Hello golang-dev@googlegroups.com, agl@golang.org, rsc@golang.org, alex.brainman@gmail.com (cc: golang-dev@googlegroups.com, kalthorn@gmail.com), I'd like you to review this change ...
13 years, 2 months ago
(2012-02-25 16:52:48 UTC)
#1
Thank you for doing the work but I'm afraid that I must admit to feeling ...
13 years, 2 months ago
(2012-02-26 21:18:09 UTC)
#2
Thank you for doing the work but I'm afraid that I must admit to feeling that
this isn't right. It's also crypto/tls specific rather than being available to
any users of crypto/x509.
My feeling is that crypto/x509 can export a *CertPool on Windows meaning `the
system roots' and then crypto/x509.*Certificate.Verify can recognise this magic
and have CAPI build the chains directly. CAPI is generally very good code.
I think this reuses much of this CL and hopefully the result is cleaner and more
general.
On 2012/02/26 21:18:09, agl1 wrote: > Thank you for doing the work but I'm afraid ...
13 years, 2 months ago
(2012-02-26 21:35:07 UTC)
#3
On 2012/02/26 21:18:09, agl1 wrote:
> Thank you for doing the work but I'm afraid that I must admit to feeling that
> this isn't right. It's also crypto/tls specific rather than being available to
> any users of crypto/x509.
>
> My feeling is that crypto/x509 can export a *CertPool on Windows meaning `the
> system roots' and then crypto/x509.*Certificate.Verify can recognise this
magic
> and have CAPI build the chains directly. CAPI is generally very good code.
>
> I think this reuses much of this CL and hopefully the result is cleaner and
more
> general.
SGTM, but can we do this without adding exports to crypto/x509 (I suppose that
would break the API freeze)?
I suppose we could overload a nil CertPool to mean system roots for Windows, and
change it after Go 1. Any better suggestions?
On Sun, Feb 26, 2012 at 4:35 PM, <krautz@gmail.com> wrote: > I suppose we could ...
13 years, 2 months ago
(2012-02-26 21:41:01 UTC)
#4
On Sun, Feb 26, 2012 at 4:35 PM, <krautz@gmail.com> wrote:
> I suppose we could overload a nil CertPool to mean system roots for
> Windows, and change it after Go 1. Any better suggestions?
Oh yes, absolutely. I think nil should mean system roots in
crypto/tls. Simply adding exports doesn't break an API, even if other
packages in the core use them, it's only when existing, external, code
would have to change that it's an issue.
Cheers
AGL
On 2012/02/26 21:41:01, agl1 wrote: > On Sun, Feb 26, 2012 at 4:35 PM, <mailto:krautz@gmail.com> ...
13 years, 2 months ago
(2012-02-26 21:55:10 UTC)
#5
On 2012/02/26 21:41:01, agl1 wrote:
> On Sun, Feb 26, 2012 at 4:35 PM, <mailto:krautz@gmail.com> wrote:
> > I suppose we could overload a nil CertPool to mean system roots for
> > Windows, and change it after Go 1. Any better suggestions?
>
> Oh yes, absolutely. I think nil should mean system roots in
> crypto/tls. Simply adding exports doesn't break an API, even if other
> packages in the core use them, it's only when existing, external, code
> would have to change that it's an issue.
I actually meant in crypto/x509 -- to avoid adding an export. But if adding one
is fine, I'll do that.
Should I just move all root fetchers to crypto/x509 and export their pools via
x509.*SystemRootPool while I'm there?
Issue 5694078: code review 5694078: crypto/tls: use windows's lazy root fetching
(Closed)
Created 13 years, 2 months ago by mkrautz
Modified 13 years, 2 months ago
Reviewers: golang-dev, agl1, rsc, brainman
Base URL:
Comments: 4