Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: XTLS/REALITY
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: main
Choose a base ref
...
head repository: XTLS/REALITY
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: update
Choose a head ref
Checking mergeability… Don’t worry, you can still create the pull request.
  • 13 commits
  • 15 files changed
  • 1 contributor

Commits on Dec 27, 2025

  1. Update dependencies

    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    a89de81 View commit details
    Browse the repository at this point in the history
  2. crypto/tls: enable signature algorithm BoGo tests (and fix two bugs)

    The two bugs are very minor:
    
    - We were trying to set the ConnectionState CurveID field even if the
      RSA key exchange was in use
    
    - We were sending the wrong alert from TLS 1.2 clients if none of the
      certificate signature algorithms were supported
    
    Change-Id: I6a6a46564f5a9f1a5d44e54fc59a650118ad67d5
    Reviewed-on: https://go-review.googlesource.com/c/go/+/675918
    Auto-Submit: Filippo Valsorda <filippo@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: David Chase <drchase@google.com>
    Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    9261f74 View commit details
    Browse the repository at this point in the history
  3. crypto/tls: ensure the ECDSA curve matches the signature algorithm

    Change-Id: I6a6a4656c1b47ba6bd652d4da18922cb6b80a8ab
    Reviewed-on: https://go-review.googlesource.com/c/go/+/675836
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Auto-Submit: Filippo Valsorda <filippo@golang.org>
    TryBot-Bypass: Filippo Valsorda <filippo@golang.org>
    Reviewed-by: David Chase <drchase@google.com>
    Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    5322131 View commit details
    Browse the repository at this point in the history
  4. crypto/tls: empty server_name conf. ext. from server

    When a TLS server uses the information from the server_name extension in
    a client hello, and the connection isn't resuming, it should return an
    empty server_name extension in its server hello (or encrypted extensions
    for TLS 1.3).
    
    For TLS <1.3 we we do this in doFullHandshake(), by setting the
    pre-existing serverHelloMsg.serverNameAck bool. We know that the
    connection isn't resuming based on the context where this function is
    called.
    
    For TLS 1.3, a new encryptedExtensionsMsg.serverNameAck bool is added,
    and populated as appropriate in sendServerParameters() based on whether
    the conn was resumed or not. The encryptedExtensionsMsg marshalling is
    updated to emit the encrypted extension based on that field.
    
    These changes allow enabling the ServerNameExtensionServer-* bogo tests
    that verify both the presence and absence of the server_name extension
    based on the relevant specifications.
    
    Resolves #74282
    Updates #72006
    
    Change-Id: I703bc2ec916b50906bdece7b7483a7faed7aa8e4
    Reviewed-on: https://go-review.googlesource.com/c/go/+/684795
    TryBot-Bypass: Daniel McCarney <daniel@binaryparadox.net>
    Reviewed-by: Carlos Amedee <carlos@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Auto-Submit: Daniel McCarney <daniel@binaryparadox.net>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    5271c8f View commit details
    Browse the repository at this point in the history
  5. crypto/tls: use standard chacha20-poly1305 cipher suite names

    The different chacha20-poly1305 cipher suites were renamed to
    include the _SHA256 suffix, which is the canonical naming convention.
    
    The occurrences of the old names were still not updated, which can lead
    to confusion when searching for the canonical names in the codebase.
    
    Change-Id: I4f90e9cbedc3552c3481c8b0c616b6f915ddd345
    Reviewed-on: https://go-review.googlesource.com/c/go/+/689135
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    818d94c View commit details
    Browse the repository at this point in the history
  6. crypto/tls: check if quic conn can send session ticket

    On SendSessionTicket, returns nil if SessionTicketsDisabled is disabled in config.
    
