diff --git a/doc/go1.14.html b/doc/go1.14.html index 655144201f..75e04a6821 100644 --- a/doc/go1.14.html +++ b/doc/go1.14.html @@ -453,19 +453,61 @@ TODO
crypto/tls

- TODO: https://golang.org/cl/191976: remove SSLv3 support + Support for SSL version 3.0 (SSLv3) has been removed. Note that SSLv3 is the + cryptographically broken + protocol predating TLS.

- TODO: https://golang.org/cl/191999: remove TLS 1.3 opt-out + TLS 1.3 can't be disabled via the GODEBUG environment + variable anymore. Use the + Config.MaxVersion + field to configure TLS versions. +

+ +

+ When multiple certificate chains are provided through the + Config.Certificates + field, the first one compatible with the peer is now automatically + selected. This allows for example providing an ECDSA and an RSA + certificate, and letting the package automatically select the best one. + Note that the performance of this selection is going to be poor unless the + Certificate.Leaf + field is set. +

+ +

+ The new CipherSuites + and InsecureCipherSuites + functions return a list of currently implemented cipher suites. + The new CipherSuiteName + function returns a name for a cipher suite ID. +

+ +

+ The new + (*ClientHelloInfo).SupportsCertificate and + + (*CertificateRequestInfo).SupportsCertificate + methods expose whether a peer supports a certain certificate.

- The tls package no longer supports NPN and now only - supports ALPN. In previous releases it supported both. There are - no API changes and code should function identically as before. - Most other clients & servers have already removed NPN support in - favor of the standardized ALPN. + The tls package no longer supports the legacy Next Protocol + Negotiation (NPN) extension and now only supports ALPN. In previous + releases it supported both. There are no API changes and applications + should function identically as before. Most other clients and servers have + already removed NPN support in favor of the standardized ALPN. +

+ +

+ RSA-PSS signatures are now used when supported in TLS 1.2 handshakes. This + won't affect most applications, but custom + Certificate.PrivateKey + implementations that don't support RSA-PSS signatures will need to use the new + + Certificate.SupportedSignatureAlgorithms + field to disable them.