mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
Revert "crypto/tls: disable RSA-PSS in TLS 1.2"
In Go 1.13 we will enable RSA-PSS in TLS 1.2 at the same time as we make TLS 1.3 enabled by default. This reverts commit 7ccd3583eddcd79679fb29cfc83a6e6fb6973f1e. Updates #30055 Change-Id: I6f2ddf7652d1172a6b29f4e335ff3a71a89974bc Reviewed-on: https://go-review.googlesource.com/c/163080 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
2635294fad
commit
2e9a42ccc2
14 changed files with 42 additions and 1043 deletions
|
@ -855,30 +855,6 @@ func TestHandshakeClientCertRSAPKCS1v15(t *testing.T) {
|
|||
runClientTestTLS12(t, test)
|
||||
}
|
||||
|
||||
func TestHandshakeClientCertPSSDisabled(t *testing.T) {
|
||||
config := testConfig.Clone()
|
||||
cert, _ := X509KeyPair([]byte(clientCertificatePEM), []byte(clientKeyPEM))
|
||||
config.Certificates = []Certificate{cert}
|
||||
|
||||
test := &clientTest{
|
||||
name: "ClientCert-RSA-PSS-Disabled",
|
||||
args: []string{"-cipher", "AES128", "-Verify", "1"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
// Restore the default signature algorithms, disabling RSA-PSS in TLS 1.2,
|
||||
// and check that handshakes still work.
|
||||
testSupportedSignatureAlgorithmsTLS12 := supportedSignatureAlgorithmsTLS12
|
||||
defer func() { supportedSignatureAlgorithmsTLS12 = testSupportedSignatureAlgorithmsTLS12 }()
|
||||
supportedSignatureAlgorithmsTLS12 = savedSupportedSignatureAlgorithmsTLS12
|
||||
|
||||
// Use t.Run to ensure the defer runs after all parallel tests end.
|
||||
t.Run("", func(t *testing.T) {
|
||||
runClientTestTLS12(t, test)
|
||||
runClientTestTLS13(t, test)
|
||||
})
|
||||
}
|
||||
|
||||
func TestClientKeyUpdate(t *testing.T) {
|
||||
test := &clientTest{
|
||||
name: "KeyUpdate",
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue