Integrated: 8355779: When no "signature_algorithms_cert" extension is present we do not apply certificate scope constraints to algorithms in "signature_algorithms" extension

Artur Barashev abarashev at openjdk.org
Thu May 1 13:11:52 UTC 2025


On Mon, 28 Apr 2025 21:31:49 GMT, Artur Barashev <abarashev at openjdk.org> wrote:

> Per TLSv1.3 RFC:
> 
> 
>    If no "signature_algorithms_cert" extension is
>    present, then the "signature_algorithms" extension also applies to
>    signatures appearing in certificates.
> 
> 
> When no "signature_algorithms_cert" extension is present in ClientHello we simply copy "signature_algorithms" extension algorithms already filtered with HANDSHAKE_SCOPE to `peerRequestedCertSignSchemes`. Instead we should filter "signature_algorithms" extension algorithms with CERTIFICATE_SCOPE as certain algorithms are allowed to be used in certificate signatures but not in handshake signatures.

This pull request has now been integrated.

Changeset: 34807df7
Author:    Artur Barashev <abarashev at openjdk.org>
Committer: Sean Mullan <mullan at openjdk.org>
URL:       https://git.openjdk.org/jdk/commit/34807df7627b067f750578987c941213a5f8336a
Stats:     95 lines in 1 file changed: 47 ins; 44 del; 4 mod

8355779: When no "signature_algorithms_cert" extension is present we do not apply certificate scope constraints to algorithms in "signature_algorithms" extension

Reviewed-by: mullan

-------------

PR: https://git.openjdk.org/jdk/pull/24939


More information about the security-dev mailing list