mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
crypto/tls: advertise and accept rsa_pss_rsae signature algorithms
crypto/x509 already supports PSS signatures (with rsaEncryption OID), and crypto/tls support was added in CL 79736. Advertise support for the algorithms and accept them as a peer. Note that this is about PSS signatures from regular RSA public keys. RSA-PSS only public keys (with RSASSA-PSS OID) are supported in neither crypto/tls nor crypto/x509. See RFC 8446, Section 4.2.3. testdata/Server-TLSv12-ClientAuthRequested* got modified because the CertificateRequest carries the supported signature algorithms. The net/smtp tests changed because 512 bits keys are too small for PSS. Based on Peter Wu's CL 79738, who did all the actual work in CL 79736. Updates #9671 Change-Id: I4a31e9c6e152ff4c50a5c8a274edd610d5fff231 Reviewed-on: https://go-review.googlesource.com/c/146258 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
6d1d147e90
commit
ed74f7823e
12 changed files with 766 additions and 131 deletions
|
@ -668,6 +668,51 @@ func TestHandshakeClientCertECDSA(t *testing.T) {
|
|||
runClientTestTLS12(t, test)
|
||||
}
|
||||
|
||||
// TestHandshakeClientCertRSAPSS tests a few separate things:
|
||||
// * that our client can serve a PSS-signed certificate
|
||||
// * that our client can validate a PSS-signed certificate
|
||||
// * that our client can use rsa_pss_rsae_sha256 in its CertificateVerify
|
||||
// * that our client can accpet rsa_pss_rsae_sha256 in the server CertificateVerify
|
||||
func TestHandshakeClientCertRSAPSS(t *testing.T) {
|
||||
issuer, err := x509.ParseCertificate(testRSAPSSCertificate)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
rootCAs := x509.NewCertPool()
|
||||
rootCAs.AddCert(issuer)
|
||||
|
||||
config := testConfig.Clone()
|
||||
cert, _ := X509KeyPair([]byte(clientCertificatePEM), []byte(clientKeyPEM))
|
||||
config.Certificates = []Certificate{cert}
|
||||
config.RootCAs = rootCAs
|
||||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-RSA-RSAPSS",
|
||||
command: []string{"openssl", "s_server", "-cipher", "AES128", "-verify", "1",
|
||||
"-client_sigalgs", "rsa_pss_rsae_sha256", "-sigalgs", "rsa_pss_rsae_sha256"},
|
||||
config: config,
|
||||
cert: testRSAPSSCertificate,
|
||||
key: testRSAPrivateKey,
|
||||
}
|
||||
|
||||
runClientTestTLS12(t, test)
|
||||
}
|
||||
|
||||
func TestHandshakeClientCertRSAPKCS1v15(t *testing.T) {
|
||||
config := testConfig.Clone()
|
||||
cert, _ := X509KeyPair([]byte(clientCertificatePEM), []byte(clientKeyPEM))
|
||||
config.Certificates = []Certificate{cert}
|
||||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-RSA-RSAPKCS1v15",
|
||||
command: []string{"openssl", "s_server", "-cipher", "AES128", "-verify", "1",
|
||||
"-client_sigalgs", "rsa_pkcs1_sha256", "-sigalgs", "rsa_pkcs1_sha256"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
runClientTestTLS12(t, test)
|
||||
}
|
||||
|
||||
func TestClientResumption(t *testing.T) {
|
||||
serverConfig := &Config{
|
||||
CipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA},
|
||||
|
@ -1606,9 +1651,9 @@ func TestGetClientCertificate(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestRSAPSSKeyError(t *testing.T) {
|
||||
// crypto/tls does not support the rsa_pss_pss_xxx SignatureSchemes. If support for
|
||||
// crypto/tls does not support the rsa_pss_pss_* SignatureSchemes. If support for
|
||||
// public keys with OID RSASSA-PSS is added to crypto/x509, they will be misused with
|
||||
// the rsa_pss_rsae_xxx SignatureSchemes. Assert that RSASSA-PSS certificates don't
|
||||
// the rsa_pss_rsae_* SignatureSchemes. Assert that RSASSA-PSS certificates don't
|
||||
// parse, or that they don't carry *rsa.PublicKey keys.
|
||||
b, _ := pem.Decode([]byte(`
|
||||
-----BEGIN CERTIFICATE-----
|
||||
|
@ -1640,7 +1685,7 @@ RwBA9Xk1KBNF
|
|||
return
|
||||
}
|
||||
if _, ok := cert.PublicKey.(*rsa.PublicKey); ok {
|
||||
t.Error("A RSA-PSS certificate was parsed like a PKCS1 one, and it will be mistakenly used with rsa_pss_rsae_xxx signature algorithms")
|
||||
t.Error("A RSASSA-PSS certificate was parsed like a PKCS#1 v1.5 one, and it will be mistakenly used with rsa_pss_rsae_* signature algorithms")
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue