• Adam Langley's avatar
    crypto/tls: fix renegotiation extension. · ea64e578
    Adam Langley authored
    There are two methods by which TLS clients signal the renegotiation
    extension: either a special cipher suite value or a TLS extension.
    
    It appears that I left debugging code in when I landed support for the
    extension because there's a "+ 1" in the switch statement that shouldn't
    be there.
    
    The effect of this is very small, but it will break Firefox if
    security.ssl.require_safe_negotiation is enabled in about:config.
    (Although almost nobody does this.)
    
    This change fixes the original bug and adds a test. Sadly the test is a
    little complex because there's no OpenSSL s_client option that mirrors
    that behaviour of require_safe_negotiation.
    
    Change-Id: Ia6925c7d9bbc0713e7104228a57d2d61d537c07a
    Reviewed-on: https://go-review.googlesource.com/1900Reviewed-by: 's avatarRuss Cox <rsc@golang.org>
    Reviewed-by: 's avatarBrad Fitzpatrick <bradfitz@golang.org>
    ea64e578
Name
Last commit
Last update
..
aes Loading commit data...
cipher Loading commit data...
des Loading commit data...
dsa Loading commit data...
ecdsa Loading commit data...
elliptic Loading commit data...
hmac Loading commit data...
md5 Loading commit data...
rand Loading commit data...
rc4 Loading commit data...
rsa Loading commit data...
sha1 Loading commit data...
sha256 Loading commit data...
sha512 Loading commit data...
subtle Loading commit data...
tls Loading commit data...
x509 Loading commit data...
crypto.go Loading commit data...