<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go-x-crypto, branch v0.40.0</title>
<subtitle>Fork of golang.org/x/crypto with my patches.</subtitle>
<id>http://git.kilabit.info/go-x-crypto/atom?h=v0.40.0</id>
<link rel='self' href='http://git.kilabit.info/go-x-crypto/atom?h=v0.40.0'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/'/>
<updated>2025-07-10T17:21:43Z</updated>
<entry>
<title>go.mod: update golang.org/x dependencies</title>
<updated>2025-07-10T17:21:43Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-07-09T21:06:42Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=459a9db11b9c43bb1d61722bfd371751d6de05c9'/>
<id>urn:sha1:459a9db11b9c43bb1d61722bfd371751d6de05c9</id>
<content type='text'>
Update golang.org/x dependencies to their latest tagged versions.

Change-Id: I3a89b1890ad2f7d2b2c23e1efce60c19e43dd381
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/687017
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
</content>
</entry>
<entry>
<title>ssh: add AlgorithmNegotiationError</title>
<updated>2025-07-09T15:43:26Z</updated>
<author>
<name>Nicola Murino</name>
<email>nicola.murino@gmail.com</email>
</author>
<published>2024-01-27T18:29:59Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=74e709ad8a8068445173aa5f3e8d7c89caf510c3'/>
<id>urn:sha1:74e709ad8a8068445173aa5f3e8d7c89caf510c3</id>
<content type='text'>
Fixes golang/go#61536

Change-Id: Id38cc6d46879dbe2bdea04dec061596387ec6cfe
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/559056
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Filippo Valsorda &lt;filippo@golang.org&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Auto-Submit: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>acme: fix TLSALPN01ChallengeCert for IP address identifiers</title>
<updated>2025-06-30T19:50:50Z</updated>
<author>
<name>Daniel McCarney</name>
<email>daniel@binaryparadox.net</email>
</author>
<published>2025-05-30T16:42:24Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=b3790b8d914304c8187dc2c86800101c329d77cd'/>
<id>urn:sha1:b3790b8d914304c8187dc2c86800101c329d77cd</id>
<content type='text'>
When creating a TLS-ALPN-01 challenge response certificate for an IP
address identifier we need to configure the template IPAddresses field,
not the DNSNames/Subject.CommonName.

Along the way we can do some small tidying:
* Updating the draft TLS-ALPN-01 reference to the finalized RFC
* Adding a reference to the IP address identifier ACME RFC
* Adding a mention of the form the challenge validation request's SNI
  will take when verifying an IP address identifier
* Tidying the private tlsChallengeCert() function to take a single
  identifier as arg since the only call-sites provide singular values
  since the removal of the TLS-SNI-[01|02] challenge helpers.

This allows enabling an IP address identifier in the Pebble integration
tests that otherwise caused a validation failure for TLS-ALPN-01
challenge types because the IP address was used as a DNS SAN.

Updates golang/go#73914

Cq-Include-Trybots: luci.golang.try:x_crypto-gotip-linux-amd64-longtest
Change-Id: Ic671e41b585f424f821db65206c7ffcc6dd386a0
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/677576
Reviewed-by: Ian Stapleton Cordasco &lt;graffatcolmingov@gmail.com&gt;
Auto-Submit: Daniel McCarney &lt;daniel@binaryparadox.net&gt;
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>acme: add Pebble integration testing</title>
<updated>2025-06-30T16:51:57Z</updated>
<author>
<name>Daniel McCarney</name>
<email>daniel@binaryparadox.net</email>
</author>
<published>2025-05-29T18:34:34Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=1dc4269656dd23b2c4e71c51b8af6bc2b63eecb7'/>
<id>urn:sha1:1dc4269656dd23b2c4e71c51b8af6bc2b63eecb7</id>
<content type='text'>
This commit adds integration test coverage for a complete TLS-ALPN-01
and HTTP-01 based issuance flow.

For each tested challenge type we:

* Spin up a pebble/pebble-challtestsrv environment
* Spin up a small challenge response server
* Create an ACME account
* Create an order for multiple DNS type identifiers
* Provision challenge responses based on the challenge type under test
* Wait for the order to become ready for issuance
* Finalize the order, issuing a certificate
* Check the newly issued certificate chain validates with the Pebble
  trust anchor, and that the certificate is valid for each of the names
  from our initial order

These tests are skipped in short mode (Pebble has variable delays for
validation requests).

The Pebble source is fetched through the Go module proxy (unless
a local directory is specified to aid development), similar to how the
stdlib crypto packages fetch BoGo tooling.

More test coverage for various other parts of the protocol (key
rollover, account/authz deactivation, revocation, etc) can be added as
follow-up work now that the groundwork for integration testing is laid.

