go/src/crypto/x509
Adam Langley 630e93ed2d crypto/x509: ignore CN if SAN extension present.
The code previously tested only whether DNS-name SANs were present in a
certificate which is only approximately correct. In fact, /any/ SAN
extension, including one with no DNS names, should cause the CN to be
ignored.

Change-Id: I3d9824918975be6d4817e7cbb48ed1b0c5a2fc8b
Reviewed-on: https://go-review.googlesource.com/36696
Run-TryBot: Adam Langley <agl@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
2017-02-10 16:20:40 +00:00
..
pkix crypto/x509: parse all names in an RDN. 2016-10-11 17:35:55 +00:00
cert_pool.go crypto/x509: revert SystemCertPool implementation for Windows 2017-01-18 05:41:15 +00:00
example_test.go
pem_decrypt.go
pem_decrypt_test.go
pkcs1.go
pkcs8.go all: standardize RFC mention format 2016-04-12 21:07:52 +00:00
pkcs8_test.go
root.go
root_bsd.go
root_cgo_darwin.go crypto/x509: read Darwin trust settings for root CAs 2016-12-01 19:24:34 +00:00
root_darwin.go crypto/x509: fix spelling/grammar in comments 2016-12-20 04:56:53 +00:00
root_darwin_arm_gen.go
root_darwin_armx.go
root_darwin_test.go crypto/x509: speed up and deflake non-cgo Darwin root cert discovery 2016-12-20 04:48:09 +00:00
root_linux.go crypto/x509: check for new tls-ca-bundle.pem last 2017-02-07 17:19:05 +00:00
root_nacl.go
root_nocgo_darwin.go
root_plan9.go
root_solaris.go
root_unix.go
root_windows.go crypto/x509: revert SystemCertPool implementation for Windows 2017-01-18 05:41:15 +00:00
sec1.go all: standardize RFC mention format 2016-04-12 21:07:52 +00:00
sec1_test.go
sha2_windows_test.go
verify.go crypto/x509: ignore CN if SAN extension present. 2017-02-10 16:20:40 +00:00
verify_test.go crypto/x509: ignore CN if SAN extension present. 2017-02-10 16:20:40 +00:00
x509.go crypto/x509: ignore CN if SAN extension present. 2017-02-10 16:20:40 +00:00
x509_test.go crypto/x509: revert SystemCertPool implementation for Windows 2017-01-18 05:41:15 +00:00
x509_test_import.go