Skip to content

Conversation

@tlhackque
Copy link

The OIDS for ecdsa-with-sha1, -recommended, and -sha2 are missing but seen in the wild. Might as well include in the default table. (It's always been possible to register them.)

Check for the case of Crypt::PK::EC->new dieing in subjectPublicKeyParams, which can happen if the module loads, but doesn't understand the key. Treat it the same way as if the module isn't present - return undef in the keytype for the caller to handle.

See The OID repository for the OID references.

I've also entered an issue for Crypt::PKI::ECC for a couple of missing curves that were involved in this change to PKCS10. (Keeping up with crypto is a full-time job - but not mine.)

It's better to handle this more gracefully.

The OIDS for ecdsa-with-sha1, recommended, and sha2 are missing
but seen in the wild.  Might as well include in the default
table.  (It's always been possible to register them)

Check for the case of Crypt::PK::EC->new dieing in
subjectPublicKeyParams, which can happen if the module loads,
but doesn't understand the key.  Treat it the same way as
if the module isn't present - return undef in the keytype
for the caller to handle.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant