]> Cypherpunks repositories - gostls13.git/commit
crypto/x509: CertificateRequest signature verification
authorPaul van Brouwershaven <paul@vanbrouwershaven.com>
Wed, 11 Mar 2015 07:15:23 +0000 (08:15 +0100)
committerAdam Langley <agl@golang.org>
Sun, 26 Apr 2015 21:07:10 +0000 (21:07 +0000)
commit54bb4b9fd771f793c623e82afcb769068736495a
tree11dcbac41883706b486c983468b01f601689a451
parentbff1417543c42af214837a87048b7bdb69e34df3
crypto/x509: CertificateRequest signature verification

This implements a method for x509.CertificateRequest to prevent
certain attacks and to allow a CA/RA to properly check the validity
of the binding between an end entity and a key pair, to prove that
it has possession of (i.e., is able to use) the private key
corresponding to the public key for which a certificate is requested.

RFC 2986 section 3 states:

"A certification authority fulfills the request by authenticating the
requesting entity and verifying the entity's signature, and, if the
request is valid, constructing an X.509 certificate from the
distinguished name and public key, the issuer name, and the
certification authority's choice of serial number, validity period,
and signature algorithm."

Change-Id: I37795c3b1dfdfdd455d870e499b63885eb9bda4f
Reviewed-on: https://go-review.googlesource.com/7371
Reviewed-by: Adam Langley <agl@golang.org>
src/crypto/x509/x509.go
src/crypto/x509/x509_test.go