Fixes golang/go#73914

Cq-Include-Trybots: luci.golang.try:x_crypto-gotip-linux-amd64-longtest
Change-Id: I4e79f4858f31ef290a0c91d345e15fbdc510e9ab
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/677575
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
Auto-Submit: Daniel McCarney &lt;daniel@binaryparadox.net&gt;
Reviewed-by: Ian Stapleton Cordasco &lt;graffatcolmingov@gmail.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
</content>
</entry>
<entry>
<title>blake2b: implement hash.XOF</title>
<updated>2025-06-30T16:39:26Z</updated>
<author>
<name>qiulaidongfeng</name>
<email>2645477756@qq.com</email>
</author>
<published>2025-01-25T09:26:55Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=97bf78725562ce22e18036873215f2203b3e0e1e'/>
<id>urn:sha1:97bf78725562ce22e18036873215f2203b3e0e1e</id>
<content type='text'>
Fixes golang/go#69518

Change-Id: Id9989ac9b28262df77017e97f985f67c1571c3ce
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/644255
Reviewed-by: Austin Clements &lt;austin@google.com&gt;
Auto-Submit: Austin Clements &lt;austin@google.com&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
</content>
</entry>
<entry>
<title>x509roots/fallback: update bundle</title>
<updated>2025-06-30T16:08:05Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-06-16T16:01:14Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=952517d181d424f6c77f7460bf728205cb048411'/>
<id>urn:sha1:952517d181d424f6c77f7460bf728205cb048411</id>
<content type='text'>
This is an automated CL which updates the NSS root bundle.

[git-generate]
go generate ./x509roots

Change-Id: Icb71f9f7c509dc6f49ad4385aa287bd6a8966523
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/681915
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
</content>
</entry>
<entry>
<title>ssh: refuse to parse certificates that use a certificate as signing key</title>
<updated>2025-06-30T16:02:50Z</updated>
<author>
<name>Nicola Murino</name>
<email>nicola.murino@gmail.com</email>
</author>
<published>2025-06-04T10:39:12Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=c6fce028266aa1271946a7dfde94cd71cf077d5e'/>
<id>urn:sha1:c6fce028266aa1271946a7dfde94cd71cf077d5e</id>
<content type='text'>
According to draft-miller-ssh-cert-01, Section 2.1.1, certificates with
certificate keys as signature keys are invalid

Change-Id: I474524ea444deb78f2fa7c2682e47c0fd057f0b8
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/678716
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Auto-Submit: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Filippo Valsorda &lt;filippo@golang.org&gt;
</content>
</entry>
<entry>
<title>ssh: reject certificate keys used as signature keys for SSH certs</title>
<updated>2025-06-30T16:02:45Z</updated>
<author>
<name>Nicola Murino</name>
<email>nicola.murino@gmail.com</email>
</author>
<published>2025-06-04T09:54:11Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=0ae49b8145643036e0e6c266cf4edc0f543ea9e0'/>
<id>urn:sha1:0ae49b8145643036e0e6c266cf4edc0f543ea9e0</id>
<content type='text'>
As specified in draft-miller-ssh-cert-01, Section 2.1.1:
Implementations MUST NOT accept certificate keys as CA keys.

Change-Id: I2e559a8a58b7bceccd0d8c6b80803abdbe281067
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/678715
Reviewed-by: Filippo Valsorda &lt;filippo@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
</content>
</entry>
<entry>
<title>ssh/test: skip KEX test if unsupported by system SSH client</title>
<updated>2025-06-05T17:42:09Z</updated>
<author>
<name>Nicola Murino</name>
<email>nicola.murino@gmail.com</email>
</author>
<published>2025-06-05T16:49:31Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=3bf9d2afd4f01ad3d1f1e2e19ea6ee7ea27f8384'/>
<id>urn:sha1:3bf9d2afd4f01ad3d1f1e2e19ea6ee7ea27f8384</id>
<content type='text'>
Skip the key exchange test when using the system's ssh CLI if the
required KEX algorithm (e.g., mlkem768x25519-sha256) is not supported.
This is determined by running ssh -Q kex and checking for the presence
of the target algorithm.
Prevents false test failures in CI environments with older or limited
SSH implementations.

Cq-Include-Trybots: luci.golang.try:x_crypto-gotip-darwin-amd64-longtest,x_crypto-gotip-linux-amd64-longtest,x_crypto-gotip-windows-amd64-longtest
Change-Id: I3fac703ec70559e18b30d5fff88274335a7c3952
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/679195
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>go.mod: update golang.org/x dependencies</title>
<updated>2025-06-05T15:51:54Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-06-05T15:18:22Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=9bab96736ccafb2ee12ac5f5ac3655c5491825dd'/>
<id>urn:sha1:9bab96736ccafb2ee12ac5f5ac3655c5491825dd</id>
<content type='text'>
Update golang.org/x dependencies to their latest tagged versions.

Change-Id: Icbe0bf922207aefa5ee047a35dfb71843ec75306
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/679135
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
</feed>
