Rohit Aggarwal
e3a657d22b
Change function name to be similar to RSA one
2018-03-13 08:57:35 +00:00
Steven Fackler
9452c01672
Merge pull request #864 from mlen/aes-ccm-bindings
...
Implement AES-{128,256}-CCM bindings
2018-03-11 16:30:37 -07:00
Steven Fackler
170adae336
Merge pull request #873 from sfackler/tweaks
...
Add a Sync + Send bound to the custom ext type
2018-03-11 16:10:54 -07:00
Steven Fackler
7edecbd3a8
Merge pull request #872 from sfackler/tweaks
...
Some ECDSA fixes/tweaks
2018-03-11 15:37:28 -07:00
Steven Fackler
9f5ef88880
Add a Sync + Send bound to the custom ext type
...
It's stored inside of the Ssl, so this is probably tecnically
necessarly?
2018-03-11 15:36:47 -07:00
Steven Fackler
0bc7dd9034
Merge pull request #860 from Ralith/custom-extensions
...
Custom extensions
2018-03-11 15:33:42 -07:00
Steven Fackler
d0329473bd
Merge branch 'master' into custom-extensions
2018-03-11 15:27:28 -07:00
Steven Fackler
c9ef7f3cd5
Some ECDSA fixes/tweaks
2018-03-11 15:23:23 -07:00
Steven Fackler
1b830c3fb7
Merge pull request #863 from rohit-lshift/master
...
Exposed some of ECDSA functions
2018-03-11 15:08:16 -07:00
Steven Fackler
f2575138eb
Merge pull request #871 from sfackler/tweaks
...
Tweak verify_cert's signature
2018-03-11 14:15:21 -07:00
Steven Fackler
4ee7e0d3a9
Tweak verify_cert's signature
...
The call can fail either due to an invalid cert or an internal error,
and we should distinguish between the two.
2018-03-11 14:08:34 -07:00
Mateusz Lenik
cefad46cf5
fixup! Implement AES-{128,256}-CCM bindings
2018-03-11 22:04:01 +01:00
Steven Fackler
00359a1a55
Merge pull request #861 from bkchr/verify_certificate
...
Implements `X509_verify_cert`
2018-03-11 13:37:21 -07:00
Steven Fackler
a5c2ddb219
Merge pull request #870 from sfackler/tweaks
...
Rename Oid to Id
2018-03-11 13:37:03 -07:00
Steven Fackler
40e59db37c
Rename Oid to Id
2018-03-11 13:29:01 -07:00
Bastian Köcher
d7a7c379a8
Changes `init` to take a closure which is called with the initialized context
...
After calling the closure, we automatically cleanup the context. This is
required, because otherwise we could have dangling references in the context.
2018-03-11 11:34:36 +01:00
Rohit Aggarwal
c0a4bc4202
Revert previous commit
2018-03-11 07:41:22 +00:00
Benjamin Saunders
e02dbde2f7
Generic custom extension add fn return type
2018-03-10 22:30:54 -08:00
Steven Fackler
eb5fda588f
Merge pull request #862 from bkchr/sign_verifier
...
Adds new functions for Verifier/Signer
2018-03-10 16:42:33 -08:00
Steven Fackler
11f35dd566
Merge pull request #867 from sfackler/1.1.1-pre2
...
Bump 1.1.1 to pre2
2018-03-10 16:35:59 -08:00
Steven Fackler
67640ed599
Bump 1.1.1 to pre2
2018-03-10 16:26:01 -08:00
Steven Fackler
562fe79f4c
Add one more set of impls
2018-03-10 08:53:46 -08:00
Steven Fackler
c3b6e87244
Merge pull request #866 from sfackler/more-sync
...
Impl Sync and Send for various types
2018-03-10 08:52:16 -08:00
Rohit Aggarwal
bc304565e7
Arguments should be BigNumRef and not BigNum
2018-03-10 16:29:54 +00:00
Steven Fackler
245f5f3a11
Impl Sync and Send for various types
...
Closes #865
2018-03-09 22:14:50 -08:00
Benjamin Saunders
b0bc1c770e
High-level API for OpenSSL 1.1.1 custom extension support
2018-03-09 20:33:49 -08:00
Bastian Köcher
7fe3fabf24
Switches to new type wrapper for RsaPssSaltlen
2018-03-10 00:27:15 +01:00
Bastian Köcher
a5d7f8a718
Moves store context init into its own function
2018-03-10 00:15:03 +01:00
Rohit Aggarwal
e655b561a7
Added a function to create a EC<Key> from its parts
2018-03-09 15:58:56 +00:00
Rohit Aggarwal
7ab650098c
Remove unneeded paramter
2018-03-09 10:39:58 +00:00
Mateusz Lenik
4866e9ff8a
fixup! Implement AES-{128,256}-CCM bindings
2018-03-08 21:57:39 +01:00
Rohit Aggarwal
8461129456
Changes as per PR feedback
2018-03-08 17:42:15 +00:00
Rohit Aggarwal
9e2755abae
Get curves for OpenSSL tests itself
2018-03-08 17:10:09 +00:00
Rohit Aggarwal
0a38b5a9ef
Try out another curve
2018-03-08 16:56:40 +00:00
Rohit Aggarwal
4b4d312018
Another try at using the correct curve
2018-03-08 16:46:31 +00:00
Mateusz Lenik
dcbb45cc9d
Implement AES-{128,256}-CCM bindings
2018-03-08 17:24:55 +01:00
Rohit Aggarwal
d4de2a408f
Use examples listed in OpenSSL docs for testing
2018-03-08 16:12:35 +00:00
Bastian Köcher
a5ba1a0007
Adds `RsaPssSaltlen` enum to encode the special values
2018-03-08 16:17:32 +01:00
Rohit Aggarwal
55ffc9b2e4
Add support LibreSSL and remove OpenSSL binding which we aren't using
2018-03-08 11:54:19 +00:00
Bastian Köcher
b0ea53184d
Switches to newtype wrapper for Oid
2018-03-08 12:24:37 +01:00
Bastian Köcher
1a0b085377
Extends the test to verify the certificate two times
2018-03-08 12:10:29 +01:00
Bastian Köcher
810ddeb4ca
Moves `cleanup` into its own function
2018-03-08 12:08:39 +01:00
Rohit Aggarwal
2d6cd9eb16
Exposed some of ECDSA functions
2018-03-08 09:44:05 +00:00
Bastian Köcher
724dd6f830
Adds more functions to `Verifier`/`Signer` for RSA keys
2018-03-07 20:43:28 +01:00
Bastian Köcher
84a5ce7607
Adds RSA PKCS1 PSS padding
2018-03-07 20:43:12 +01:00
Bastian Köcher
9a8a1c752b
Adds `PKeyRef::get_id` to get the OID of a key
2018-03-07 18:42:13 +01:00
Bastian Köcher
888f4ccaab
Fixes the implementation of `X509StoreContextRef::verify_cert`
...
The certificate, the store and the certificates chain does not need to be
consumed by `verify_cert` and instead are taken as references. We also call
`X509_STORE_CTX_cleanup`, after the verification succeeded.
2018-03-07 16:07:57 +01:00
Benjamin Fry
53adf0e6a4
delay return until after forgets
2018-03-07 13:54:35 +01:00
Benjamin Fry
6abac82f13
cleanup and add negative test
2018-03-07 13:54:35 +01:00
Benjamin Fry
a1cfde765a
add cleanup ffi to store context
2018-03-07 13:54:15 +01:00