You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The issue is that golang, starting with 1.10, now enforces that the algorithm passed in to Certificate.CheckSignature matches the algorithm in the the public key (see golang/go@083ad28). This is causing hashicorp/vault#4014 as the PKCS7 identity document uses DSA signatures.
The text was updated successfully, but these errors were encountered:
I'm reopening this issue since #27 and #28 don't fix the problem generally, only the issue with AWS identity documents, these are failing in TestVerifyEC2 in Go 1.10. I'm working on a fix that doesn't also break TestSign
Since Go 1.10, the SignatureAlgorithm is now validated against the public key type. It was "working" before because the Amazon key used DSA with SHA1, and so the RSA/DSA mismatch didn't matter since the SHA1 hash type did.
This uses some unexported code from `crypto/x509` that looks up a signature algorithm for a given `pxix.AlgorithmIdentifier`
Fixesfullsailor#27Fixesfullsailor#28Fixesfullsailor#29
I'm pretty sure this is the culprit:
pkcs7/pkcs7.go
Line 257 in a009d8d
The issue is that golang, starting with 1.10, now enforces that the algorithm passed in to
Certificate.CheckSignature
matches the algorithm in the the public key (see golang/go@083ad28). This is causing hashicorp/vault#4014 as the PKCS7 identity document uses DSA signatures.The text was updated successfully, but these errors were encountered: