Ecosyste.ms: OpenCollective

An open API service for software projects hosted on Open Collective.

github.com/ooni/oocrypto

Fork of Go crypto/tls with extra patches from the OONI team
https://github.com/ooni/oocrypto

fix: ensure we can build and run tests

6ffddea0a4c8feaedf5617e4baaf3ded201c01ee authored over 2 years ago by Simone Basso <[email protected]>
Merge branch 'go1.18.2' into merged-main

I have manually inspected the newly added packages as specified
in the upgrade procedure and it ...

b78996b5b1fbfb059f525ed9b616b8346ac8c971 authored over 2 years ago by Simone Basso <[email protected]>
chore: prepare from merging go1.18.2 sources

2d2c983d9fa96dfdc7dd30a7b68ffe28a67b4436 authored over 2 years ago by Simone Basso <[email protected]>
doc: explain which packages we replaced

8581ebf3d67fe52a27b1c6e49aaf910f59e42bdb authored over 2 years ago by Simone Basso <[email protected]>
doc: better specify the update procedure

8508ab2647281a16cf70be464315e949029ad847 authored over 2 years ago by Simone Basso <[email protected]>
doc: make README.md more clear and informative

80c1f8470a62fd22504e7e4d0e839845c12ee4dc authored over 2 years ago by Simone Basso <[email protected]>
chore: add PATENTS file from Go repository

17c63a553bf429ae6075b45d6e2530ba70e39616 authored over 2 years ago by Simone Basso <[email protected]>
chore: add GPLv3 license text

b8425b3ccf471122823fe6be3aeb300093a162f2 authored over 2 years ago by Simone Basso <[email protected]>
feat(tls): use internal/cpuarm64 for arm64 builds

This diff modifies the selection logic for AES based algorithms
to use insights from the interna...

4dff9e0864cd49113a36ac8112cf887cbe215d54 authored over 2 years ago by Simone Basso <[email protected]>
feat(aes): use internal/cpuarm64 for arm64 HWCAP detection

This diff modifies aes code to use the cpuarm64 package instead
of using the golang.org/x/sys/cp...

99acbfae0037bdde17df1bc2cbf68a4ce0a1b6ed authored over 2 years ago by Simone Basso <[email protected]>
feat(internal/cpuarm64): better HWCAP accessor for android/arm64

This diff pulls code from https://go-review.googlesource.com/c/sys/+/197540/
to add better suppo...

58b6ccb6a0a8ced62113a497e4aa93657467b544 authored over 2 years ago by Simone Basso <[email protected]>
doc: clarify the intended usage of this library

Additionally, be slightly more precise with respect to the Go source
code license and add a link...

f09fe46bcb80d2e747b0c0ea9a2835e70710690c authored over 2 years ago by Simone Basso <[email protected]>
fix: delete tls/example_test.go which is not easy to support

I do not currently see a toil-free way of supporting using the TLS config
defined in the standar...

d9dda02702244c0599f3cd19d070882e332bc63a authored over 2 years ago by Simone Basso <[email protected]>
fix(go.mod): run go mod tidy

32aa095615ce80ef95435ee987f5a22c43f58934 authored over 2 years ago by Simone Basso <[email protected]>
fix: redirect imports to this module

We don't want to import from a standard library package if we have
an equivalent package inside ...

d5122e62c26050d5378a200818da53a48d419156 authored over 2 years ago by Simone Basso <[email protected]>
fix: delete unused internal/randutil package

614b03d87b50b35e44b2860d70d193d2454e6834 authored over 2 years ago by Simone Basso <[email protected]>
doc(README.md): additional update/upgrade steps

a60493437d6c1dd26f8434a96d0d9b672f3cd658 authored over 2 years ago by Simone Basso <[email protected]>
fix: delete additional files we should not keep

35b7a0e583557dce16ee7bae1634163fa05b9fdf authored over 2 years ago by Simone Basso <[email protected]>
fix(README.md): correct a typo

1d8a66af050da57ce9bae90b1402f04c3e0098d9 authored over 2 years ago by Simone Basso <[email protected]>
chore: make sure we can build and test the code

1. replace the dependency on `internal/cpu` with the equivalent
package inside of `golang.org/x/...

5c7021b10f2d2c142d627962010577c7383cf0fe authored over 2 years ago by Simone Basso <[email protected]>
chore: delete all the packages we can safely delete

A new task inside README.md explains what are the criteria to
determine whether we can safely de...

493dfef62faf9101d0b3beda66ad7f444b92fc46 authored over 2 years ago by Simone Basso <[email protected]>
chore: add go.mod and go.sum files

cfe9e2d7cc835ee5606476e422cb5e0d5e12759a authored over 2 years ago by Simone Basso <[email protected]>
Merge branch 'merged-main-go1.17.10' into main

This commit merges go1.17.10 unmodified src/crypto's subtree into
the main branch of this reposi...

1137f34fc78f7b5165a37f290e0b1c5e2fb074ac authored over 2 years ago by Simone Basso <[email protected]>
Merge branch 'go1.17.10' into merged-main

1b70c95cbae33f09c4a6c0df7c72abd7b8c59541 authored over 2 years ago by Simone Basso <[email protected]>
chore: adapt README.md from ooni/oohttp

3162d129940f923a65542687821a5c9f26fd4365 authored over 2 years ago by Simone Basso <[email protected]>
all: gofmt main repo

Excluding vendor and testdata.
CL 384268 already reformatted most, but these slipped past.

The ...

ae2266e70a9a6564182e03e6697d143703e5107c authored over 2 years ago by Russ Cox <[email protected]>
crypto/tls: randomly generate ticket_age_add

As required by RFC 8446, section 4.6.1, ticket_age_add now holds a
random 32-bit value. Before t...

08a15b8f98be6ab960830c825acc695267765673 authored over 2 years ago by Tatiana Bradley <[email protected]>
crypto/internal/nistec: re-enable s390x asm for P-256

- formatting and optimized init functionality for precomputed table
- updated formatting for com...

c2b0d84c87c9b370fd7c21a7890113e867584b67 authored over 2 years ago by pooja shyamsundar <[email protected]>
all: fix spelling

Change-Id: Iee18987c495d1d4bde9da888d454eea8079d3ebc
GitHub-Last-Rev: ff5e01599ddf7deb3ab6ce190b...

1a93fa6a20510863c734334da084e5a48337a588 authored over 2 years ago by John Bampton <[email protected]>
all: fix spelling

Change-Id: I68538a50c22b02cdb5aa2a889f9440fed7b94c54
GitHub-Last-Rev: aaac9e78340ac482e9cd1b506a...

fbf9b94d3b6c98a9d4fd40b56ec74c15527c5cb9 authored over 2 years ago by John Bampton <[email protected]>
crypto/aes: simplify key load+store on PPC64

There is no requirement for how the expanded keys are stored
in memory. They are only accessed b...

75dc2951bf40c37d4851a15528f2aa7556c43c62 authored over 2 years ago by Paul E. Murphy <[email protected]>
crypto/aes: enable aes-cbc asm for ppc64

This reworks how we load/store vector registers using the new
bi-endian P9 instruction emulation...

555325a283170281f55ca1e5d8be97bdebb765c9 authored over 2 years ago by Paul E. Murphy <[email protected]>
crypto/x509: attempt to prime windows root pool before hybrid test

In TestHybridPool attempt to prime to the windows root pool before
the real test actually happen...

e2b73858249e28ddcd7cbe1d56acd62fad9c1e44 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/aes: add BE support to gcm

This adds the code to allow the gcm assembler code to work on
big endian ppc64.

Updates #18499
...

38b02e0c4b90d4049f7c40c002b0303f237bf3f9 authored over 2 years ago by Lynn Boger <[email protected]>
all: fix some lint issues

Make some code more simple.

Change-Id: I801adf0dba5f6c515681345c732dbb907f945419
GitHub-Last-Re...

8771d594efe100e81b729f090e401b0d6304d563 authored over 2 years ago by Ryan Leung <[email protected]>
crypto/aes: enable asm block ciphers for ppc64

This does not enable GCM or CBC variants for ppc64, they
require more work to support bi-endian....

