- 03 Feb, 2017 1 commit
-
-
davidben authored
There are two that are wrong because cpplint gets confused about variables named 'copy' and methods named 'swap'. Those I've left alone. BUG=none Review-Url: https://codereview.chromium.org/2677583002 Cr-Commit-Position: refs/heads/master@{#447926}
-
- 04 Jan, 2017 1 commit
-
-
davidben authored
Even with a password, the encryption scheme used here is really not what we'd want people to use. This does two things: 1. Cut down on the number of ways to use ExportEncryptedPrivateKey and makes it less likely someone will mistakenly use it for security purposes. 2. When we ported to BoringSSL, we added "raw" versions of PKCS8_{encrypt,decrypt} to account for confusion about two ways to encode the empty password. But PKCS8_{encrypt,decrypt} already handled this by treating NULL and "" differently. Limiting to just the empty password lets us trim BoringSSL's API surface in preparation for decoupling it from crypto/asn1. BUG=603319 Review-Url: https://codereview.chromium.org/2608453002 Cr-Commit-Position: refs/heads/master@{#441365}
-
- 28 Oct, 2016 1 commit
-
-
tfarina authored
This also allow us to participate in DEPS checking, which will help catch instances of directories including BoringSSL without adding to build targets. This patch was partly generated by the following command lines: $ g grep -l -e '^#[[:blank:]]*include <\(openssl[^>]*\)>' | xargs sed -i '/^#[[:blank:]]*include/s/<\(openssl[^>]*\)>/"\1"/' $ g grep -l "#include \"openssl/" | xargs sed -i -e 's/\(#.* \)"\(openssl\/.*\)"/\1"third_party\/boringssl\/src\/include\/\2"/' The regex were taken from http://stackoverflow.com/a/25378698 and https://svn.boost.org/trac/boost/ticket/12057, and adapted to suit our needs. Then the includes were put in their right places with some manual editing and the help of tools/sort-headers.py. BUG=446558 R=davidben@chromium.org,thestig@chromium.org,jochen@chromium.org,slan@chromium.org Review-Url: https://codereview.chromium.org/2449873005 Cr-Commit-Position: refs/heads/master@{#428442}
-
- 01 Oct, 2016 1 commit
-
-
davidben authored
Forward-declare with openssl/base.h which generally works nicer. However this does require we take better care around public_deps and some IWYU errors had to be fixed. BUG=none TBR=btolsch@chromium.org Review-Url: https://codereview.chromium.org/2332473002 Cr-Commit-Position: refs/heads/master@{#422260}
-
- 13 Jul, 2016 1 commit
-
-
agl authored
|EVP_PKEY_up_ref| was a BoringSSL addition to OpenSSL The next major, public OpenSSL release will include it, but it'll return 0/1 rather than the object being referenced. This change updates Chromium to expect that function signature (in a backwards compatible way). Once all callers have been updated likewise, BoringSSL will align this function with upstream OpenSSL. BUG=none Review-Url: https://codereview.chromium.org/2113143004 Cr-Commit-Position: refs/heads/master@{#405192}
-
- 28 Jun, 2016 1 commit
-
-
rsleevi authored
Rather than make callers use base::WrapUnique or .reset(), have //crypto functions that create new instances return them in std::unique_ptr<>s Also fixup NULL vs nullptr where it matters most, and remove superflous .get() tests from the unique_ptr<>s BUG=none R=davidben@chromium.org Review-Url: https://codereview.chromium.org/2095523002 Cr-Commit-Position: refs/heads/master@{#402368}
-
- 07 Jun, 2016 1 commit
-
-
davidben authored
Also const-correct a few functions and add some missing error tracers. Deprecate the old ones. Also const-correct a few functions and add some missing error tracers. Future work migrate existing serializations to the new format. BUG=603319 Review-Url: https://codereview.chromium.org/1935053003 Cr-Commit-Position: refs/heads/master@{#398318}
-
- 21 Apr, 2016 1 commit
-
-
svaldez authored
With the removal of most of the NSS code, we no longer need to split up code between NSS and OpenSSL implementations. BUG=604728 Review URL: https://codereview.chromium.org/1909513003 Cr-Commit-Position: refs/heads/master@{#388856}
-
- 08 Apr, 2016 1 commit
-
-
thakis authored
BUG=554298 TBR=sdefresne Review URL: https://codereview.chromium.org/1870233002 Cr-Commit-Position: refs/heads/master@{#386228}
-
- 01 Mar, 2016 1 commit
-
-
davidben authored
SSL_library_init is deprecated. It's CRYPTO_library_init. Switch from the legacy ASN.1 APIs to the new parsers where feasible. ECPrivateKey::CreateFromEncryptedPrivateKeyInfo is left alone for now as we still need a new version of those APIs. This also adds a scoper for CBB for use in later CLs. BUG=499653 Review URL: https://codereview.chromium.org/1739403002 Cr-Commit-Position: refs/heads/master@{#378610}
-
- 21 Dec, 2015 1 commit
-
-
avi authored
BUG=138542 TBR=rsleevi@chromium.org NOPRESUBMIT=true Review URL: https://codereview.chromium.org/1539353003 Cr-Commit-Position: refs/heads/master@{#366460}
-
- 15 Oct, 2015 1 commit
-
-
davidben authored
We no longer need to worry about the system NSS on decrepit Linux distributions. The only platform where ECPrivateKey is backed by NSS is iOS and we control that one. BUG=519504 Review URL: https://codereview.chromium.org/1408813002 Cr-Commit-Position: refs/heads/master@{#354379}
-
- 02 Sep, 2015 1 commit
-
-
davidben authored
https://boringssl.googlesource.com/boringssl/+log/12fe1b25ead258858309d22ffa9e1f9a316358d7..ac8302a092e8e232dbabf5a01eff5dd37671b5c8 Also add a script to do the roll so I don't forget to update build files. BUG=none Review URL: https://codereview.chromium.org/1321793002 Cr-Commit-Position: refs/heads/master@{#346841}
-
- 13 May, 2015 1 commit
-
-
davidben authored
This is a no-op change. BoringSSL deprecated EVP_PKEY_dup in favor of a new EVP_PKEY_up_ref. This makes it more obvious there isn't actually a copy and is more consistent with other ref-counted types. See https://boringssl.googlesource.com/boringssl/+/517da2f1efc91b179dfb1898f826b18a6a38f547%5E%21/#F3 BUG=none Review URL: https://codereview.chromium.org/1129083007 Cr-Commit-Position: refs/heads/master@{#329732}
-
- 12 May, 2015 1 commit
-
-
nharper authored
BUG=457566 Review URL: https://codereview.chromium.org/1133303003 Cr-Commit-Position: refs/heads/master@{#329527}
-
- 21 Feb, 2015 1 commit
-
-
davidben authored
This avoids having to put '::Type' everywhere. BUG=none Review URL: https://codereview.chromium.org/948543002 Cr-Commit-Position: refs/heads/master@{#317462}
-
- 06 Aug, 2014 1 commit
-
-
davidben@chromium.org authored
NSS would use "" as the password while OpenSSL would use "\0\0" (UCS-2 encoding of a NUL-terminated string) because of how PKCS#12 recommended encoding passwords. Make the OpenSSL code use the same format so that we can freely switch back and forth between NSS and OpenSSL. (This is in case we need to roll back an OpenSSL cutover and the release has hit some early release channel already.) BUG=399121 Review URL: https://codereview.chromium.org/435593003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@287890 0039d316-1c4b-4281-b951-d872f2087c98
-
- 10 Jul, 2014 1 commit
-
-
rsleevi@chromium.org authored
Match the NSS, CryptoAPI (Win) and Security (OS X) approaches by declaring the scoped types as specializations of our existing scoped classes. Like NSS, this requires an intermediate helper type, because our scoped_ptr<> doesn't accept deleter functions as template arguments (though they are valid in C++11's unique_ptr<>). A few base cryptographic (non-certificate) types are used in scoped_openssl_types.h, while the remainder are left for implementations to specialize as needed. In an ideal world, this would be scoped_ptr<FOO, FOO_free>, but that will require unique_ptr<> support. BUG=388904 Review URL: https://codereview.chromium.org/361193003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@282257 0039d316-1c4b-4281-b951-d872f2087c98
-
- 24 Jun, 2014 1 commit
-
-
wtc@chromium.org authored
ECPrivateKey::ExportRawPublicKey. R=rsleevi@chromium.org Review URL: https://codereview.chromium.org/279973005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@279308 0039d316-1c4b-4281-b951-d872f2087c98
-
- 22 Mar, 2014 1 commit
-
-
mattm@chromium.org authored
BUG=none Review URL: https://codereview.chromium.org/205333002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@258739 0039d316-1c4b-4281-b951-d872f2087c98
-
- 13 Nov, 2013 1 commit
-
-
mattm@chromium.org authored
Make ECPrivateKey use PK11_GetInternalKeySlot for temporary keys. Make ECPrivateKey and RSAPrivateKey "sensitive" functions take slot as parameter. This avoids calling non-thread-safe functions in nss_util on arbitrary threads. Also removes the ANNOTATE_SCOPED_MEMORY_LEAK from RSAPrivateKey which should no longer be necessary. BUG=125848,34742 Review URL: https://codereview.chromium.org/66213002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@234726 0039d316-1c4b-4281-b951-d872f2087c98
-
- 17 Oct, 2013 1 commit
-
-
digit@chromium.org authored
BUG=306176 R=rsleevi@chromium.org, wtc@chromium.org, agl@chromium.org Review URL: https://codereview.chromium.org/27195002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@229153 0039d316-1c4b-4281-b951-d872f2087c98
-
- 09 Jul, 2012 1 commit
-
-
mattm@chromium.org authored
Add static function to ECPrivateKey to get which NSS slot it uses. BUG=127506 Review URL: https://chromiumcodereview.appspot.com/10700099 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@145777 0039d316-1c4b-4281-b951-d872f2087c98
-
- 09 Nov, 2011 1 commit
-
-
mattm@chromium.org authored
The implementation uses NSS on all platforms unless USE_OPENSSL is defined (which is only stubbed out in this CL). BUG=88782 TEST=ECPrivateKeyUnitTest Review URL: http://codereview.chromium.org/8413024 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@109188 0039d316-1c4b-4281-b951-d872f2087c98
-