]> git.ipfire.org Git - thirdparty/openssl.git/commit
Fix sigalg corner cases
authorViktor Dukhovni <openssl-users@dukhovni.org>
Wed, 26 Mar 2025 10:36:08 +0000 (21:36 +1100)
committerTomas Mraz <tomas@openssl.org>
Mon, 31 Mar 2025 12:07:56 +0000 (14:07 +0200)
commita5f98e6da521934455898d49c8b2152a60b46925
tree4c470ac5cbba5c82e712e84b51dd04a013d884c6
parentea77608920e88812a5278be351e3ebbfdb81d992
Fix sigalg corner cases

- Tolerate RSA PKCS#1 *certificate* signatures when
  the peer sigals include RSA PSS with the same digest.

  Now that we're more strict about not sending sigalgs that are out of
  protocol range, when the client supports TLS 1.3 only, we might refuse
  to return an RSA PKCS#1-signed cert.

- Don't send TLS 1.3 sigalgs when requesting client certs from
  a TLS 1.2 client.

Fixes: #1144
Fixes: #25277
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27166)
ssl/ssl_local.h
ssl/statem/extensions_clnt.c
ssl/t1_lib.c
test/certs/p256-ee-rsa-ca-cert.pem [new file with mode: 0644]
test/certs/p256-ee-rsa-ca-key.pem [new file with mode: 0644]
test/certs/setup.sh
test/recipes/75-test_quicapi_data/ssltraceref-zlib.txt
test/recipes/75-test_quicapi_data/ssltraceref.txt
test/recipes/95-test_external_tlsfuzzer_data/cert.json.in
test/sslapitest.c