Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support TLS operation with EdDSA keys #465

Merged
merged 3 commits into from
Nov 13, 2024
Merged

Commits on Nov 13, 2024

  1. Fix importing EdDSA keys from OpenSSL

    Fixes: latchset#461
    
    Signed-off-by: Jakub Jelen <[email protected]>
    Jakuje committed Nov 13, 2024
    Configuration menu
    Copy the full SHA
    8c30a05 View commit details
    Browse the repository at this point in the history
  2. tests: Test TLS with EdDSA and extend the ttls test

    The EdDSA signature verification causes infinite recursion in softhsm
    when the OPENSSL_CONF is used to force all operations to token because
    the SoftHSM Is using the EVP_PKEY API to implement the EdDSA signature
    and verification which is recursively routed back to the
    pkcs11-provider.
    
    The workaround is to set the propquery on the openssl cli, which will
    not propagate to the softhsm context.
    
    Signed-off-by: Jakub Jelen <[email protected]>
    Jakuje committed Nov 13, 2024
    Configuration menu
    Copy the full SHA
    6a672bc View commit details
    Browse the repository at this point in the history
  3. Extend the tlsfuzzer tests with the eddsa host key

    Signed-off-by: Jakub Jelen <[email protected]>
    Jakuje committed Nov 13, 2024
    Configuration menu
    Copy the full SHA
    7f7267b View commit details
    Browse the repository at this point in the history