CVSROOT:        /cvs
Module name:    src
Changes by:     t...@cvs.openbsd.org    2025/07/08 06:19:08

Modified files:
        usr.sbin/rpki-client: cert.c 

Log message:
rpki-client: more complete signature checks for certs

So far we relied on the X.509 verifier to check that the two
signature algorithm identifiers in a certificate are identical.
Let's do it ourselves since this is very cheap (in well-formed
certificates this is a few NULL checks plus comparing nid and
type).

An algorithm identifier contains an OID and optional parameters.
We've ignored the parameters so far, so let's check them. There is
some fun ASN.1 history here so there are two possible encodings
we need to accept for RSA, which is annoying. In fact, roughly
1600 ROAs issued by ARIN before end of 2020 have an EE cert with
incorrect encoding.

tweaks/ok job

Reply via email to