Commit graph

5 commits

Author SHA1 Message Date
Jan Rüth
b88c87235d Harden crypto provider error handling and FIPS reporting
Implement provider-wide FIPS semantics by filtering non-FIPS suites in provider_with_ciphers() and wiring fips() reporting across provider components, KX groups, AEADs, and signature verifiers.

Replace panic-prone hotpath behavior with error returns across TLS/QUIC AEAD setup and header protection, enforce HKDF output bounds, and remove shared HMAC context cloning to tighten runtime safety.

Rework signing and verification paths to support SEC1 EC key loading, curve-aware scheme selection, and consistent malformed-input error handling without panics.

Add comprehensive regression coverage for malformed KX shares, verifier inputs, AEAD truncation and constructor failures, plus a panic-surface test that scans runtime provider/additions code for new panic constructs unless explicitly allowlisted.

Update the example client to return Result and eliminate non-test unwrap-style exits.
2026-04-10 17:17:44 +02:00
Jan Rüth
bd80bfc4d7 Enhance error handling and docs 2023-11-24 19:41:01 +01:00
Jan Rüth
6f1394e4b4 Clippy 2023-11-24 16:14:10 +01:00
Jan Rüth
aa74b45a0f * Move ffi type container to boring-additions
* Use boring::derive for EC and ED instead of own implementation
2023-11-24 10:32:33 +01:00
Jan Rüth
319029f2d4 Fix AES256 using wrong hash
Add TLS 1.2
Move aead crypter to boring-additions crate
2023-11-20 20:36:55 +01:00
Renamed from boring-rustls-provider/src/aead/aead2.rs (Browse further)