Skip to content

Adapt i2d_PrivateKey for provider only keys#11056

Merged
openssl-machine merged 1 commit intoopenssl:masterfrom
levitte:adapt-i2d_PrivateKey-for-provided-keys
Feb 14, 2020
Merged

Adapt i2d_PrivateKey for provider only keys#11056
openssl-machine merged 1 commit intoopenssl:masterfrom
levitte:adapt-i2d_PrivateKey-for-provided-keys

Conversation

@levitte
Copy link
Member

@levitte levitte commented Feb 11, 2020

It uses EVP_PKEY serializers to get the desired results.

One might think that ddoing this might make things a bit dicy for
existing serializers, as they should obviously use i2d functions.
However, since our serializers use much more primitive functions
such as i2d_ASN1_INTEGER(), or keytype specific ones such as
i2d_RSAPrivateKey(), there is no clash.

@levitte levitte added branch: master Applies to master branch approval: review pending This pull request needs review by a committer labels Feb 11, 2020
mattcaswell
mattcaswell previously approved these changes Feb 11, 2020
@mattcaswell mattcaswell dismissed their stale review February 11, 2020 10:41

Oh...wait....Travis red cross looks relevant. Otherwise looks ok.

@levitte levitte changed the title Adapt i2d_PrivateKey for provider only keys [Pending on #11055] Adapt i2d_PrivateKey for provider only keys Feb 11, 2020
@levitte
Copy link
Member Author

levitte commented Feb 11, 2020

Oh...wait....Travis red cross looks relevant. Otherwise looks ok.

Yup, it's waiting for #11055

@levitte levitte force-pushed the adapt-i2d_PrivateKey-for-provided-keys branch from 49755d1 to 8153df6 Compare February 12, 2020 12:11
@levitte
Copy link
Member Author

levitte commented Feb 12, 2020

The CIs should be happier now

@levitte
Copy link
Member Author

levitte commented Feb 13, 2020

And with yet another rebase, the ECX issue should be no more...

@levitte levitte changed the title [Pending on #11055] Adapt i2d_PrivateKey for provider only keys Adapt i2d_PrivateKey for provider only keys Feb 13, 2020
Copy link
Member

@slontis slontis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@levitte levitte added approval: done This pull request has the required number of approvals and removed approval: review pending This pull request needs review by a committer labels Feb 13, 2020
@openssl-machine openssl-machine added approval: ready to merge The 24 hour grace period has passed, ready to merge and removed approval: done This pull request has the required number of approvals labels Feb 14, 2020
@openssl-machine
Copy link
Collaborator

This pull request is ready to merge

It uses EVP_PKEY serializers to get the desired results.

One might think that ddoing this might make things a bit dicy for
existing serializers, as they should obviously use i2d functions.
However, since our serializers use much more primitive functions
such as i2d_ASN1_INTEGER(), or keytype specific ones such as
i2d_RSAPrivateKey(), there is no clash.

Reviewed-by: Shane Lontis <[email protected]>
(Merged from openssl#11056)
@levitte levitte force-pushed the adapt-i2d_PrivateKey-for-provided-keys branch from 3161a2f to 3e686af Compare February 14, 2020 13:15
@openssl-machine openssl-machine merged commit 3e686af into openssl:master Feb 14, 2020
@levitte levitte deleted the adapt-i2d_PrivateKey-for-provided-keys branch February 14, 2020 13:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approval: ready to merge The 24 hour grace period has passed, ready to merge branch: master Applies to master branch

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants