mirror of
https://github.com/golang/go.git
synced 2025-12-08 06:10:04 +00:00
crypto/tls: add support for AES_256_GCM_SHA384 cipher suites specified in RFC5289
Generalizes PRF calculation for TLS 1.2 to support arbitrary hashes (SHA-384 instead of SHA-256). Testdata were all updated to correspond with the new cipher suites in the handshake. Change-Id: I3d9fc48c19d1043899e38255a53c80dc952ee08f Reviewed-on: https://go-review.googlesource.com/3265 Reviewed-by: Adam Langley <agl@golang.org>
This commit is contained in:
parent
16e933c266
commit
f1d669aee9
31 changed files with 1185 additions and 968 deletions
|
|
@ -564,6 +564,14 @@ func TestHandshakeServerAESGCM(t *testing.T) {
|
|||
runServerTestTLS12(t, test)
|
||||
}
|
||||
|
||||
func TestHandshakeServerAES256GCMSHA384(t *testing.T) {
|
||||
test := &serverTest{
|
||||
name: "RSA-AES256-GCM-SHA384",
|
||||
command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-RSA-AES256-GCM-SHA384"},
|
||||
}
|
||||
runServerTestTLS12(t, test)
|
||||
}
|
||||
|
||||
func TestHandshakeServerECDHEECDSAAES(t *testing.T) {
|
||||
config := *testConfig
|
||||
config.Certificates = make([]Certificate, 1)
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue