-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle verification of keys using elliptic curve #132
Conversation
ccb7c66
to
0b26c26
Compare
Thank you very much 🎉
This is going in the right direction! However, I wanted to use Would that be acceptable on you side? ( I read the issue on |
I kinda imagined that :) I started to use If you want, I have another branch that builds on top of ring-compat. This however would bring I know Right now I need p384 support, because this what Fulcio (a project part of sigstore) uses. If you are really against using What do you think? |
Hello @flavio; I resolved an issue in the CI that prevented checks from running on your branch. If you rebase on master the build should now run (tests are failing but I see from your OP that you haven't touched that side yet). Thank you for your contribution. |
Thank you for the insight! I think it's good to use |
Thanks, I'll go ahead with this PR and look into the unit tests |
This commit introduces support for handling certificates using elliptic curve public keys. The implementation relies on the `ring` crate, which currently is the only one capable of supporting both ECDSA p256 and ECDSA p384. Signed-off-by: Flavio Castelli <[email protected]>
@thenextman, @CBenoit: I've forcefully pushed. The code now handles both signature creation and verification using ECDSA keys. The unit tests have been extended too, I hope you won't mind the new All the unit tests are green on my machine, clippy is happy too. Some details:
Thanks again for your prompt and welcoming responses! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Very high quality pull request, thank you!
Introduction of rstest
is much welcomed. I just didn't know about it yet. :)
CI shows that some code is still failing to compile behind a feature gate. It's not a big deal so I sent a patch directly since you allowed maintainer modifications.
I'll merge and release next version tomorrow 🎉
By the way, next version will be a candidate release, just to see if there is additional breaking changes before committing to picky 7.x. Would it cause any issue on your side?
Sorry, I didn't notice that while testing locally. Thanks for having fixed it!
That's fantastic news 👏 |
This PR introduces support for handling certificates using elliptic curve public keys.
Only signature verification is currently implemented.Update: Both signature creation and verification are supported.
The implementation relies on the
ring
crate, which currently is the only one capable of supporting both ECDSA p256 and ECDSA p384.I haven't yet extended the unit tests. I'm looking forward to hear your feedback about this contribution. I think this is something you're interested about (see #100). I wonder if this is going in the direction you like.Update: The unit tests have been extended too