mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
[dev.boringcrypto] all: merge master into dev.boringcrypto
Updated TestBoringServerSignatureAndHash to expect RSA-PSS to work with TLS 1.2, and hence with FIPS mode. Change-Id: I358271b2e4804733cf61dc132fa0c5f39c2bff19
This commit is contained in:
commit
0f829ed5f4
36 changed files with 1813 additions and 1356 deletions
|
@ -365,16 +365,13 @@ func (hs *serverHandshakeStateTLS13) pickCertificate() error {
|
|||
return c.sendAlert(alertMissingExtension)
|
||||
}
|
||||
|
||||
// This implements a very simplistic certificate selection strategy for now:
|
||||
// getCertificate delegates to the application Config.GetCertificate, or
|
||||
// selects based on the server_name only. If the selected certificate's
|
||||
// public key does not match the client signature_algorithms, the handshake
|
||||
// is aborted. No attention is given to signature_algorithms_cert, and it is
|
||||
// not passed to the application Config.GetCertificate. This will need to
|
||||
// improve according to RFC 8446, sections 4.4.2.2 and 4.2.3.
|
||||
certificate, err := c.config.getCertificate(clientHelloInfo(c, hs.clientHello))
|
||||
if err != nil {
|
||||
c.sendAlert(alertInternalError)
|
||||
if err == errNoCertificates {
|
||||
c.sendAlert(alertUnrecognizedName)
|
||||
} else {
|
||||
c.sendAlert(alertInternalError)
|
||||
}
|
||||
return err
|
||||
}
|
||||
hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue