Ecosyste.ms: OpenCollective

An open API service for software projects hosted on Open Collective.

github.com/ooni/oocrypto

Fork of Go crypto/tls with extra patches from the OONI team
https://github.com/ooni/oocrypto

crypto/des: fix typo in permuteInitialBlock function comments

Fixes #41398

Change-Id: Ib47b8ec43bb11d8cd13c24f833532434127c7532
Reviewed-on: https://go-revie...

5f1a79f7eeff08229101a413ad4ddf7031ddff55 authored over 4 years ago by zhouzhongyuan <[email protected]>
crypto/x509: fix duplicate import

Updates dave/dst#45.

Change-Id: I165e6b3d002407a33908bf90a66ad01f8003b260
Reviewed-on: https://...

da7b204a6287d78ebe6749c08ed2b17c3b6e9579 authored over 4 years ago by Katie Hockman <[email protected]>
crypto,internal/bytealg: fix assembly that clobbers BP

BP should be callee-save. It will be saved automatically if
there is a nonzero frame size. Other...

496d47688801076b3b2325e8c2bf2004a4511832 authored over 4 years ago by Keith Randall <[email protected]>
crypto/ed25519: remove s390x KDSA implementation

This reverts CL 202578 and CL 230677 which added an optimization
to use KDSA when available on s...

b8f6978db4244ce136090d795f14f7a34d15f011 authored over 4 years ago by Michael Munday <[email protected]>
crypto/x509: respect VerifyOptions.KeyUsages on Windows

When using the platform verifier on Windows (because Roots is nil) we
were always enforcing serv...

32025590c61c31e1f8992993b37c98beeb771ed1 authored over 4 years ago by Filippo Valsorda <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: I61d6a6d4959fdea8339b9d666385bf6b4ed49d03

8031a1a82690994fb6f91058d7688dd6ebc978c4 authored over 4 years ago by Dmitri Shuralyov <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: I948e086e11e1da571e2be23bb08a7bbd6618dc2f

5e63744a22cc1bc31b7f991fe92d0d2fb05529da authored over 4 years ago by Dmitri Shuralyov <[email protected]>
crypto/x509/internal/macos: rename package to lowercase

Also add a test to lock in this policy.

Fixes #40065

Change-Id: Iedc4586f2f5598046d84132a8f3bb...

250da8e56e2dd80819bcb1a18227736940abf28b authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto: fix PKCS space in docs

Change-Id: Iee53acb963a889410f8c6daaa9a7841f1b12c6fb
Reviewed-on: https://go-review.googlesource...

03ab0ae8644ba3ccc4bde86bd925a7ca23ee303f authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: relax the docs of InsecureSkipVerify

Fixes #39074

Change-Id: I72ec95f4b190253bb82d52a03a769b0399170b93
Reviewed-on: https://go-revie...

c394b0966c52b1d1fe028c4df976052859e12844 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509/pkix: print non-standard parsed Names at the end

This doesn't change how ExtraNames are printed, so as not to cause
unnecessary churn of current ...

a53a4c261243cc3fa7075afb6c35d6dabe32e3dc authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: create certs w/o KeyEncipherment KU for non-RSA keys in generate_cert.go

Summary

The crypto/tls/generate_cert.go utility should only set the template
x509.Certificate's...

fc26d92ea6a439a356d94f0a8207e10f971289c7 authored over 4 years ago by Daniel <[email protected]>
crypto/x509: move and update the SSL_CERT_FILE and SSL_CERT_DIR docs

Fixes #37907

Change-Id: Ia077de6dcc74ed761d278eab4efbf45e151429b8
Reviewed-on: https://go-revie...

6de474fcdec5d8ae8e3c4b24fb43f5953b1d9322 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: replace VerifyPeerCertificate example with VerifyConnection

Look at how much better it is!

Updates #36736

Change-Id: I53a314a103a42dd869c05823fa50f37d70f9...

b1ba0adfe89a876cb7a2cef6c44008a7243a284a authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: expand the ConnectionState docs

Fixes #37572

Change-Id: I493392f535a979ee16609861041da2ecfe21cf77
Reviewed-on: https://go-revie...

181a17feea737665565eac6dcee626a56ba8d2b9 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: fix DialContext docs

Change-Id: I58e3febbf63049bebb4f8ed8893288183c8aaccd
Reviewed-on: https://go-review.googlesource...

83cbfa287c4f6e9faba7e0dfffb637eab56d26c6 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509: restore support for ios tag on darwin/amd64

Fixes #38710

Change-Id: I9b210e95fd997ff53ec704c5f61110045aaa94bb
Reviewed-on: https://go-revie...

2632227bd64f6bad0a0048b109c722766e9d78a4 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509: update bundled iOS roots and rewrite generator

Switched the generator to using the open source releases of the root
store rather than HTML pars...

ff34c9f10be6d90f54c1ad65b7210abb397cc0b7 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: document and test that IsOnCurve(∞) == false

This also implies it can't be passed to Marshal.

Fixes #37294

Change-Id: I1e6b6abd87ff31f32348...

e862dc01de3d89b7c95be5d970e01d61bf10cce4 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: restore OCSP and SCTs during session resumption

Restore previously sent SCTs and stapled OCSP response during session
resumption for both TLS 1....

6917dfdc8b0b0f29630443faac9ba7ab79d2a473 authored over 4 years ago by Roland Shoemaker <[email protected]>
crypto/x509: match RFC suggested SKID generation method

Rather than hashing the encoding of the SPKI structure, hash the
bytes of the public key itself....

d4fa82446a1436b1ca0ca3beeaeff47fa72fff93 authored over 4 years ago by Roland Shoemaker <[email protected]>
crypto/x509: match cgo and Apple behavior in domain fallback of macOS roots

This change makes the direct call darwin loadSystemRoots implementation
match the existing cgo i...

26bddfa0e30c4b8f122ddb27013b1396ff86bbf0 authored over 4 years ago by Roland Shoemaker <[email protected]>
crypto/tls: set CipherSuite for VerifyConnection

The ConnectionState's CipherSuite was not set prior
to the VerifyConnection callback in TLS 1.2 ...

2aedcc23c4730a987a5b327e871b9209cf64283c authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: test that Clone copies session ticket key fields

Updates #25256

Change-Id: If16c42581f1cf3500fd7fd01c915e487f8025e55
Reviewed-on: https://go-rev...

32f3f749a8cb719938daa421efdc905e041bfa0c authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: fix duplicate calls to VerifyConnection

Also add a test that could reproduce this error and
ensure it doesn't occur in other configurati...

cc9e6cdab301980dfcba598f70532d794211480c authored over 4 years ago by Katie Hockman <[email protected]>
crypto/x509: document support for leading periods in DNS constraints

This change adds a comment to the Verify documentation that indicates
that you can use URI and e...

771ebda4f31ba60a670aeebdcf91a44749a7eb18 authored over 4 years ago by Roland Shoemaker <[email protected]>
crypto/x509: allow setting MaxPathLen to -1 without IsCA

This fixes a bug in CL 228777 which disallowed
a MaxPathLen of -1 without IsCA, even though the
...

caedbe437fdd1c9e667871893b463602e3536c13 authored over 4 years ago by Katie Hockman <[email protected]>
crypto/x509: save the temp dir in TestReadUniqueDirectoryEntries

In CL 231958, TempDir was changed to create a new temp directory on
each allocation, on the theo...

1ba3416585cbe78ca10ff9b149c69577ccff83d6 authored over 4 years ago by Bryan C. Mills <[email protected]>
crypto/tls: remove version check when unmarshaling sessionState

This was causing issues when fuzzing with
TestMarshalUnmarshal since the test would
occassionall...

d3737ea65660a1d5915214e53693fe195ed52f5a authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: persist the createdAt time when re-wrapping session tickets

Change-Id: I33fcde2d544943fb04c2599810cf7fb773aeba1f
Reviewed-on: https://go-review.googlesource...

57fdbb16f25c77142cc305925c7047f67ecb2a8e authored over 4 years ago by Katie Hockman <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: I083d1e4e997b30d9fab10940401eaf160e36f6c1

1818cac1f67592d20d0ab3805fe1c9ea8754c8c3 authored over 4 years ago by Dmitri Shuralyov <[email protected]>
crypto/tls: add Config.VerifyConnection callback

Since the ConnectionState will now be available during
verification, some code was moved around ...

e3e38f80f86b721762b6b31d7498a2951e50073e authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: rotate session ticket keys

Automatically rotate session ticket keys for servers
that don't already have sessionTicketKeys a...

77962ac62464d1e38937b98c2dc70c6a3fd4a1a6 authored over 4 years ago by Katie Hockman <[email protected]>
crypto/x509: treat hostnames with colons as invalid

Colons are port separators, so it's risky to allow them in hostnames.
Per the CL 231377 rule, if...

777284be742ba0e21b2cf80fb887df8937eec51c authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509: treat certificate names with trailing dots as invalid

Trailing dots are not allowed in certificate fields like CN and SANs
(while they are allowed and...

5071936e9d065a048edef60ee6b40de95c67687f authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509: ignore Common Name by default

Common Name has been deprecated for 20 years, and has horrible
interactions with Name Constraint...

aee3bb048af558988704490246a817bfb810a22d authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509: require perfect matches for invalid hostnames

When the input or SAN dNSNames are not valid hostnames, the specs don't
define what should happe...

76e629da1f536925facecfb475b41f97735c829a authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/elliptic: implement MarshalCompressed and UnmarshalCompressed

Fixes #34105

Co-authored-by: Filippo Valsorda <[email protected]>
Change-Id: I3470343ec9ce9a0b...

412db13a328c07d9b1cfa5a655741d6d08721cd8 authored over 4 years ago by Evgeniy Kulikov <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: Idd59c37d2fd759b0f73d2ee01b30f72ef4e9aee8

702a6d79d837d5e531ffec200a1026b9d034fae2 authored over 4 years ago by Dmitri Shuralyov <[email protected]>
crypto/x509: use Security.framework without cgo for roots on macOS

+----------------------------------------------------------------------+
| Hello, if you are rea...

f630f0ae5b71ef05bf9680580d69bf651084c2ed authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: rotate session keys in older TLS versions

Also encode the certificates in a way that's more
consistent with TLS 1.3 (with a 24 byte length...

26513fdef92fbb6add62ed57bfba1e48d3e3cdcd authored over 4 years ago by Katie Hockman <[email protected]>
[dev.boringcrypto] crypto/internal/boring: reject short signatures in VerifyRSAPKCS1v15

This matches the new crypto/rsa behavior introduced in CL 226203.

Updates #21896

Change-Id: If...

ef5a29229b4bed02da026fca7cadc608ec58547f authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/hmac: speed up repeated operations with the same key

Speed up repeated HMAC operations with the same key by not recomputing
the first block of the in...

21890123e950c914ec7cfa1bdcc8e892046ee3e8 authored over 4 years ago by Andrew Ekstedt <[email protected]>
crypto/tls: fix sessionState marshaling

Change-Id: I2910f322256c521dd03b1dc23d117defdcd0aa54
Reviewed-on: https://go-review.googlesource...

b572350c4e504ae60a8066fb74460944fb76329b authored over 4 years ago by Katie Hockman <[email protected]>
crypto/x509: improve VerifyOptions and VerifyHostname docs

Before going around making changes, surface the current behavior in the
docs as a starting point...

0c71706ae9ce38b94bba4b8cfbcfad337119234a authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: accept HelloRetryRequest messages with only a cookie

Clients have to reject any HelloRetryRequest message that doesn't lead
to a change in the Client...

6030c522841ad1e89b7246b8186bf64a42397440 authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: marshal sessionState using cryptobyte

Change-Id: I95a60b837e19d0c4bf45ea74baa5843a8244a186
Reviewed-on: https://go-review.googlesource...

03956e32daebe83181fd44cf3f7cdca3024f904e authored over 4 years ago by Katie Hockman <[email protected]>
crypto/rsa,crypto/ecdsa,crypto/ed25519: implement PrivateKey.Equal

Fixes #38190

Change-Id: I10766068ee18974e81b3bd78ee0b4d83cc9d1a8c
Reviewed-on: https://go-revie...

f08c0c3b4eb1217f221a446f23b2d4da0f4043cb authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/tls: enforce TLS 1.3 (and TLS 1.2) downgrade protection checks

Fixes #37763

Change-Id: Ic6bcc9af0d164966f4ae31087998e5b546540038
Reviewed-on: https://go-revie...

cf1cb65bb056d551aad7f7027dd656cc5b6a5d6b authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509: don't read symlinked root certs from disk twice

On Linux distros at least, it's common for cert directories to have
symlinks pointing to other c...

22f6318d64b553ef034ef5f7c4e16b52d2c4bf39 authored over 4 years ago by Brad Fitzpatrick <[email protected]>
math/big: add (*Int).FillBytes

Replaced almost every use of Bytes with FillBytes.

Note that the approved proposal was for

...

b51a577b0351c416de3aeae9b1a8b4ec24985abc authored over 4 years ago by Filippo Valsorda <[email protected]>
crypto/x509/pkix: improve docs and Name.String()

Previously, non-standard attributes in Name.Names were being
omitted when printed using Name.Str...

90e7ab4ba65f4a3c87b06c131181e0b87cd41509 authored over 4 years ago by Katie Hockman <[email protected]>
crypto/ed25519: drop the purego build tag

Per suggestion in CL 202578, this CL drops the purego build tag used
within this package.

Chang...

5461a44f6303f412ea260b25bb8f68b0afca9651 authored over 4 years ago by Ruixin Bao <[email protected]>
crypto/ecdsa: implement ecdsa on s390x for P256/P384/P521 using KDSA instruction

This CL revives CL 174437(also IBM CLA) and adds benchmarks and some simplifications.

The origi...

2fa601a926998c6bd330953d87f9f4b49c8ef815 authored over 4 years ago by Ruixin Bao <[email protected]>
crypto/ed25519: implement ed25519 on s390x using KDSA instruction

This CL allows the usage of KDSA instruction when it is available. The
instruction is designed ...

b77a2713a892f9de9814bb65172805105fc62f0b authored over 4 years ago by Ruixin(Peter) Bao <[email protected]>
crypto/x509: add x509omitbundledroots build tag to not embed roots

On darwin/arm64, the copy of the system roots takes 256 KiB of disk
and 560 KiB of memory after ...

713419f9e94cddb9a42d8596ecd1ced2441718ba authored over 4 years ago by Brad Fitzpatrick <[email protected]>
crypto/x509: disallow setting MaxPathLen without IsCA

Fixes #38216

Change-Id: I3222abe2153abb4cbfa65a4825c153ce128f56a0
Reviewed-on: https://go-revie...

54e90d11891d863421235e9f071836a5e557be98 authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: add Dialer

Fixes #18482

Change-Id: I99d65dc5d824c00093ea61e7445fc121314af87f
Reviewed-on: https://go-revie...

23794d77444a7311e6eae63c3b3f827d15f6cc22 authored over 4 years ago by Brad Fitzpatrick <[email protected]>
crypto/x509: clarify MarshalPKIXPublicKey and ParsePKIXPublicKey docs

Fixes #35313

Change-Id: I7be3c40f338de6b1808358ea01e729db8b533ce5
Reviewed-on: https://go-revie...

8ea818193bb93481a73ffd362c5f9f4bfa25ef4b authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: help linker remove code when only Client or Server is used

This saves 166 KiB for a tls.Dial hello world program (5382441 to
5212356 to bytes), by permitti...

93769ad352e77d34e80224e2bc4834069ef53514 authored over 4 years ago by Brad Fitzpatrick <[email protected]>
crypto/x509: fix test to prevent Gerrit keycheck errors

Change-Id: I9e6a11c7d8c61d0182467438b35eb6756db7aa89
Reviewed-on: https://go-review.googlesource...

f5a24d5620e848629e1a26309da3c30e84e01dd1 authored over 4 years ago by Katie Hockman <[email protected]>
crypto/x509: generate SubjectKeyId for CAs

Fixes #26676

Change-Id: I5bc91d4a8161bc6ff25effcf93f551f735fef115
Reviewed-on: https://go-revie...

8f8880a275860db75d08cbd7c26360d6490fc0ca authored over 4 years ago by Katie Hockman <[email protected]>
crypto/tls: failed tls.Conn.Write returns a permanent error

Fixes #29971

Change-Id: I2f1653640c88fafe0ec17a75dcf41d5896c4cb8e
Reviewed-on: https://go-revie...

551705911a6b8d17cc823dc2c08e9d86ed8b3b9f authored over 4 years ago by Katie Hockman <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: I2dcec316fd08d91db4183fb9d3b9afde65cc248f

125e06611b5cad1f183e177ee4f935aed45ee1bb authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto/x509: tidy darwin/arm64 build tags

The cgo build tag is not necessary for root_darwin_arm64.go. We can't
build for darwin/arm64 wit...

548bccb4acdfbda327e50966a3b57b01cd7420ce authored almost 5 years ago by Austin Clements <[email protected]>
all: remove scattered remnants of darwin/arm

This removes all conditions and conditional code (that I could find)
that depended on darwin/arm...

5db6ada11ab4c8e1e54032cb4775f37f313f174b authored almost 5 years ago by Austin Clements <[email protected]>
all: remove darwin/arm build-tags and files

This removes all files that are only used on darwin/arm and cleans up
build tags in files that a...

e796f83ac15d9d9a7a58a93cbc407858f8f0f516 authored almost 5 years ago by Austin Clements <[email protected]>
crypto/sha512: optimize sha512 by removing function literal

The function 'block' called indirectly via function literal 'blockGeneric' prevents
'gc' perform...

6671b88c157c0216613682fda89e1f092832b2b7 authored almost 5 years ago by Xiangdong Ji <[email protected]>
crypto/rsa: refactor RSA-PSS signing and verification

Cleaned up for readability and consistency.

There is one tiny behavioral change: when PSSSaltLe...

8d1f8c40d97eb695aa61598c301514a8ac60a657 authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto/tls: add missing alert values

Fixes #35911

Change-Id: I093d25aa169963769b51c37d2481bce71bd0fd2f
Reviewed-on: https://go-revie...

9eaf68fec5d5ff79d0a107d9bc350ce80c5b199b authored almost 5 years ago by Katie Hockman <[email protected]>
crypto/rsa: reject invalid length PKCS#1v1.5 signatures

Per RFC 8017, reject signatures which are not the same length as the RSA
modulus. This matches t...

875b1ec2a3c033be14502a145f352cb6d11ed5f8 authored almost 5 years ago by Roland Shoemaker <[email protected]>
test, test/fixedbugs, crypto/x509, go/internal/gccgoimporter: fix typos

Change-Id: Ie2d605ca8cc3bde2e26c6865642ff4e6412cd075
GitHub-Last-Rev: ce5c3ba369b2ef476e7c63e440...

88cf11a6c4255938926878cb85ac4fe77bfdd06d authored almost 5 years ago by alex-semenyuk <[email protected]>
crypto/rsa,crypto/ecdsa,crypto/ed25519: implement PublicKey.Equal

This makes all modern public keys in the standard library implement a
common interface (below) t...

84e4636775742c855c62312006d044f951904d8a authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto: implement Hash.String

Fixes #33430

Change-Id: I323323b3136dd7b408005c3bb5ea05e3b566bd38
Reviewed-on: https://go-revie...

d6ccdc06f4675e69955ebcdfbb104268cad0a205 authored almost 5 years ago by Katie Hockman <[email protected]>
Revert "crypto/rsa,crypto/ecdsa,crypto/ed25519: implement PublicKey.Equal"

This reverts CL 223754.

Reason for revert: new tests are failing on all longtest builders.

Cha...

e6629c5428eebd16b3f9cb5a9d2bc32ce2c9329e authored almost 5 years ago by Bryan C. Mills <[email protected]>
crypto/rsa,crypto/ecdsa,crypto/ed25519: implement PublicKey.Equal

This makes all modern public keys in the standard library implement a
common interface (below) t...

ed5edd50fab30c0125f26f19692d4cb1a03c8571 authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto/x509: add RevocationList and CreateRevocationList

The existing Certificate.CreateCRL method generates non-conformant CRLs and
as such cannot be us...

2517138d7592731b373cebf382b93cfb858ece55 authored almost 5 years ago by Roland Shoemaker <[email protected]>
crypto/x509: bump minimum macOS version to 10.11

The minimum macOS supported version is 10.11 as of Go 1.14, see #23011.
Thus, bump macosx-versio...

e005f5d8610264b1ddc9e21c719c0974bc75fe9f authored almost 5 years ago by Tobias Klauser <[email protected]>
crypto/tls: update the MITM reference to "machine-in-the-middle"

Changing "man-in-the-middle" references to "machine-in-the-middle",
it's a more inclusive term a...

7558420df5d8efd64286beafbf5f7c078815c5ae authored almost 5 years ago by Chris Le Roy <[email protected]>
crypto/tls: add {SignatureScheme,CurveID,ClientAuthType}.String()

Fixes #35499

Change-Id: Ieb487782f389f6d80e8f68ee980e584d906cb4da
Reviewed-on: https://go-revie...

c8e672d67f76f346ddf79b4e91aa4ff26bfccc6e authored almost 5 years ago by Filippo Valsorda <[email protected]>
[dev.boringcrypto] crypto/internal/boring: make accesses to RSA types with finalizers safer

RSA key types have a finalizer that will free the underlying C value
when the Go one is garbage ...

5378aa3c1f40835fcae0e381e02dc0a5e5e57c2f authored almost 5 years ago by Filippo Valsorda <[email protected]>
[dev.boringcrypto] crypto/internal/boring: update BoringCrypto module to certificate 3318

Use OPENSSL_malloc for set0 functions as OPENSSL_free now catches us
using the libc malloc and a...

113bb29ec744d51c2e7a7969953171be94e8d9cf authored almost 5 years ago by Filippo Valsorda <[email protected]>
all: fix incorrect channel and API usage in some unit tests

This CL changes some unit test functions, making sure that these tests (and goroutines spawned d...

32a61ad38aa54f9fceea70f8e25ab32ec0037096 authored almost 5 years ago by Ziheng Liu <[email protected]>
crypto/tls: use new ecdsa.VerifyASN1 API

Change-Id: I2a233190bda78ca022ff4074b4553788847d7583
Reviewed-on: https://go-review.googlesource...

147bbdd0b76c29bc7e01bc9a2aaf6fae6f265b2b authored almost 5 years ago by Katie Hockman <[email protected]>
crypto/x509: use new ecdsa.VerifyASN1 API

Change-Id: Ia4f77d2965e34454e8dd3f2d8bf9c4f3065a9fbc
Reviewed-on: https://go-review.googlesource...

e06c5841bb9e299e6698e39322761df5ad75d785 authored almost 5 years ago by Katie Hockman <[email protected]>
crypto/x509: load roots from colon separated SSL_CERT_DIR in loadSystemRoots

"SSL_CERT_DIR" is meant to hold more than one directory, when a colon
is used as a delimiter. Ho...

88e29a85ff4cb70b50aa5e14ad137ed513772a9c authored almost 5 years ago by Emmanuel T Odeke <[email protected]>
crypto/cipher: require non-zero nonce size for AES-GCM

Also fix typo in crypto/cipher/gcm_test.go.

Fixes #37118

Change-Id: I8544d1eeeb1f0336cebb977b8...

e13276a73f4ccded428c8c30603d38b8ee0fb79c authored almost 5 years ago by Katie Hockman <[email protected]>
crypto/tls: update ExampleDial with a valid root

When run as a separate program, the code in ExampleDial panicked due to
an expired certificate. ...

7e205c783ad2e597270049b571ed11cfb18fcf01 authored almost 5 years ago by Johan Jansson <[email protected]>
crypto/tls: clarify TLS 1.0/1.1 CertificateRequestInfo.SignatureSchemes

This CL should not change the logic at all, but it took me a while to
figure out why we use thes...

fd720082f58616e38136869ebaa0e21b52ddc9cc authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto/ecdsa: add SignASN1, VerifyASN1

Update the Example in the crypto/ecdsa package for signing
and verifying signatures to use these...

a9a7f5f0658f93ebaa8517c91657f5a050f7c6f8 authored almost 5 years ago by Katie Hockman <[email protected]>
crypto/x509: correct error message for trailing issuer data

The error message for trailing data after the X.509 issuer should
correctly state "issuer" inste...

cd8bde9e4bcd89ae7f02d6e838eb80093afbadbf authored almost 5 years ago by Alexander Rakoczy <[email protected]>
crypto/elliptic: document the Name and names of each curve

See https://tools.ietf.org/html/rfc8422#appendix-A for a helpful table.

Also, commit to keeping...

89410e23e398649d5184bb87ab2d059f6ca3e351 authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto/x509: fix godoc for MarshalPKCS8PrivateKey

Fixes #36735

Change-Id: I93f005d78f4bfac773272995b165172461bae92f
Reviewed-on: https://go-revie...

80b5ba51464a617c803ed1f6bfb7ece81f1bd6ce authored almost 5 years ago by Katie Hockman <[email protected]>
crypto/x509: mitigate CVE-2020-0601 verification bypass on Windows

An attacker can trick the Windows system verifier to use a poisoned set
of elliptic curve parame...

4bbc191363898a2784f8a6790fb711a2fbd78ceb authored almost 5 years ago by Filippo Valsorda <[email protected]>
crypto/tls: stop a timeout timer

I noticed this leak while writing CL 214977.

Change-Id: I7566952b8e4bc58939d23435aea86576fc58dd...

d529b36ad5d6849cc9add6891b4b09e051d5e8b6 authored almost 5 years ago by Brad Fitzpatrick <[email protected]>
crypto/x509: this change modifies C.CopyPEMRoots to static function

Change-Id: Ic7997d1f747152afec78e8e439770166029f34ec
GitHub-Last-Rev: 6a07f25056c960dc8684cd6eac...

f48655920b3c67ae1212593beb108ed9c1d2b0b4 authored about 5 years ago by bxq2011hust <[email protected]>
all: fix a number of misuses of the word "an"

After golang.org/cl/210124, I wondered if the same error had gone
unnoticed elsewhere. I quickly...

ff34d8dd77f2a585084a8791d584d94f55c8bb96 authored about 5 years ago by Daniel Martí <[email protected]>
crypto/tls: fix a typo in TLS handshake comment

Fix a minor typo in the TLS handshake comment.

Change-Id: I0fd243e5440f6c77c97e844e6669a7974a2c...

5aca8729c30c62b747c174a3d5c492eb4a507585 authored about 5 years ago by Alex Harford <[email protected]>
crypto/tls: remove leftover extensionNextProtoNeg constant

NPN was removed in CL 174329.

Change-Id: Ic63ad53e7e24872e28673d590727e0300f435619
Reviewed-on:...

8fb66d2305ef26b74a3f8e7b8372f1e8b04b38a7 authored about 5 years ago by Filippo Valsorda <[email protected]>
[dev.boringcrypto] all: merge master into dev.boringcrypto

Move the import in cipher_suites.go up where it's less likely to ever
conflict again, and remove...

81de108610e779397e67a0a3f9f7829adce82309 authored about 5 years ago by Filippo Valsorda <[email protected]>