    Fixes #62032
    
    Change-Id: Id0c89e2e6fb0805bbf108bb0cafdabdfbaf3897f
    Reviewed-on: https://go-review.googlesource.com/c/go/+/528755
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Damien Neil <dneil@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Mark Freeman <markfreeman@google.com>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    c160832 View commit details
    Browse the repository at this point in the history
  7. crypto/tls: fix quic comment typo

    Change-Id: Ibd6b8d10ecac3cdea33de1218d516b7425443313
    GitHub-Last-Rev: 3d5568b
    GitHub-Pull-Request: #75092
    Reviewed-on: https://go-review.googlesource.com/c/go/+/697575
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Carlos Amedee <carlos@golang.org>
    Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
    Reviewed-by: David Chase <drchase@google.com>
    Reviewed-by: Sean Liao <sean@liao.dev>
    Auto-Submit: Sean Liao <sean@liao.dev>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    e1168fe View commit details
    Browse the repository at this point in the history
  8. crypto/tls: use hash.Cloner

    A hash object needs to be cloned when doing certain steps in a
    TLS 1.3 server handshake. It is more efficient to use the
    hash.Cloner interface to clone a hash than to encode and decode
    the hash object using the binary encoding interfaces.
    
    We still need to support the binary encoding path in case the
    hash objects come from the fips140 v1.0.0 module, given that
    this module doesn't support the hash.Cloner interface.
    
    Change-Id: I8425e14e481dcefafc9aa1e5bfd63b61c22675ad
    Reviewed-on: https://go-review.googlesource.com/c/go/+/682597
    Reviewed-by: Damien Neil <dneil@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    495a9ff View commit details
    Browse the repository at this point in the history
  9. crypto/tls: use context.AfterFunc in handshakeContext

    This saves a goroutine when ctx can be canceled but is not canceled
    during the handshakeContext call.
    
    Use ctx consistently, because in this path (c.quic == nil) handshakeCtx
    will only be canceled when ctx is canceled.
    
    Change-Id: I7f4565119f30d589dce026b0d7ef3c324220525a
    Reviewed-on: https://go-review.googlesource.com/c/go/+/699895
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
    Reviewed-by: Michael Pratt <mpratt@google.com>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    92803b8 View commit details
    Browse the repository at this point in the history
  10. crypto: use clear built-in

    Replace for loops with clear built-in, available since Go 1.21.
    
    Change-Id: I16a2691a68042e9c5cd9bc4197690fa541a081eb
    Reviewed-on: https://go-review.googlesource.com/c/go/+/704877
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    Reviewed-by: Mark Freeman <markfreeman@google.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Sean Liao <sean@liao.dev>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    c1a06fb View commit details
    Browse the repository at this point in the history
  11. all: fix typos

    Change-Id: I290812905b6b5c52f289f7f8524f93aef19e6efe
    Reviewed-on: https://go-review.googlesource.com/c/go/+/706775
    Auto-Submit: Sean Liao <sean@liao.dev>
    Reviewed-by: Michael Knyszek <mknyszek@google.com>
    LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Sean Liao <sean@liao.dev>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    46897c1 View commit details
    Browse the repository at this point in the history
  12. crypto/tls: quote protocols in ALPN error message

    Quote the protocols sent by the client when returning the ALPN
    negotiation error message.
    
    Fixes CVE-2025-58189
    Fixes #75652
    
    Change-Id: Ie7b3a1ed0b6efcc1705b71f0f1e8417126661330
    Reviewed-on: https://go-review.googlesource.com/c/go/+/707776
    Auto-Submit: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Neal Patel <nealpatel@google.com>
    Reviewed-by: Nicholas Husin <nsh@golang.org>
    Auto-Submit: Nicholas Husin <nsh@golang.org>
    Reviewed-by: Nicholas Husin <husin@google.com>
    TryBot-Bypass: Roland Shoemaker <roland@golang.org>
    Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    0e7c80e View commit details
    Browse the repository at this point in the history
  13. crypto/tls: rm marshalEncryptedClientHelloConfigList dead code

    This package internal function has no call sites.
    
    Change-Id: I262058199fd2f387ef3b5e21099421720cc5413e
    Reviewed-on: https://go-review.googlesource.com/c/go/+/707815
    TryBot-Bypass: Daniel McCarney <daniel@binaryparadox.net>
    Auto-Submit: Roland Shoemaker <roland@golang.org>
    Auto-Submit: Daniel McCarney <daniel@binaryparadox.net>
    Reviewed-by: Carlos Amedee <carlos@golang.org>
    Reviewed-by: Roland Shoemaker <roland@golang.org>
    yuhan6665 committed Dec 27, 2025
    Configuration menu
    Copy the full SHA
    c811d70 View commit details
    Browse the repository at this point in the history
Loading