aboutsummaryrefslogtreecommitdiff
path: root/ssh/testdata
diff options
context:
space:
mode:
authorFilippo Valsorda <filippo@golang.org>2022-03-14 06:24:16 -0400
committerFilippo Valsorda <filippo@golang.org>2022-03-14 23:46:46 +0000
commitfcc990c556feee8d78e4f1019de3b4416fce00d9 (patch)
tree29107d54474ffd7ed334b83ccd6248917eb822e7 /ssh/testdata
parent4d399097f05b98e0973e9bf7449c6b1f2f50fbe4 (diff)
downloadgo-x-crypto-fcc990c556feee8d78e4f1019de3b4416fce00d9.tar.xz
ssh: deprecate and replace SigAlgo constants
RFC 8332, Section 2 sets up two overlapping namespaces: public key formats and public key algorithms. * The formats are what we currently have KeyAlgo constants for, and they appear in PublicKey.Type. * The algorithms are the set of both KeyAlgo and SigAlgo constants, and they appear in Signature.Format (amongst other places). This is incoherent, because that means Signature.Format can be both a KeyAlgo (like KeyAlgoECDSA256) or a SigAlgo (like SigAlgoRSASHA2256). One solution would be to duplicate all the KeyAlgo constants into the SigAlgo namespace, but that would be confusing because applications are currently using KeyAlgos where they'd be supposed to use the new SigAlgos (while we can't deprecate the KeyAlgos because they are still necessary for the PublicKey.Type namespace). Instead, drop the separate namespaces, and use KeyAlgos throughout. There are simply some KeyAlgos that can't be a PublicKey.Type. Take the opportunity to fix the stuttering SHA22565/SHA2512 names. It's totally ok to call those hashes SHA-256 and SHA-512 without the family infix. For golang/go#49952 Change-Id: Ia1fce3912a7e60aa70a88f75ed311be331fd19d5 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/392354 Trust: Filippo Valsorda <filippo@golang.org> Run-TryBot: Filippo Valsorda <filippo@golang.org> Reviewed-by: Roland Shoemaker <roland@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org>
Diffstat (limited to 'ssh/testdata')
0 files changed, 0 insertions, 0 deletions