mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
crypto/tls: add support for Ed25519 certificates in TLS 1.2 and 1.3
Support for Ed25519 certificates was added in CL 175478, this wires them up into the TLS stack according to RFC 8422 (TLS 1.2) and RFC 8446 (TLS 1.3). RFC 8422 also specifies support for TLS 1.0 and 1.1, and I initially implemented that, but even OpenSSL doesn't take the complexity, so I just dropped it. It would have required keeping a buffer of the handshake transcript in order to do the direct Ed25519 signatures. We effectively need to support TLS 1.2 because it shares ClientHello signature algorithms with TLS 1.3. While at it, reordered the advertised signature algorithms in the rough order we would want to use them, also based on what curves have fast constant-time implementations. Client and client auth tests changed because of the change in advertised signature algorithms in ClientHello and CertificateRequest. Fixes #25355 Change-Id: I9fdd839afde4fd6b13fcbc5cc7017fd8c35085ee Reviewed-on: https://go-review.googlesource.com/c/go/+/177698 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
6c11745f0b
commit
28958b0da6
84 changed files with 4977 additions and 3938 deletions
|
@ -6,7 +6,6 @@ package tls
|
|||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/ecdsa"
|
||||
"crypto/rsa"
|
||||
"crypto/x509"
|
||||
"encoding/base64"
|
||||
|
@ -142,7 +141,7 @@ type clientTest struct {
|
|||
// cert, if not empty, contains a DER-encoded certificate for the
|
||||
// reference server.
|
||||
cert []byte
|
||||
// key, if not nil, contains either a *rsa.PrivateKey or
|
||||
// key, if not nil, contains either a *rsa.PrivateKey, ed25519.PrivateKey or
|
||||
// *ecdsa.PrivateKey which is the private key for the reference server.
|
||||
key interface{}
|
||||
// extensions, if not nil, contains a list of extension data to be returned
|
||||
|
@ -185,25 +184,13 @@ func (test *clientTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
|||
if test.key != nil {
|
||||
key = test.key
|
||||
}
|
||||
var pemType string
|
||||
var derBytes []byte
|
||||
switch key := key.(type) {
|
||||
case *rsa.PrivateKey:
|
||||
pemType = "RSA"
|
||||
derBytes = x509.MarshalPKCS1PrivateKey(key)
|
||||
case *ecdsa.PrivateKey:
|
||||
pemType = "EC"
|
||||
var err error
|
||||
derBytes, err = x509.MarshalECPrivateKey(key)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
default:
|
||||
panic("unknown key type")
|
||||
derBytes, err := x509.MarshalPKCS8PrivateKey(key)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
|
||||
var pemOut bytes.Buffer
|
||||
pem.Encode(&pemOut, &pem.Block{Type: pemType + " PRIVATE KEY", Bytes: derBytes})
|
||||
pem.Encode(&pemOut, &pem.Block{Type: "PRIVATE KEY", Bytes: derBytes})
|
||||
|
||||
keyPath := tempFile(pemOut.String())
|
||||
defer os.Remove(keyPath)
|
||||
|
@ -745,6 +732,29 @@ func TestHandshakeClientECDSATLS13(t *testing.T) {
|
|||
runClientTestTLS13(t, test)
|
||||
}
|
||||
|
||||
func TestHandshakeClientEd25519(t *testing.T) {
|
||||
test := &clientTest{
|
||||
name: "Ed25519",
|
||||
cert: testEd25519Certificate,
|
||||
key: testEd25519PrivateKey,
|
||||
}
|
||||
runClientTestTLS12(t, test)
|
||||
runClientTestTLS13(t, test)
|
||||
|
||||
config := testConfig.Clone()
|
||||
cert, _ := X509KeyPair([]byte(clientEd25519CertificatePEM), []byte(clientEd25519KeyPEM))
|
||||
config.Certificates = []Certificate{cert}
|
||||
|
||||
test = &clientTest{
|
||||
name: "ClientCert-Ed25519",
|
||||
args: []string{"-Verify", "1"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
runClientTestTLS12(t, test)
|
||||
runClientTestTLS13(t, test)
|
||||
}
|
||||
|
||||
func TestHandshakeClientCertRSA(t *testing.T) {
|
||||
config := testConfig.Clone()
|
||||
cert, _ := X509KeyPair([]byte(clientCertificatePEM), []byte(clientKeyPEM))
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue