Make parsing of ServerKeyExchange work for D(TLS) < 1.2.

Now we only parse the SignatureAndHashalgorithm field in cases where it
is present. This change also takes care to respect SCTs, which do
include the SignatureAndHashalgorithm in their digitally-signed struct,
even when used in protocol versions that do not have the
SignatureAndHashalgorithm in the protocols digitally-signed struct.

I also added tests to make sure this does indeed work with TLS 1.1 - it
turns out that so far we did not have a single TLS 1.1 pcap.
This commit is contained in:
Johanna Amann 2017-11-30 12:18:14 -08:00
parent fdf8717588
commit 94f55532f2
18 changed files with 163 additions and 17 deletions

View file

@ -7,3 +7,9 @@ Verify of, Google 'Aviator' log, T
Bad verify of, Google 'Aviator' log, F
Verify of, Google 'Rocketeer' log, T
Bad verify of, Google 'Rocketeer' log, F
0, Google 'Rocketeer' log, 1509548284.428, [HashAlgorithm=4, SignatureAlgorithm=3]
0, Symantec log, 1509548284.713, [HashAlgorithm=4, SignatureAlgorithm=3]
Verify of, Google 'Rocketeer' log, T
Bad verify of, Google 'Rocketeer' log, F
Verify of, Symantec log, T
Bad verify of, Symantec log, F