Alternative TLS implementation in Go
Go to file
Kevin Burke 20de5509db crypto/tls: recommend P256 elliptic curve
Users (like myself) may be tempted to think the higher-numbered curve
is somehow better or more secure, but P256 is currently the best
ECDSA implementation, due to its better support in TLS clients, and a
constant time implementation.

For example, sites that present a certificate signed with P521
currently fail to load in Chrome stable, and the error on the Go side
says simply "remote error: tls: illegal parameter".

Fixes #19901.

Change-Id: Ia5e689e7027ec423624627420e33029c56f0bd82
Reviewed-on: https://go-review.googlesource.com/40211
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
2017-04-10 17:40:01 +00:00
testdata crypto/tls: enable ChaCha20-Poly1305 cipher suites by default. 2016-10-18 06:54:30 +00:00
alert.go crypto/tls: switch to OpenSSL 1.1.0 for test data. 2016-10-12 17:03:46 +00:00
cipher_suites.go crypto/tls: disable CBC cipher suites with SHA-256 by default 2017-01-17 16:41:09 +00:00
common.go crypto/tls: make Config.Clone also clone the GetClientCertificate field 2017-03-02 19:43:07 +00:00
conn_test.go crypto/tls: use io.ReadFull in conn_test.go 2017-02-24 02:36:10 +00:00
conn.go crypto/tls: don't hold lock when closing underlying net.Conn. 2017-02-09 19:02:55 +00:00
example_test.go crypto/tls: add example for Config KeyLogWriter 2016-11-17 03:24:31 +00:00
generate_cert.go crypto/tls: recommend P256 elliptic curve 2017-04-10 17:40:01 +00:00
handshake_client_test.go cmd/gofmt, crypto/tls: fix typos 2016-11-11 16:42:40 +00:00
handshake_client.go crypto/tls: reject SNI values with a trailing dot. 2017-02-01 21:59:57 +00:00
handshake_messages_test.go crypto/tls: reject SNI values with a trailing dot. 2017-02-01 21:59:57 +00:00
handshake_messages.go crypto/tls: reject SNI values with a trailing dot. 2017-02-01 21:59:57 +00:00
handshake_server_test.go crypto/tls: reject SNI values with a trailing dot. 2017-02-01 21:59:57 +00:00
handshake_server.go crypto/tls: add a SignatureScheme type. 2016-10-27 17:11:04 +00:00
handshake_test.go crypto/tls: switch to OpenSSL 1.1.0 for test data. 2016-10-12 17:03:46 +00:00
key_agreement.go crypto/tls: support X25519. 2016-10-12 17:04:28 +00:00
prf_test.go crypto/tls: decouple handshake signatures from the handshake hash. 2015-04-30 03:47:02 +00:00
prf.go all: standardize RFC mention format 2016-04-12 21:07:52 +00:00
ticket.go crypto/tls: minor refactors for readability 2016-03-14 21:17:37 +00:00
tls_test.go crypto/tls: make Config.Clone also clone the GetClientCertificate field 2017-03-02 19:43:07 +00:00
tls.go crypto/tls: disable CBC cipher suites with SHA-256 by default 2017-01-17 16:41:09 +00:00