See Implementation Guidance D.Q.
Change-Id: I6a6a465607da94f2bb249934f0561ae04a55e7b7
Reviewed-on: https://go-review.googlesource.com/c/go/+/650575
Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Michael Pratt <mpratt@google.com>
Auto-Submit: Filippo Valsorda <filippo@golang.org>
Reviewed-by: Roland Shoemaker <roland@golang.org>
--- /dev/null
+When [FIPS 140-3 mode](/doc/security/fips140) is enabled, Extended Master Secret
+is now required in TLS 1.2.
return nil, nil, nil, nil
}
+ // FIPS 140-3 requires the use of Extended Master Secret.
+ if !session.extMasterSecret && fips140tls.Required() {
+ return nil, nil, nil, nil
+ }
+
hello.sessionTicket = session.ticket
return
}
hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
hs.finishedHash.Sum())
} else {
+ if fips140tls.Required() {
+ c.sendAlert(alertHandshakeFailure)
+ return errors.New("tls: FIPS 140-3 requires the use of Extended Master Secret")
+ }
hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
hs.hello.random, hs.serverHello.random)
}
// weird downgrade in client capabilities.
return errors.New("tls: session supported extended_master_secret but client does not")
}
+ if !sessionState.extMasterSecret && fips140tls.Required() {
+ // FIPS 140-3 requires the use of Extended Master Secret.
+ return nil
+ }
c.peerCertificates = sessionState.peerCertificates
c.ocspResponse = sessionState.ocspResponse
hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
hs.finishedHash.Sum())
} else {
+ if fips140tls.Required() {
+ c.sendAlert(alertHandshakeFailure)
+ return errors.New("tls: FIPS 140-3 requires the use of Extended Master Secret")
+ }
hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
hs.clientHello.random, hs.hello.random)
}