diff --git a/doc/go1.14.html b/doc/go1.14.html index 655144201f..75e04a6821 100644 --- a/doc/go1.14.html +++ b/doc/go1.14.html @@ -453,19 +453,61 @@ TODO
- TODO: https://golang.org/cl/191976: remove SSLv3 support + Support for SSL version 3.0 (SSLv3) has been removed. Note that SSLv3 is the + cryptographically broken + protocol predating TLS.
- TODO: https://golang.org/cl/191999: remove TLS 1.3 opt-out
+ TLS 1.3 can't be disabled via the GODEBUG environment
+ variable anymore. Use the
+ Config.MaxVersion
+ field to configure TLS versions.
+
+ When multiple certificate chains are provided through the
+ Config.Certificates
+ field, the first one compatible with the peer is now automatically
+ selected. This allows for example providing an ECDSA and an RSA
+ certificate, and letting the package automatically select the best one.
+ Note that the performance of this selection is going to be poor unless the
+ Certificate.Leaf
+ field is set.
+
+ The new CipherSuites
+ and InsecureCipherSuites
+ functions return a list of currently implemented cipher suites.
+ The new CipherSuiteName
+ function returns a name for a cipher suite ID.
+
+ The new
+ (*ClientHelloInfo).SupportsCertificate and
+
+ (*CertificateRequestInfo).SupportsCertificate
+ methods expose whether a peer supports a certain certificate.
- The tls package no longer supports NPN and now only
- supports ALPN. In previous releases it supported both. There are
- no API changes and code should function identically as before.
- Most other clients & servers have already removed NPN support in
- favor of the standardized ALPN.
+ The tls package no longer supports the legacy Next Protocol
+ Negotiation (NPN) extension and now only supports ALPN. In previous
+ releases it supported both. There are no API changes and applications
+ should function identically as before. Most other clients and servers have
+ already removed NPN support in favor of the standardized ALPN.
+
+ RSA-PSS signatures are now used when supported in TLS 1.2 handshakes. This
+ won't affect most applications, but custom
+ Certificate.PrivateKey
+ implementations that don't support RSA-PSS signatures will need to use the new
+
+ Certificate.SupportedSignatureAlgorithms
+ field to disable them.