• Filippo Valsorda's avatar
    crypto/tls: implement TLS 1.3 PSK authentication (client side) · d669cc47
    Filippo Valsorda authored
    Also check original certificate validity when resuming TLS 1.0–1.2. Will
    refuse to resume a session if the certificate is expired or if the
    original connection had InsecureSkipVerify and the resumed one doesn't.
    
    Support only PSK+DHE to protect forward secrecy even with lack of a
    strong session ticket rotation story.
    
    Tested with NSS because s_server does not provide any way of getting the
    same session ticket key across invocations. Will self-test like TLS
    1.0–1.2 once server side is implemented.
    
    Incorporates CL 128477 by @santoshankr.
    
    Fixes #24919
    Updates #9671
    
    Change-Id: Id3eaa5b6c77544a1357668bf9ff255f3420ecc34
    Reviewed-on: https://go-review.googlesource.com/c/147420Reviewed-by: 's avatarAdam Langley <agl@golang.org>
    d669cc47
prf_test.go 6.58 KB