove dead code ok jsing@
|
#
fbe97c86 |
| 10-Nov-2018 |
beck <beck@openbsd.org> |
Stop keeping track of sigalgs by guessing it from digest and pkey, just keep the sigalg around so we can remember what we actually decided to use. ok jsing@
|
#
2b3aa98d |
| 09-Nov-2018 |
beck <beck@openbsd.org> |
Ensure we only choose sigalgs from our prefernce list, not the whole list ok jsing@
|
#
d924cf6a |
| 09-Nov-2018 |
beck <beck@openbsd.org> |
Add the ability to have a separate priority list for sigalgs. Add a priority list for tls 1.2 ok jsing@
|