27eee0feb4809d712fbea7f0f55e868f54c0a563 authored over 2 years ago by Paul E. Murphy <[email protected]>
crypto/tls: avoid extra allocations in steady-state Handshake calls

The Read and Write methods of *tls.Conn call Handshake
unconditionally, every time they are call...

956fc96e8139e9fd7c4b20655d2478bd776b3f5e authored over 2 years ago by David Taylor <[email protected]>
crypto/aes: rewrite ppc64le block crypting

This unrolls the counter loop and simplifies the load/storing
of text/ciphertext and keys by usi...

37440e315c9d2f002930228c111f56bbfc7d576e authored over 2 years ago by Paul E. Murphy <[email protected]>
crypto/rand: fix race on r.used

This race is benign, but it still trips up the race detector, so turn
this into an atomic read.
...

3343dc82fc96ff1d57bf7edf53972ad17f209c02 authored over 2 years ago by Jason A. Donenfeld <[email protected]>
crypto/x509: fix EKU nesting enforcement

The path building rework broke the enforcement of EKU nesting, this
change goes back to using th...

e63ee2ce72592e2bbd36a5d246f13a6a8e544ab2 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/internal/nistec: re-enable ppc64le asm for P-256

Add support for ppc64le assembler to p256. Most of the changes
are due to the change in nistec i...

339bf4dea91461a14b503ef2255db995b44bb303 authored over 2 years ago by Lynn Boger <[email protected]>
crypto/rand: properly handle large Read on windows

Use the batched reader to chunk large Read calls on windows to a max of
1 << 31 - 1 bytes. This ...

172e77e4043d360a36675b92eddd68b201cd0866 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/ed25519/internal/edwards25519: move to crypto/internal/edwards25519

This will allow us to use crypto/internal/edwards25519/field from
crypto/ecdh to implement X2551...

8bbb1302f9cef71b2d9b6a68ebc0345f7985f1a3 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic/internal/nistec: move to crypto/internal/nistec

So it's reachable from crypto/ecdsa and the upcoming crypto/ecdh.

No code changes.

For #52182
...

3cf60ab76b176cf72052900cd78336747da5069a authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: panic when operating on invalid points

Fixes #50975
For #52182

Change-Id: I4a98d965436c7034877b8c0146bb0bd5b802d6fa
Reviewed-on: https...

a14970b4569c432e5c3c0673ebeb3bb473931250 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: implement UnmarshalCompressed in nistec

For #52182

Change-Id: If9eace36b757ada6cb5123cc60f1e10d4e8280c5
Reviewed-on: https://go-review....

29810c7601d127f589f1da1ebed74057c0526231 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: precompute ScalarBaseMult doublings

name old time/op new time/op delta
pkg:crypto/ecdsa goos:darwin goarch:...

632e12ccbaf4af4f9280fb34f9952ef29b4a796d authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: clean up and document P-256 assembly interface

For #52182

Change-Id: I8a68fda3e54bdea48b0dfe528fe293d47bdcd145
Reviewed-on: https://go-review....

6d7e840ccc8fb07b3afb4e8ff6ee12138b93ebd7 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: move P-256 amd64/arm64 assembly to nistec

The goal of this CL is to move the implementation to the new interface
with the least amount of ...

8c0393f1c3e3841c3819f65620b90745cc22399a authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: replace generic P-256 with fiat-crypto

For #52182

Change-Id: I8d8b4c3d8299fbd59b0bf48e5c8b7b41c533a2cc
Reviewed-on: https://go-review....

0787c153f928da7f2b4978dcf1e4c32ff6d1c4f0 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: generate nistec group implementations from template

For #52182

Change-Id: I4dedd8ed9f57f6fc394c71cd20c3b27c3ea29a95
Reviewed-on: https://go-review....

649af5d07ee6f682ac43574539cb333a46ccf1ce authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/aes: move ppc64le to cipher_asm.go

Move the aesCipherGCM struct definition into cipher_asm.go, it is
needed to compile this file, b...

16bb0eca1ffc2c2a864f7a0ce5fb6d914963bce2 authored over 2 years ago by Paul E. Murphy <[email protected]>
crypto/internal/boring: avoid false positive in cgo pointer check in SHA calls

Discovered running recent changes against Google internal tests.

