• Filippo Valsorda's avatar
    crypto/tls: implement TLS 1.3 PSK authentication (client side) · d669cc47
    Filippo Valsorda authored
    Also check original certificate validity when resuming TLS 1.0–1.2. Will
    refuse to resume a session if the certificate is expired or if the
    original connection had InsecureSkipVerify and the resumed one doesn't.
    
    Support only PSK+DHE to protect forward secrecy even with lack of a
    strong session ticket rotation story.
    
    Tested with NSS because s_server does not provide any way of getting the
    same session ticket key across invocations. Will self-test like TLS
    1.0–1.2 once server side is implemented.
    
    Incorporates CL 128477 by @santoshankr.
    
    Fixes #24919
    Updates #9671
    
    Change-Id: Id3eaa5b6c77544a1357668bf9ff255f3420ecc34
    Reviewed-on: https://go-review.googlesource.com/c/147420Reviewed-by: 's avatarAdam Langley <agl@golang.org>
    d669cc47
Name
Last commit
Last update
.github Loading commit data...
api Loading commit data...
doc Loading commit data...
lib/time Loading commit data...
misc Loading commit data...
src Loading commit data...
test Loading commit data...
.gitattributes Loading commit data...
.gitignore Loading commit data...
AUTHORS Loading commit data...
CONTRIBUTING.md Loading commit data...
CONTRIBUTORS Loading commit data...
LICENSE Loading commit data...
PATENTS Loading commit data...
README.md Loading commit data...
favicon.ico Loading commit data...
robots.txt Loading commit data...