Skip to content

Fix to GenerateChallenge #24

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Mar 12, 2019
Merged

Conversation

DenisKarch
Copy link
Collaborator

crypto/x509 now enforces that rsa public keys must have NULL parameters.
The old hack no longer solves the issue and instead will silently fail when
parsing the key, ultimately causing a null pointer dereference at
(pubkey := cert.PublicKey.(*rsa.PublicKey)).
Currently working with crypto/x509 to add support for RSAES-OAEP keys
golang/go#30416

@ericchiang
Copy link
Contributor

Wait, this change was made in certificate transparency, not in crypto/x509 google/certificate-transparency-go#470

To use this in go-tspi, we need to use that package right?

@DenisKarch DenisKarch force-pushed the verification branch 2 times, most recently from a0f31c2 to 09510bf Compare March 12, 2019 21:59
crypto/x509 now enforces that rsa public keys must have NULL parameters.
The old fix no longer solves the issue and instead will silently fail when
parsing the key, ultimately causing a null pointer dereference at
(pubkey := cert.PublicKey.(*rsa.PublicKey)).
Currently working with crypto/x509 to add support for RSAES-OAEP keys
golang/go#30416

certificate-transparency-go have accepted a temporary fix to /x509
google/certificate-transparency-go#470
so we will be building against them for the time being.
@DenisKarch
Copy link
Collaborator Author

Yep, changed the import to build against google/certificate-transparency-go/x509 instead

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants