Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add flags for openssl-only crypto #52

Open
wants to merge 9 commits into
base: master
Choose a base branch
from

Conversation

connor4312
Copy link
Contributor

Fixes #50

This introduces an on-by-default rs-crypto flag, which enables the existing Rust-based crypto libraries (including aes and ED25519). However, these implementations can be removed by disabling the flag. If it's disabled, then openssl (when turned on) will stand in for them, in a less performant way.

Note that while OpenSSL 3.x does have some ED25519 support, I have not done the work to make that compatible as well--partly because ED25519 is not yet an approved algorithm for my company to use, and partly to retain compatibility with OpenSSL 1.x

Fixes Eugeny#50

This introduces an on-by-default `rs-crypto` flag, which enables the
existing Rust-based crypto libraries (including aes and ED25519).
However, these implementations can be removed by disabling the flag.
If it's disabled, then openssl (when turned on) will stand in for them,
in a less performant way.

Note that while OpenSSL 3.x does have some ED25519 support, I have not
done the work to make that compatible as well--partly because ED25519
is not yet an approved algorithm for my company to use, and partly to
retain compatibility with OpenSSL 1.x
@connor4312
Copy link
Contributor Author

I will fix up the build/tests in the morning, it's late here already (but it works!)

@Eugeny
Copy link
Owner

Eugeny commented Oct 14, 2022

👍 merge c1472f6 for CI setup

@connor4312
Copy link
Contributor Author

Hmm, not sure what's up with the build failure; that test works on my machine -- though later doctests fail since a lot of them show examples with ed25519 keys... Not sure whether I'll have time to dive into that more today or not

connor4312 added a commit to microsoft/vscode that referenced this pull request Oct 14, 2022
For compliance with SDL and MSFT crypto standards. Right now this uses
our forks of russh and secret-service. russh seems amenable to getting
this merged (Eugeny/russh#52) but TBD about
the secret-service crate.

Fixes microsoft/vscode-internalbacklog#3158
@Eugeny
Copy link
Owner

Eugeny commented Oct 17, 2022

No worries and no rush

lemanschik pushed a commit to code-oss-dev/code that referenced this pull request Nov 25, 2022
For compliance with SDL and MSFT crypto standards. Right now this uses
our forks of russh and secret-service. russh seems amenable to getting
this merged (Eugeny/russh#52) but TBD about
the secret-service crate.

Fixes microsoft/vscode-internalbacklog#3158
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

FIPS "OpenSSL only" mode
2 participants