mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 04:27:36 +03:00
crypto/tls: disable RSA-PSS in TLS 1.2
Most of the issues that led to the decision on #30055 were related to incompatibility with or faulty support for RSA-PSS (#29831, #29779, v1.5 signatures). RSA-PSS is required by TLS 1.3, but is also available to be negotiated in TLS 1.2. Altering TLS 1.2 behavior based on GODEBUG=tls13=1 feels surprising, so just disable RSA-PSS entirely in TLS 1.2 until TLS 1.3 is on by default, so breakage happens all at once. Updates #30055 Change-Id: Iee90454a20ded8895e5302e8bcbcd32e4e3031c2 Reviewed-on: https://go-review.googlesource.com/c/160998 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
6fa53d1012
commit
b5bf3890ae
15 changed files with 1045 additions and 43 deletions
|
@ -142,6 +142,7 @@ func runDynamicRecordSizingTest(t *testing.T, config *Config) {
|
|||
|
||||
handshakeDone := make(chan struct{})
|
||||
recordSizesChan := make(chan []int, 1)
|
||||
defer func() { <-recordSizesChan }() // wait for the goroutine to exit
|
||||
go func() {
|
||||
// This goroutine performs a TLS handshake over clientConn and
|
||||
// then reads TLS records until EOF. It writes a slice that
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue