Commit Graph

  • 07b6287f24 crypto/tls: allow renegotiation to be handled by a client. Adam Langley 2016-04-26 10:45:35 -0700
  • 21704146dc all: remove unnecessary type conversions Matthew Dempsky 2016-04-14 19:09:36 -0700
  • df48510552 crypto/tls: make error prefix uniform. Adam Langley 2016-04-12 10:43:44 -0700
  • d33db60027 all: standardize RFC mention format Dan Peterson 2016-04-12 16:58:56 -0300
  • ca4a3279f9 crypto/tls: Enforce that version and cipher match on resume. David Benjamin 2016-02-15 11:51:54 -0500
  • 0d2c944f7b crypto/tls: Update references to draft-ietf-tls-downgrade-scsv-00. David Benjamin 2016-02-15 11:56:18 -0500
  • eab2fdedca all: delete dead non-test code Dominik Honnef 2016-03-21 00:12:18 +0100
  • e15014c62b crypto/tls: minor refactors for readability Emmanuel Odeke 2016-03-14 03:35:13 -0600
  • 9f2da1d218 crypto/tls: implement dynamic record sizing Tom Bergan 2016-02-17 18:20:24 -0800
  • e97230a260 crypto/tls: document that the cipher suite list is non-exhaustive. Adam Langley 2016-03-10 15:49:30 -0800
  • 2cd00eea5d crypto/tls: better error for oversized handshake messages. Adam Langley 2016-03-10 14:52:01 -0800
  • dae4f046c8 crypto/tls: test for timeout error using the net.Error interface Brad Fitzpatrick 2016-03-08 22:10:28 +0000
  • 326f5bb02b crypto/tls: check errors from (*Conn).writeRecord Tamir Duberstein 2016-02-26 14:17:29 -0500
  • fbcc97bc82 all: single space after period. Brad Fitzpatrick 2016-03-01 23:21:55 +0000
  • dcbfc76400 all: remove public named return values when useless Brad Fitzpatrick 2016-02-28 15:52:49 -0800
  • 78266c8c7c crypto/tls: don't log expected errors in test Tamir Duberstein 2016-02-26 18:26:04 -0500
  • 5e9ba4345a crypto/tls: tests prefer constants to opaque literals Tamir Duberstein 2016-02-26 18:26:04 -0500
  • 75d204850c crypto/tls: don't send IPv6 literals and absolute FQDNs as SNI values Mikio Hara 2016-02-19 16:25:52 +0900
  • 6ae0475759 all: fix typos and spelling Martin Möhrmann 2016-02-24 11:55:20 +0100
  • fd1ada09a1 crypto/tls: Improve ambiguous comment in cipher_suites.go Brady Sullivan 2016-02-22 15:19:18 -0800
  • 5663f22172 crypto/tls: note in comment that Certificate.Leaf is nil after parsing. Adam Langley 2016-01-19 08:27:10 -0800
  • 008490fcc3 crypto/tls: don't block in Conn.Close if Writes are in-flight Brad Fitzpatrick 2016-01-12 21:15:51 +0000
  • 75bdcc38ef crypto/tls: document lack of Lucky13 hardening Brad Fitzpatrick 2015-12-08 16:49:17 +0000
  • 96e5bf3ce5 crypto/tls: Server can specify an unadvertised cipher suite Ralph Corderoy 2015-11-07 12:18:36 +0000
  • 4d57d90e8e crypto/tls: return a typed error on invalid record headers Caleb Spare 2015-10-20 00:23:11 -0700
  • e90a6f8498 crypto/tls: add TLS_RSA_WITH_AES_128_GCM_SHA256 and TLS_RSA_WITH_AES_256_GCM_SHA384 cipher suites Shenghou Ma 2015-11-14 19:53:03 -0500
  • 527a98e440 crypto/tls, crypto/aes: remove allocations when Writing & Reading Brad Fitzpatrick 2015-11-12 14:09:03 +0000
  • 59e7c9bc39 crypto/tls: len(clientRandom) used for serverRandom source Ralph Corderoy 2015-11-07 11:45:00 +0000
  • f75fa96c2c crypto/tls: don't send IP literals as SNI values. Adam Langley 2015-11-10 11:18:50 -0800
  • 367577a70f Revert "crypto/tls: don't send IP literals as SNI values." Adam Langley 2015-11-09 15:16:12 -0800
  • 25dd71bbe6 crypto/tls: don't send IP literals as SNI values. Adam Langley 2015-11-08 19:10:14 -0800
  • 7c45cbeef9 crypto/tls: better error messages when PEM inputs are switched. Adam Langley 2015-08-30 10:23:30 -0700
  • b5162386a0 crypto/tls: reject ServerHellos with empty ALPN protocols. Adam Langley 2015-07-09 15:42:02 -0700
  • 06234ee3fc crypto/tls: note in comments that setting GetCertificate is now sufficient. aubble 2015-08-20 14:26:56 -0400
  • 6789988ece crypto/tls: allow tls.Listen when only GetCertificate is provided. aubble 2015-08-20 14:31:15 -0400
  • 5bf12753e9 all: fix some vet-caught formatting errors, mostly but not only in tests Rob Pike 2015-08-11 15:29:40 +1000
  • 9c9b97f554 crypto/tls: fix ConnectionState().VerifiedChains for resumed connection Russ Cox 2015-08-05 09:53:56 -0400
  • bd4954ddeb crypto/tls: update testing certificates. Adam Langley 2015-08-05 10:55:41 -0700
  • 9697ba25d2 crypto/tls: check cert chain during VerifyHostname Russ Cox 2015-07-22 12:54:00 -0400
  • d99fd1798a all: link to https instead of http Brad Fitzpatrick 2015-07-10 17:17:11 -0600
  • c757de320b crypto/tls: fix parsing of SNI extension. Adam Langley 2015-06-14 08:15:41 -0700
  • 95ef689b2c all: fix misprints in comments Ainar Garipov 2015-06-11 16:49:38 +0300
  • 65c5bd0dd6 crypto/tls: don't require an explicit client-auth EKU. Adam Langley 2015-06-08 14:24:18 -0700
  • 594d36e1f7 crypto/tls: update the supported signature algorithms. Adam Langley 2015-04-29 10:10:48 -0700
  • 728bcd44b6 crypto/tls: decouple handshake signatures from the handshake hash. Adam Langley 2015-04-28 09:13:38 -0700
  • 0269b0170f crypto/tls: call GetCertificate if Certificates is empty. Adam Langley 2015-04-12 16:41:31 -0700
  • 28ca92f12d crypto/tls: add OCSP response to ConnectionState Jonathan Rudenberg 2015-04-26 12:05:37 -0400
  • 03a329f274 crypto/tls: add support for session ticket key rotation Jonathan Rudenberg 2015-04-17 21:32:11 -0400
  • 8ea126be4d crypto/tls: add support for Certificate Transparency Jonathan Rudenberg 2015-04-16 14:59:22 -0400
  • 65d33c3580 crypto/tls: fix test data generation Jonathan Rudenberg 2015-04-15 15:00:53 -0400
  • 0c7dc105c1 crypto/tls: tidy up a little and add test. Adam Langley 2015-04-02 16:19:46 -0700
  • 14accaf7f3 crypto/tls: make use of crypto.Signer and crypto.Decrypter Jacob H. Haven 2015-03-19 04:01:57 -0700
  • 1282c034fb crypto/tls: Correct minimum version in comment Matt Bostock 2015-02-22 01:14:36 +0000
  • 9c57dac301 all: use "reports whether" in place of "returns true if(f)" Josh Bleecher Snyder 2015-02-17 15:44:42 -0800
  • c1da171db7 crypto/tls: disable RC4 by default. Adam Langley 2015-03-16 17:13:10 -0700
  • 113bae6283 crypto/tls: panic with unknown hash functions. Adam Langley 2015-03-16 16:45:29 -0700
  • c32a7dcd6d crypto/tls: return correct hash function when using client certificates in handshake Joël Stemmer 2015-03-06 14:08:55 +0100
  • 921f871f9e crypto/tls: fix typo in tls handshake error Joël Stemmer 2015-03-06 14:59:12 +0100
  • fb479af552 crypto/tls: allow larger initial records. Adam Langley 2015-02-23 14:51:40 -0800
  • cf73eabe95 all: don't refer to code.google.com/p/go{,-wiki}/ Péter Surányi 2015-02-06 21:44:39 +0900
  • e8ae7b54bb crypto/tls: add support for AES_256_GCM_SHA384 cipher suites specified in RFC5289 Jacob H. Haven 2015-02-03 16:15:18 -0800
  • a1363d2ed9 crypto/ecdsa: make Sign safe with broken entropy sources David Leon Gil 2015-01-26 23:00:21 -0800
  • 3519a50a69 crypto/tls: remove return parameter stutter Brad Fitzpatrick 2015-01-13 11:34:46 -0800
  • 0581a2f81d crypto/tls: fix renegotiation extension. Adam Langley 2014-12-19 15:14:03 -0800
  • 0511e2597e crypto/tls: change default minimum version to TLS 1.0. Adam Langley 2014-12-18 11:31:14 -0800
  • 18902d24a3 crypto/tls: enable TLS_FALLBACK_SCSV in server with default max version Ben Burkert 2014-12-18 10:17:54 -0800
  • 4e47a4aef7 crypto/tls: support TLS_FALLBACK_SCSV as a server. Adam Langley 2014-10-15 17:54:04 -0700
  • d279bab6f5 crypto/tls: ensure that we don't resume when tickets are disabled. Adam Langley 2014-09-26 11:02:09 +1000
  • 14e9aa8cf5 crypto/tls: print unexpected error in test Russ Cox 2014-09-07 09:07:19 -0400
  • b88cd69926 crypto: add Signer Adam Langley 2014-08-29 12:36:30 -0700
  • 16b2f42015 crypto/tls: implement tls-unique channel binding (RFC 5929 section 3). Tested against GnuTLS and Python. Andres Erbsen 2014-08-11 16:40:42 -0700
  • 9e441ebf1d crypto/tls: Added dynamic alternative to NameToCertificate map for SNI Percy Wegmann 2014-08-06 11:22:00 -0700
  • 5e8d397065 crypto/tls: add ALPN support. Adam Langley 2014-08-05 11:36:20 -0700
  • 4fe9ec0490 crypto/tls: check curve equation in ECDHE. Adam Langley 2014-07-28 15:46:27 -0700
  • cf213d5c40 crypto/tls: Support ECDSA keys in generate_cert.go Asim Shankar 2014-07-28 14:46:34 -0700
  • 601d9250e6 src, misc: applied gofmt -w -s Robert Griesemer 2014-07-01 10:28:10 -0700
  • 38da2b7bd9 crypto/tls: fix typo referencing the required Config field Brad Fitzpatrick 2014-06-03 18:11:17 +1000
  • 73687a33ac std lib: fix various typos in comments Robert Griesemer 2014-05-02 13:17:55 -0700
  • 71f215c69a all: spelling tweaks, A-G Robert Hencke 2014-04-29 12:44:40 -0400
  • 89d6b4b257 crypto/tls: don't block on Read of zero bytes Brad Fitzpatrick 2014-04-15 19:40:00 -0700
  • 53431b940d crypto/tls: deflake TestConnReadNonzeroAndEOF Brad Fitzpatrick 2014-04-02 14:31:57 -0700
  • a56b0bf7e2 crypto/tls: make Conn.Read return (n, io.EOF) when EOF is next in buffer Brad Fitzpatrick 2014-03-25 10:58:35 -0700
  • cb66b63918 encoding/asn1: use GeneralizedTime for times outside the range of UTCTime. Adam Langley 2014-03-21 11:14:38 -0400
  • ab3538d779 crypto/tls: clarify concurrent use of Config Brad Fitzpatrick 2014-03-20 08:32:06 -0700
  • ef4934a9ed crypto/tls: split connErr to avoid read/write races. Adam Langley 2014-03-03 09:01:44 -0500
  • 8d65af24c4 crypto/tls: add DialWithDialer. Adam Langley 2014-02-28 09:40:12 -0500
  • 24720a0864 crypto/tls: report TLS version in ConnectionState. Adam Langley 2014-02-24 18:01:28 -0500
  • 514cfc8a40 crypto/tls: pick ECDHE curves based on server preference. Adam Langley 2014-02-24 17:57:51 -0500
  • 2680804ebc crypto/tls: enforce that either ServerName or InsecureSkipVerify be given. Adam Langley 2014-02-21 15:56:41 -0500
  • dbe3452407 crypto/x509: add example of using a custom root list. Adam Langley 2014-02-19 11:18:35 -0500
  • ae10e2fdd9 crypto/tls: improve documentation for ServerName. Adam Langley 2014-02-19 11:17:09 -0500
  • 5a2aacff2f crypto/tls: better error messages. Adam Langley 2014-02-12 11:20:01 -0500
  • 8cf5d703de crypto/tls: do not send the current time in hello messages Anthony Martin 2014-02-04 10:51:37 -0500
  • 9323f900fd crypto/tls: Client side support for TLS session resumption. Gautham Thambidorai 2014-01-22 18:24:03 -0500
  • 6f38414b48 crypto/tls: support renegotiation extension. Adam Langley 2014-01-09 13:38:11 -0500
  • 98968dca72 crypto/tls: rework reference tests. Adam Langley 2013-12-20 11:37:05 -0500
  • 75982d4f0c crypto/tls: generate random serial numbers. Adam Langley 2013-12-15 12:57:57 -0500
  • 1a11255b00 crypto/tls: advertise support for RSA+SHA1 in TLS 1.2 handshake. Adam Langley 2013-10-21 16:35:09 -0400
  • a13de249ee crypto/tls: document ConnectionState fields Russ Cox 2013-10-02 21:40:01 -0400
  • 3ee1782da4 crypto/tls: Update reference to the TLS 1.2 RFC. Frithjof Schulze 2013-10-02 12:09:13 -0400