1. 15 Jan, 2019 3 commits
  2. 13 Jan, 2019 1 commit
  3. 08 Jan, 2019 3 commits
  4. 07 Jan, 2019 5 commits
  5. 06 Jan, 2019 3 commits
  6. 05 Jan, 2019 3 commits
  7. 04 Jan, 2019 7 commits
  8. 03 Jan, 2019 3 commits
  9. 31 Dec, 2018 1 commit
  10. 30 Dec, 2018 1 commit
  11. 29 Dec, 2018 1 commit
  12. 27 Dec, 2018 1 commit
  13. 22 Dec, 2018 5 commits
  14. 21 Dec, 2018 1 commit
  15. 20 Dec, 2018 1 commit
    • Ken Goldman's avatar
      Admit unknown pkey types at security level 0 · baba1545
      Ken Goldman authored
      
      
      The check_key_level() function currently fails when the public key
      cannot be extracted from the certificate because its algorithm is not
      supported.  However, the public key is not needed for the last
      certificate in the chain.
      
      This change moves the check for level 0 before the check for a
      non-NULL public key.
      
      For background, this is the TPM 1.2 endorsement key certificate.
      I.e., this is a real application with millions of certificates issued.
      The key is an RSA-2048 key.
      
      The TCG (for a while) specified
      
           Public Key Algorithm: rsaesOaep
      
      rather than the commonly used
      
           Public Key Algorithm: rsaEncryption
      
      because the key is an encryption key rather than a signing key.
      The X509 certificate parser fails to get the public key.
      
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/7906)
      baba1545
  16. 19 Dec, 2018 1 commit