Change-Id: Ief51eae82c9f27d2a2...

988683153104d418ef5fc8e88f7df7d63cb799e6 authored over 2 years ago by Russ Cox <[email protected]>
crypto/x509: disable signing with MD5WithRSA

MD5 is hopelessly broken, we already don't allow verification of
MD5 signatures, we shouldn't su...

2c2c16be3c8081dca47728a630b9561323d408b2 authored over 2 years ago by Roland Shoemaker <[email protected]>
[release-branch.go1.17] crypto/x509: properly handle issuerUniqueID and subjectUniqueID

Updates #51754
Fixes #51858

Change-Id: I3bfa15db3497de9fb82d6391d87fca1ae9ba6543
Reviewed-on: h...

5a71874416125f3dceac82a5c0c458329799ad07 authored over 2 years ago by Roland Shoemaker <[email protected]>
[release-branch.go1.18] crypto/x509: properly handle issuerUniqueID and subjectUniqueID

Updates #51754
Fixes #51859

Change-Id: I3bfa15db3497de9fb82d6391d87fca1ae9ba6543
Reviewed-on: h...

d4fbb73b9debda3ed3ae919948a49682740874c7 authored over 2 years ago by Roland Shoemaker <[email protected]>
all: REVERSE MERGE dev.boringcrypto (cdcb4b6) into master

This commit is a REVERSE MERGE.
It merges dev.boringcrypto back into its parent branch, master.
...

70d06aa459b175fd126834159ea3fd329110dbcb authored over 2 years ago by Russ Cox <[email protected]>
all: rename type *testing.B variable to 'b'

Reserve 't' for type *testing.T variables.

Change-Id: I037328df59d3af1aa28714f9efe15695b6fd62a9...

2983083a7fb5a08cadfad6957e2abb08b16f0cd0 authored over 2 years ago by Ludi Rehak <[email protected]>
[dev.boringcrypto] crypto/ecdsa, crypto/rsa: use boring.Cache

In the original BoringCrypto port, ecdsa and rsa's public and private
keys added a 'boring unsaf...

323737e9f9d621602616d3ba56a3e71246ed4c31 authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] crypto/internal/boring: add GC-aware cache

In the original BoringCrypto port, ecdsa and rsa's public and private
keys added a 'boring unsaf...

9fbef2c57967439db99b5694fb5736ce4125cf62 authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] crypto/x509: remove VerifyOptions.IsBoring

This API was added only for BoringCrypto, never shipped in standard
Go. This API is also not com...

27e70e93e44fd5faabbbceeb7a4d9d74b922504b authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] crypto/..., go/build: align deps test with standard rules

One annoying difference between dev.boringcrypto and master is that
there is not a clear separat...

76ffaa4d358d9775c35c5c00fa2ee8f80be2ae17 authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] crypto/internal/boring: make SHA calls allocation-free

The standard Go implementations are allocation-free.
Making the BoringCrypto ones the same helps...

f407c0da050464afc9782cc8e4d20c0f95df5ec5 authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] crypto/internal/boring: avoid allocation in big.Int conversion

The conversion via byte slices is inefficient; we can convert via word slices
and avoid the copy...

6bb977fcb2ed55c3bafa1272472f849bd92c0bec authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] all: add boringcrypto build tags

A plain make.bash in this tree will produce a working,
standard Go toolchain, not a BoringCrypto...

c6f476e8b19055fdd23b39f730a67cc3b83da04f authored over 2 years ago by Russ Cox <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: Ic5f71c04f08c03319c043f35be501875adb0a3b0

678eba9ce44d8f77bc7f8b8a608f33111401a1b2 authored over 2 years ago by Chressie Himpel <[email protected]>
crypto/tls: remove tls10default GODEBUG flag

Updates #45428

Change-Id: Ic2ff459e6a3f1e8ded2a770c11d34067c0b39a8a
Reviewed-on: https://go-rev...

eb8d2c8ab41df7405a2998b4de408fd1e7ede502 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: split up P-256 field and group ops

This makes Gerrit recognize the rename of the field implementation and
facilitates the review. N...

e407b22017fb98fae2ffe77b7c431ba2bbedd1b8 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: inline marshaling into nistec pointFromAffine

Marshal behavior for invalid points is undefined, so don't use it to
check if points are valid.
...

