Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ssl: TLSv1.2: proper default sign algo for RSA #340

Closed

Conversation

stolen
Copy link
Contributor

@stolen stolen commented Apr 19, 2014

Select {sha, rsa} signature algorithm when TLSv1.2 client
does not send signature_algorithms extension and negotiates
RSA key exchange.
See RFC 5246 section 7.4.1.4.1 for details.

Also this change fixes badarg when server tried to use
md5sha combination as public_key:sign algo.

@OTP-Maintainer
Copy link

Patch has passed first testings and has been assigned to be reviewed

Negotiated version is now always passed to ssl_handshake:select_hashsign
because ssl_handshake:select_cert_hashsign has different rsa defaults on
tlsv1.2 and older versions.
@stolen
Copy link
Contributor Author

stolen commented Apr 21, 2014

I have updated the branch because first version was misbehaving when working over older protocol versions. Now it seems to be OK.

@OTP-Maintainer
Copy link

Patch has passed first testings and has been assigned to be reviewed

@IngelaAndin
Copy link
Contributor

It has been merged together with an additional commit to make the source of the default values occur only in one place in the code.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants