• Adam Langley's avatar
    crypto/tls: use pool building for certificate checking · 836529a6
    Adam Langley authored
    Previously we checked the certificate chain from the leaf
    upwards and expected to jump from the last cert in the chain to
    a root certificate.
    
    Although technically correct, there are a number of sites with
    problems including out-of-order certs, superfluous certs and
    missing certs.
    
    The last of these requires AIA chasing, which is a lot of
    complexity. However, we can address the more common cases by
    using a pool building algorithm, as browsers do.
    
    We build a pool of root certificates and a pool from the
    server's chain. We then try to build a path to a root
    certificate, using either of these pools.
    
    This differs from the behaviour of, say, Firefox in that Firefox
    will accumulate intermedite certificate in a persistent pool in
    the hope that it can use them to fill in gaps in future chains.
    
    We don't do that because it leads to confusing errors which only
    occur based on the order to sites visited.
    
    This change also enabled SNI for tls.Dial so that sites will return
    the correct certificate chain.
    
    R=rsc
    CC=golang-dev
    https://golang.org/cl/2916041
    836529a6
Name
Last commit
Last update
..
aes Loading commit data...
block Loading commit data...
blowfish Loading commit data...
cast5 Loading commit data...
hmac Loading commit data...
md4 Loading commit data...
md5 Loading commit data...
ocsp Loading commit data...
rand Loading commit data...
rc4 Loading commit data...
ripemd160 Loading commit data...
rsa Loading commit data...
sha1 Loading commit data...
sha256 Loading commit data...
sha512 Loading commit data...
subtle Loading commit data...
tls Loading commit data...
x509 Loading commit data...
xtea Loading commit data...