aboutsummaryrefslogtreecommitdiff
path: root/src/database/sql/sql_test.go
diff options
context:
space:
mode:
authorFilippo Valsorda <filippo@golang.org>2020-06-18 22:45:52 -0400
committerKatie Hockman <katiehockman@google.com>2020-07-14 12:24:21 +0000
commit9c0a6cec5b8413ae837e8eeb5743ea1de2d819fc (patch)
tree8ddb46ef10ee35be77a140a254a81f263ce3d509 /src/database/sql/sql_test.go
parentf3529ca9610be93ac4bb6fedc65429f7984227b6 (diff)
downloadgo-9c0a6cec5b8413ae837e8eeb5743ea1de2d819fc.tar.xz
[release-branch.go1.14-security] crypto/x509: respect VerifyOptions.KeyUsages on Windows
When using the platform verifier on Windows (because Roots is nil) we were always enforcing server auth EKUs if DNSName was set, and none otherwise. If an application was setting KeyUsages, they were not being respected. Started correctly surfacing IncompatibleUsage errors from the system verifier, as those are the ones applications will see if they are affected by this change. Also refactored verify_test.go to make it easier to add tests for this, and replaced the EKULeaf chain with a new one that doesn't have a SHA-1 signature. Thanks to Niall Newman for reporting this. Fixes #39360 Fixes CVE-2020-14039 Change-Id: If5c00d615f2944f7d57007891aae1307f9571c32 Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/774414 Reviewed-by: Katie Hockman <katiehockman@google.com> Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/793511 Reviewed-by: Filippo Valsorda <valsorda@google.com>
Diffstat (limited to 'src/database/sql/sql_test.go')
0 files changed, 0 insertions, 0 deletions