2abddc3233e10364bc636208196e99432bd6887e authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: use generics for nistec-based curves

There was no way to use an interface because the methods on the Point
types return concrete Poin...

f79bf49b287ae8290deed834ccda35f9ae75af1d authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: refactor package structure

Not quite golang.org/wiki/TargetSpecific compliant, but almost.

The only substantial code chang...

eba68f2e46f50f7f4c51c9c2d3bc765af1c8fdde authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/ed25519: test fixup

Fix up TestEd25519Vectors to download files into its own temporary mod
cache, as opposed relying...

0a433d616d5290b750d7a936cc2c8468cb61de4a authored over 2 years ago by Than McIntosh <[email protected]>
crypto/x509: revert serial length restriction

This reverts CL400377, which restricted serials passed to
x509.CreateCertificate to <= 20 octets...

111ae6219e01adf7961ba48e70d7d485b9d65156 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/x509: use SAN when comparing certs during path building

Per RFC 4158 Section 2.4.2, when we are discarding candidate
certificates during path building, ...

33f1d04033b88646799aaec4bdeed535e66cfc1b authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/tls: reject duplicate extensions

Does what it says on the tin.

Fixes #51088

Change-Id: I12c0fa6bba1c1ce96c1ad31ba387c77a93f801c...

2403fafb1ddd20b335f1d3b02005d95b0d420e5b authored over 2 years ago by Roland Shoemaker <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: I30dbbe508a6252d50b4154cb9a8299cf0a054449

5c4cd5517704da9e9d093359ab8588ebf5321fc8 authored over 2 years ago by Chressie Himpel <[email protected]>
crypto/rand: apply the same max read size on Illumos as on Solaris

This case was missed in CL 370894, and masked by the lack of an
Illumos TryBot.

Fixes #52452.

...

fb0afe0bd39cec53b90832216baa6fa3f777a375 authored over 2 years ago by Bryan C. Mills <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: I52009bf809dda4fbcff03aa82d0ea8aa2a978fa2

bbf98190697a508fb23ec85ea13c005d428c7a14 authored over 2 years ago by Chressie Himpel <[email protected]>
crypto/rand: remove all buffering

The kernel's RNG is fast enough, and buffering means taking locks, which
we don't want to do. So...

5c5dea85aba7333ea06288011399003631bc6554 authored over 2 years ago by Jason A. Donenfeld <[email protected]>
crypto/rand: batch and buffer calls to getrandom/getentropy

We're using bufio to batch reads of /dev/urandom to 4k, but we weren't
doing the same on newer p...

500e242523e2dda2be01ce1b041fbfc54d39e52b authored over 2 years ago by Jason A. Donenfeld <[email protected]>
crypto/x509: move sha1 removal to unspecified future release

Updates #41682

Change-Id: I3a2d6eedf4030cdc7308001aef549eb20eeb11c1
Reviewed-on: https://go-rev...

c5f241f2bc8281874daa96eca0e90fb64ab706f4 authored over 2 years ago by Jordan Liggitt <[email protected]>
crypto/x509: reject duplicate extensions

When parsing certificates and CSRs, reject duplicate extensions (and
additionally duplicate requ...

8614b603ea93648ab3651a6785a154af147c4950 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/x509: don't create certs with negative serials

Refuse to create certificates with negative serial numbers, as they
are explicitly disallowed by...

37e637714ea409394ba8207dba9939ee13b3d595 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/x509: don't allow too long serials

Don't create certificates that have serial numbers that are longer
than 20 octets (when encoded)...

a550a3bf8e6466045c5c244e4a178b15ac38e3dc authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/x509: add CertPool.Clone

Export the previously private method copy as Clone.

Fixes #35044

Change-Id: I5403d6a3b9f344c98...

595afafda6dc5b48c87010934e0c8e181e5bbaf1 authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/x509: support nil pools in CertPool.Equal

Otherwise we panic if either pool is nil.

Change-Id: I8598e3c0f3a5294135f1c330e319128d552ebb67
...

c468417cf37603228a0d39754a732e0d614762ed authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/x509: omit empty extensions SEQUENCE

In CreateCertificate, if there are no extensions, don't include the
extensions SEQUENCE in the e...

4d840b1b9adf1f97e46d2d3d2785c41fafd6a924 authored over 2 years ago by Roland Shoemaker <[email protected]>
all: gofmt main repo

[This CL is part of a sequence implementing the proposal #51082.
The design doc is at https://go...

66e5f920641ed76032a5e619d04648d08a0ec3be authored over 2 years ago by Russ Cox <[email protected]>
crypto/aes: merge ppc64le crypt key expansion

It is not necessary to expand the key twice for each direction,
the decrypt key can be stored in...

aa92d62cc6474dcdd74d7771233cb4aaf9b46eff authored over 2 years ago by Paul E. Murphy <[email protected]>
all: consistently use US spelling of present participles

It has been agreed that we should prefer the US spelling of words like
"canceling" over "cancell...

d3823cb1711d12ba39b5d9480f28cbb212361d0a authored over 2 years ago by Daniel Martí <[email protected]>
crypto/aes: simplify key expansion in ppc64le asm

The ported cryptogam implementation uses a subtle and tricky mechanism
using lxv/vperm/lvsl to l...

8a0f14412727e6d31c747f0203eabebcbb53c864 authored over 2 years ago by Paul E. Murphy <[email protected]>
[release-branch.go1.18] crypto/elliptic: tolerate zero-padded scalars in generic P-256

Updates #52075
Fixes #52077
Fixes CVE-2022-28327

Change-Id: I595a7514c9a0aa1b9c76aedfc2307e1124...

59f81c65d5481f5d98feb3fba69695d802e21ed5 authored over 2 years ago by Filippo Valsorda <[email protected]>
[release-branch.go1.17] crypto/elliptic: tolerate zero-padded scalars in generic P-256

Updates #52075
Fixes #52076
Fixes CVE-2022-28327

Change-Id: I595a7514c9a0aa1b9c76aedfc2307e1124...

f41b1fdee4e10d3197ab0a1f16e76400d34983d5 authored over 2 years ago by Filippo Valsorda <[email protected]>
crypto/x509: add new CRL parser, deprecate old one

Adds a new, cryptobyte based, CRL parser, which returns a
x509.RevocaitonList, rather than a pki...

8ccd624005f8735102dbc36d556c154efd0727c5 authored over 2 years ago by Roland Shoemaker <[email protected]>
all: separate doc comment from //go: directives

A future change to gofmt will rewrite

// Doc comment.
//go:foo

to

// Doc comment.
//
//g...

4ed8b07976df49de04c054a6872ffed2ecc14edd authored over 2 years ago by Russ Cox <[email protected]>
all: replace `` and '' with “ (U+201C) and ” (U+201D) in doc comments

go/doc in all its forms applies this replacement when rendering
the comments. We are considering...

0edbec122f7fc72ddadf62e300e49f3f30dfff63 authored over 2 years ago by Russ Cox <[email protected]>
crypto/x509: rework path building

This change does four things:
* removes the chain cache
* during path building, equality is ...

1b687b03a7ea1859d5163de8909ec6500239f596 authored over 2 years ago by Roland Shoemaker <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: Iaf618444dd2d99721c19708df9ce2c1f35854efd

535cecc01fe41eaa6b4658c487cf15689810a8be authored over 2 years ago by Lasse Folger <[email protected]>
[release-branch.go1.18] crypto/x509: only disable SHA-1 verification for certificates

Disable SHA-1 signature verification in Certificate.CheckSignatureFrom,
but not in Certificate.C...

52aa6ab05a684238ad182c15393a5f59ea375a6e authored over 2 years ago by Roland Shoemaker <[email protected]>
crypto/elliptic: delete outdated fuzz test

It had not been doing anything since CL 233939, because the Params
method was getting upgraded t...

07014a95215bb01d545de0b68203641063be10ab authored over 2 years ago by Filippo Valsorda <[email protected]>