From c80897b691a5f5541e8491b29a42877aed33140c Mon Sep 17 00:00:00 2001 From: Filippo Valsorda Date: Mon, 16 Jul 2018 16:25:06 -0400 Subject: [PATCH] doc: populate and add go1.11 notes related to crypto Change-Id: I8163d06e5099d7ac39b04ccadf7f6533967db2f5 Reviewed-on: https://go-review.googlesource.com/124135 Reviewed-by: Andrew Bonventre --- doc/go1.11.html | 51 ++++++++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 48 insertions(+), 3 deletions(-) diff --git a/doc/go1.11.html b/doc/go1.11.html index 7fec20b3e6..2ce6875bdb 100644 --- a/doc/go1.11.html +++ b/doc/go1.11.html @@ -188,7 +188,11 @@ Do not send CLs removing the interior tags from such phrases.
crypto

- TODO: https://golang.org/cl/64451: randomly read an extra byte of randomness in some places. + Certain crypto operations, including + crypto/ecdsa.Sign, + crypto/rsa.EncryptPKCS1v15 and + crypto/rsa.GenerateKey, + now randomly read an extra byte of randomness to ensure tests don't rely on internal behavior.

@@ -196,7 +200,8 @@ Do not send CLs removing the interior tags from such phrases.
crypto/cipher

- TODO: https://golang.org/cl/48510: add NewGCMWithTagSize for custom tag sizes. + The new NewGCMWithTagSize + implements Galois Counter Mode with non-standard tag lengths for compatibility with existing cryptosystems.

@@ -204,11 +209,47 @@ Do not send CLs removing the interior tags from such phrases.
crypto/rsa

- TODO: https://golang.org/cl/103876: add PublicKey.Size accessor + PublicKey now implements a + Size method that + returns the modulus size in bytes.

+
crypto/tls
+
+

+ ConnectionState's new + ExportKeyingMaterial field allows exporting keying material bound to the + connection according to RFC 5705. +

+ +
+ +
crypto/x509
+
+

+ The deprecated, legacy behavior of treating the Common Name field as + a hostname when no Subject Alternative Names are present is now disabled when the CN is not a + valid hostname. + The Common Name can be completely ignored by adding the experimental value + x509ignoreCN=1 to the GODEBUG environment variable. + When the CN is ignored, certificates without SANs validate under chains with name constraints + instead of returning NameConstraintsWithoutSANs. +

+ +

+ Extended key usage restrictions are again checked only if they appear in the KeyUsages + field of VerifyOptions, instead of all at once. +

+ +

+ The value returned by SystemCertPool + is now cached and might not reflect system changes between invocations. +

+ +
+
debug/elf

@@ -287,6 +328,10 @@ Do not send CLs removing the interior tags from such phrases. TODO: https://golang.org/cl/74851: speed-up addMulVVW on amd64

+

+ ModInverse now returns nil when g and n are not relatively prime. The result was previously undefined. +

+
mime/multipart
-- 2.50.0