Use appropriate digest algorithm during signature creation#97
Open
oncilla wants to merge 1 commit intogithub:mainfrom
Open
Use appropriate digest algorithm during signature creation#97oncilla wants to merge 1 commit intogithub:mainfrom
oncilla wants to merge 1 commit intogithub:mainfrom
Conversation
Pass the public key instead of the marshalled public key to `digestAlgorithmForPublicKey` in `SignedData.AddSignerInfo`. Previously, the marshalled public key was passed instead of the actual public key. The result is that always SHA256 was being selected, even for ECDSA where the hash algorithm should be selected based on the curve.
Author
|
Hi @lgarron What can I do to move this forward? |
Contributor
|
I'm not qualified to review this, but @vcsjones may be! |
Member
|
I see: smimesign/ietf-cms/protocol/protocol.go Lines 755 to 766 in e650daf Since we're passing in something that is not an I think this change looks good, but it would be great to get some test coverage that indeed the right digest algorithm is used for the curve. Would you be able to add some test coverage for this, @oncilla? |
vcsjones
requested changes
Nov 16, 2021
Member
vcsjones
left a comment
There was a problem hiding this comment.
Changes look reasonable as I previously mentioned, but hoping we can get some test coverage for this.
Author
|
@vcsjones sure. I will have look tomorrow |
Lukirsvrs
approved these changes
Dec 13, 2021
oncilla
added a commit
to oncilla/scion
that referenced
this pull request
Jun 17, 2025
Mirror of github/smimesign#97 Pass the public key instead of the marshalled public key to digestAlgorithmForPublicKey in SignedData.AddSignerInfo. Previously, the marshalled public key was passed instead of the actual public key. The result is that always SHA256 was being selected, even for ECDSA where the hash algorithm should be selected based on the curve.
oncilla
added a commit
to Anapaya/os-scion
that referenced
this pull request
Jun 17, 2025
Mirror of github/smimesign#97 Pass the public key instead of the marshalled public key to digestAlgorithmForPublicKey in SignedData.AddSignerInfo. Previously, the marshalled public key was passed instead of the actual public key. The result is that always SHA256 was being selected, even for ECDSA where the hash algorithm should be selected based on the curve.
oncilla
added a commit
to scionproto/scion
that referenced
this pull request
Jul 3, 2025
…#4785) Mirror of github/smimesign#97 Pass the public key instead of the marshalled public key to digestAlgorithmForPublicKey in SignedData.AddSignerInfo. Previously, the marshalled public key was passed instead of the actual public key. The result is that always SHA256 was being selected, even for ECDSA where the hash algorithm should be selected based on the curve.
oncilla
added a commit
to Anapaya/os-scion
that referenced
this pull request
Aug 26, 2025
Mirror of github/smimesign#97 Pass the public key instead of the marshalled public key to digestAlgorithmForPublicKey in SignedData.AddSignerInfo. Previously, the marshalled public key was passed instead of the actual public key. The result is that always SHA256 was being selected, even for ECDSA where the hash algorithm should be selected based on the curve.
oncilla
added a commit
to Anapaya/os-scion
that referenced
this pull request
Aug 27, 2025
…reation Mirror of github/smimesign#97 Pass the public key instead of the marshalled public key to digestAlgorithmForPublicKey in SignedData.AddSignerInfo. Previously, the marshalled public key was passed instead of the actual public key. The result is that always SHA256 was being selected, even for ECDSA where the hash algorithm should be selected based on the curve.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Pass the public key instead of the marshalled public key to
digestAlgorithmForPublicKeyinSignedData.AddSignerInfo.Previously, the marshalled public key was passed instead of the actual
public key. The result is that always SHA256 was being selected, even
for ECDSA where the hash algorithm should be selected based on the curve.