-
Notifications
You must be signed in to change notification settings - Fork 6.2k
8355779: When no "signature_algorithms_cert" extension is present we do not apply certificate scope constraints to algorithms in "signature_algorithms" extension #24939
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…do not apply certificate scope constraints to algorithms in "signature_algorithms" extension
|
👋 Welcome back abarashev! A progress list of the required criteria for merging this PR into |
|
@artur-oracle This change now passes all automated pre-integration checks. ℹ️ This project also has non-automated pre-integration requirements. Please see the file CONTRIBUTING.md for details. After integration, the commit message for the final commit will be: You can use pull request commands such as /summary, /contributor and /issue to adjust it as needed. At the time when this comment was updated there had been 220 new commits pushed to the
As there are no conflicts, your changes will automatically be rebased on top of these commits when integrating. If you prefer to avoid this automatic rebasing, please check the documentation for the /integrate command for further details. As you do not have Committer status in this project an existing Committer must agree to sponsor your change. Possible candidates are the reviewers of this PR (@seanjmullan) but any other Committer may sponsor as well. ➡️ To flag this PR as ready for integration with the above commit message, type |
|
@artur-oracle The following label will be automatically applied to this pull request:
When this pull request is ready to be reviewed, an "RFR" email will be sent to the corresponding mailing list. If you would like to change these labels, use the /label pull request command. |
Webrevs
|
|
/integrate |
|
@artur-oracle |
|
/integrate |
|
@seanjmullan Only the author (@artur-oracle) is allowed to issue the |
|
/sponsor |
|
Going to push as commit 34807df.
Your commit was automatically rebased without conflicts. |
|
@seanjmullan @artur-oracle Pushed as commit 34807df. 💡 You may see a message that your pull request was closed with unmerged commits. This can be safely ignored. |
Per TLSv1.3 RFC:
When no "signature_algorithms_cert" extension is present in ClientHello we simply copy "signature_algorithms" extension algorithms already filtered with HANDSHAKE_SCOPE to
peerRequestedCertSignSchemes. Instead we should filter "signature_algorithms" extension algorithms with CERTIFICATE_SCOPE as certain algorithms are allowed to be used in certificate signatures but not in handshake signatures.Progress
Issue
Reviewers
Reviewing
Using
gitCheckout this PR locally:
$ git fetch https://git.openjdk.org/jdk.git pull/24939/head:pull/24939$ git checkout pull/24939Update a local copy of the PR:
$ git checkout pull/24939$ git pull https://git.openjdk.org/jdk.git pull/24939/headUsing Skara CLI tools
Checkout this PR locally:
$ git pr checkout 24939View PR using the GUI difftool:
$ git pr show -t 24939Using diff file
Download this PR as a diff file:
https://git.openjdk.org/jdk/pull/24939.diff
Using Webrev
Link to Webrev Comment