-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ECDSA support #196
ECDSA support #196
Conversation
6f2a74f
to
c47c9df
Compare
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
c47c9df
to
fd62d7c
Compare
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
a3c3556
to
d2ee9b1
Compare
2ccf74b
to
241cd1e
Compare
This comment has been minimized.
This comment has been minimized.
describe the planned behaviour
make sure that we have all the data at hand to select it and use it, make the selection of signature algorithm before the key exchange algorithm
if we want to change the key and certificate based on sigalgs, we need to pass them through the method that picks the signature
633de4a
to
2493373
Compare
This is the basic code to make it usable, but it's not really feature complete: certificate selection won't work in TLS 1.1 or earlier. It will give certificate with curve not supported by client. Those issues are tracked in #366 – fixing it would require significant reworking of negotiation and I'd rather close other outstanding PRs than work on polishing this stuff. Fixing #366 should make the code in While I did add configuration for virtual hosts, I didn't implement it, just provided a draft for the API. Continuation of that work is in #368. it is also pure-python, while we could use m2crypto to speed it up, this was moved to #367 |
tlslite/tlsconnection.py, line 3118 at r6 (raw file):
would it make sense to catch the exception? |
tlslite/x509.py, line 55 at r9 (raw file):
Is this needed? The documentation says that the default implementation diverts to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed 1 of 1 files at r1, 2 of 2 files at r2, 1 of 1 files at r3, 1 of 1 files at r4, 1 of 1 files at r5, 1 of 1 files at r6, 1 of 1 files at r7, 1 of 1 files at r8, 3 of 3 files at r9, 2 of 2 files at r10, 1 of 1 files at r11.
Reviewable status: all files reviewed, 2 unresolved discussions (waiting on @tomato42)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewable status: all files reviewed, 2 unresolved discussions (waiting on @ueno)
tlslite/tlsconnection.py, line 3118 at r6 (raw file):
Previously, ueno (Daiki Ueno) wrote…
would it make sense to catch the exception?
no, it was already validated as decodable before
tlslite/x509.py, line 55 at r9 (raw file):
Previously, ueno (Daiki Ueno) wrote…
Is this needed? The documentation says that the default implementation diverts to
__eq__
.
LGTM complained until I added them, maybe it's needed for earlier versions?
ecdsa_sign
in CertificateRequest (orrsa_sign
if we have a RSA certificate)fixes #52
merged as #359, #360, #361, #363
This change is