Enable certificate signatures using ECDSA with the secp256k1 curve#405
Enable certificate signatures using ECDSA with the secp256k1 curve#405mkmks wants to merge 1 commit intorustls:mainfrom
Conversation
|
Without this change, is it still possible to generate secp256k1 certificates with rcgen? If so, how much boilerplate is there? |
|
I could try creating an ECDSA/secpk256k1 I can see that having to modify Still, being able to use arbitrary signature algorithms already supported by the underlying cryptographic libraries anywhere seems not to be unreasonable. OpenSSL and its forks do allow it, after all (although by the virtue of developing the cryptography, the PKI and the TLS implementations in the same project). |
|
I think you could just implement |
|
@djc So, I've tried implementing Implementing Implementing It makes sense to me that these types aren't public in The solution that I'd take would be to simply add another Would it be preferable to open another PR that would change the visibility of P.S. I've also just noticed that b370764 exposes signing algorithms already implemented in |
|
I think we should open up Right now I'm swamped and won't have time to do that investigation soon. |
This PR adds ECSDA with secp256k1 to the list of allowed certificate signature algorithms. The use case for it is explained in rustls/pki-types#96.
While it was pointed out in the discussion under the related rustls/webpki#427 PR that the secp256k1 curve isn't mentioned in any standardised TLS version,
rcgenis meant to be a certificate generation library agnostic to the use of certificates generated with it. X.509 certificates aren't only used in TLS, so, perhaps, the same argument won't hold here.For comparison, OpenSSL and its forks do support signing certificates with ECDSA using the secp256k1 curve. It'd be nice to be able to do the same with
rcgen.This PR also happens to fix #400 (since it requires the
aws_lc_rsfeature), or so it seems to its author.