mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
crypto/tls: fix client certificates support for legacy servers
signatureSchemesForCertificate was written to be used with TLS 1.3, but ended up used for TLS 1.2 client certificates in a refactor. Since it only supported TLS 1.3 signature algorithms, it would lead to no RSA client certificates being sent to servers that didn't support RSA-PSS. TestHandshakeClientCertRSAPKCS1v15 was testing *specifically* for this, but alas the OpenSSL flag -verify accepts an empty certificates list as valid, as opposed to -Verify... Fixes #28925 Change-Id: I61afc02ca501d3d64ab4ad77bbb4cf10931e6f93 Reviewed-on: https://go-review.googlesource.com/c/151660 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
6571d32361
commit
daa7ff8195
10 changed files with 298 additions and 142 deletions
|
@ -124,9 +124,8 @@ func (o *opensslOutputSink) Write(data []byte) (n int, err error) {
|
|||
return len(data), nil
|
||||
}
|
||||
|
||||
func (o *opensslOutputSink) WriteTo(w io.Writer) (int64, error) {
|
||||
n, err := w.Write(o.all)
|
||||
return int64(n), err
|
||||
func (o *opensslOutputSink) String() string {
|
||||
return string(o.all)
|
||||
}
|
||||
|
||||
// clientTest represents a test of the TLS client handshake against a reference
|
||||
|
@ -275,9 +274,9 @@ func (test *clientTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
|||
}
|
||||
if err != nil {
|
||||
close(stdin)
|
||||
out.WriteTo(os.Stdout)
|
||||
cmd.Process.Kill()
|
||||
return nil, nil, nil, nil, cmd.Wait()
|
||||
err = fmt.Errorf("error connecting to the OpenSSL server: %v (%v)\n\n%s", err, cmd.Wait(), out)
|
||||
return nil, nil, nil, nil, err
|
||||
}
|
||||
|
||||
record := &recordingConn{
|
||||
|
@ -316,11 +315,20 @@ func (test *clientTest) run(t *testing.T, write bool) {
|
|||
t.Fatalf("Failed to start subcommand: %s", err)
|
||||
}
|
||||
clientConn = recordingConn
|
||||
defer func() {
|
||||
if t.Failed() {
|
||||
t.Logf("OpenSSL output:\n\n%s", stdout.all)
|
||||
}
|
||||
}()
|
||||
} else {
|
||||
clientConn, serverConn = localPipe(t)
|
||||
}
|
||||
|
||||
doneChan := make(chan bool)
|
||||
defer func() {
|
||||
clientConn.Close()
|
||||
<-doneChan
|
||||
}()
|
||||
go func() {
|
||||
defer close(doneChan)
|
||||
|
||||
|
@ -488,11 +496,10 @@ func (test *clientTest) run(t *testing.T, write bool) {
|
|||
childProcess.Process.Kill()
|
||||
childProcess.Wait()
|
||||
if len(recordingConn.flows) < 3 {
|
||||
os.Stdout.Write(stdout.all)
|
||||
t.Fatalf("Client connection didn't work")
|
||||
}
|
||||
recordingConn.WriteTo(out)
|
||||
fmt.Printf("Wrote %s\n", path)
|
||||
t.Logf("Wrote %s\n", path)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -745,7 +752,7 @@ func TestHandshakeClientCertRSA(t *testing.T) {
|
|||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-RSA-RSA",
|
||||
args: []string{"-cipher", "AES128", "-verify", "1"},
|
||||
args: []string{"-cipher", "AES128", "-Verify", "1"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -754,7 +761,7 @@ func TestHandshakeClientCertRSA(t *testing.T) {
|
|||
|
||||
test = &clientTest{
|
||||
name: "ClientCert-RSA-ECDSA",
|
||||
args: []string{"-cipher", "ECDHE-ECDSA-AES128-SHA", "-verify", "1"},
|
||||
args: []string{"-cipher", "ECDHE-ECDSA-AES128-SHA", "-Verify", "1"},
|
||||
config: config,
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
|
@ -766,7 +773,7 @@ func TestHandshakeClientCertRSA(t *testing.T) {
|
|||
|
||||
test = &clientTest{
|
||||
name: "ClientCert-RSA-AES256-GCM-SHA384",
|
||||
args: []string{"-cipher", "ECDHE-RSA-AES256-GCM-SHA384", "-verify", "1"},
|
||||
args: []string{"-cipher", "ECDHE-RSA-AES256-GCM-SHA384", "-Verify", "1"},
|
||||
config: config,
|
||||
cert: testRSACertificate,
|
||||
key: testRSAPrivateKey,
|
||||
|
@ -782,7 +789,7 @@ func TestHandshakeClientCertECDSA(t *testing.T) {
|
|||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-ECDSA-RSA",
|
||||
args: []string{"-cipher", "AES128", "-verify", "1"},
|
||||
args: []string{"-cipher", "AES128", "-Verify", "1"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -792,7 +799,7 @@ func TestHandshakeClientCertECDSA(t *testing.T) {
|
|||
|
||||
test = &clientTest{
|
||||
name: "ClientCert-ECDSA-ECDSA",
|
||||
args: []string{"-cipher", "ECDHE-ECDSA-AES128-SHA", "-verify", "1"},
|
||||
args: []string{"-cipher", "ECDHE-ECDSA-AES128-SHA", "-Verify", "1"},
|
||||
config: config,
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
|
@ -822,7 +829,7 @@ func TestHandshakeClientCertRSAPSS(t *testing.T) {
|
|||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-RSA-RSAPSS",
|
||||
args: []string{"-cipher", "AES128", "-verify", "1", "-client_sigalgs",
|
||||
args: []string{"-cipher", "AES128", "-Verify", "1", "-client_sigalgs",
|
||||
"rsa_pss_rsae_sha256", "-sigalgs", "rsa_pss_rsae_sha256"},
|
||||
config: config,
|
||||
cert: testRSAPSSCertificate,
|
||||
|
@ -840,7 +847,7 @@ func TestHandshakeClientCertRSAPKCS1v15(t *testing.T) {
|
|||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-RSA-RSAPKCS1v15",
|
||||
args: []string{"-cipher", "AES128", "-verify", "1", "-client_sigalgs",
|
||||
args: []string{"-cipher", "AES128", "-Verify", "1", "-client_sigalgs",
|
||||
"rsa_pkcs1_sha256", "-sigalgs", "rsa_pkcs1_sha256"},
|
||||
config: config,
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue