mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 04:27:36 +03:00
crypto/tls: take key size into account in signature algorithm selection
Fixes #29793 Change-Id: I6e389d166c2d9a2ba8664a41f4b9569f2481b27f Reviewed-on: https://go-review.googlesource.com/c/go/+/205177 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Katie Hockman <katie@golang.org>
This commit is contained in:
parent
cb4dd9fcb4
commit
aff697f53d
6 changed files with 71 additions and 146 deletions
|
@ -108,6 +108,8 @@ func TestSignatureSelection(t *testing.T) {
|
|||
{rsaCert, []SignatureScheme{PKCS1WithSHA256}, VersionTLS13},
|
||||
{pkcs1Cert, []SignatureScheme{PSSWithSHA256, PKCS1WithSHA256}, VersionTLS13},
|
||||
{ecdsaCert, []SignatureScheme{ECDSAWithSHA1}, VersionTLS13},
|
||||
// The key can be too small for the hash.
|
||||
{rsaCert, []SignatureScheme{PSSWithSHA512}, VersionTLS12},
|
||||
}
|
||||
|
||||
for testNo, test := range badTests {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue