RFR: 8355779: When no "signature_algorithms_cert" extension is present we do not apply certificate scope constraints to algorithms in "signature_algorithms" extension [v2]

Artur Barashev abarashev at openjdk.org
Mon Apr 28 22:34:24 UTC 2025


> Per TLSv1.3 RFC:
> 
> 
>    If no "signature_algorithms_cert" extension is
>    present, then the "signature_algorithms" extension also applies to
>    signatures appearing in certificates.
> 
> 
> When no "signature_algorithms_cert" extension is present in ClientHello we simply copy "signature_algorithms" extension algorithms already filtered with HANDSHAKE_SCOPE to `peerRequestedCertSignSchemes`. Instead we should filter "signature_algorithms" extension algorithms with CERTIFICATE_SCOPE as certain algorithms are allowed to be used in certificate signatures but not in handshake signatures.

Artur Barashev has updated the pull request incrementally with one additional commit since the last revision:

  Take "signature_algorithms_cert" extension as parameter

-------------

Changes:
  - all: https://git.openjdk.org/jdk/pull/24939/files
  - new: https://git.openjdk.org/jdk/pull/24939/files/7d3b3eee..ae1b3060

Webrevs:
 - full: https://webrevs.openjdk.org/?repo=jdk&pr=24939&range=01
 - incr: https://webrevs.openjdk.org/?repo=jdk&pr=24939&range=00-01

  Stats: 8 lines in 1 file changed: 3 ins; 0 del; 5 mod
  Patch: https://git.openjdk.org/jdk/pull/24939.diff
  Fetch: git fetch https://git.openjdk.org/jdk.git pull/24939/head:pull/24939

PR: https://git.openjdk.org/jdk/pull/24939


More information about the security-dev mailing list