Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: golang/crypto
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.49.0
Choose a base ref
...
head repository: golang/crypto
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v0.50.0
Choose a head ref
  • 3 commits
  • 5 files changed
  • 3 contributors

Commits on Mar 20, 2026

  1. ssh: swap cbcMinPaddingSize to cbcMinPacketSize to get encLength

    The existing code uses cbcMinPaddingSize incorrectly. That value is
    also used in the first parameter of the max call, meaning it will
    never be used.
    
    Fixes golang/go#78062
    
    Change-Id: I4243ab668168313919df33d78c6965e9eff0e934
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/754780
    Reviewed-by: Roland Shoemaker <[email protected]>
    LUCI-TryBot-Result: Go LUCI <[email protected]>
    Reviewed-by: Carlos Amedee <[email protected]>
    Reviewed-by: Nicola Murino <[email protected]>
    rob-picard-teleport authored and drakkan committed Mar 20, 2026
    Configuration menu
    Copy the full SHA
    81c6cb3 View commit details
    Browse the repository at this point in the history

Commits on Mar 23, 2026

  1. ssh: respect signer's algorithm preference in pickSignatureAlgorithm

    Previously, pickSignatureAlgorithm constructed the list of candidate
    algorithms by iterating over the static list returned by
    algorithmsForKeyFormat. This caused the Signer's preference order
    to be ignored in favor of the library's default internal order.
    
    This change inverts the filtering logic to iterate over the signer's
    supported algorithms first. This ensures that if a MultiAlgorithmSigner
    explicitly prefers a specific algorithm (e.g., rsa-sha2-512 over
    rsa-sha2-256), that preference is preserved and respected during the
    handshake negotiation.
    
    Fixes golang/go#78248
    
    Change-Id: I48a0aac720be7f973963342b82047ce32fc96699
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/746020
    Reviewed-by: Lonny Wong <[email protected]>
    Reviewed-by: Dmitri Shuralyov <[email protected]>
    Auto-Submit: Nicola Murino <[email protected]>
    LUCI-TryBot-Result: Go LUCI <[email protected]>
    Reviewed-by: Filippo Valsorda <[email protected]>
    Reviewed-by: Carlos Amedee <[email protected]>
    drakkan authored and gopherbot committed Mar 23, 2026
    Configuration menu
    Copy the full SHA
    8400f4a View commit details
    Browse the repository at this point in the history

Commits on Apr 9, 2026

  1. go.mod: update golang.org/x dependencies

    Update golang.org/x dependencies to their latest tagged versions.
    
    Change-Id: Ia33bd1cd73db091960b285c234d2cf2622f30943
    Reviewed-on: https://go-review.googlesource.com/c/crypto/+/764501
    LUCI-TryBot-Result: Go LUCI <[email protected]>
    Auto-Submit: Gopher Robot <[email protected]>
    Reviewed-by: David Chase <[email protected]>
    Reviewed-by: Dmitri Shuralyov <[email protected]>
    gopherbot committed Apr 9, 2026
    Configuration menu
    Copy the full SHA
    03ca0dc View commit details
    Browse the repository at this point in the history
Loading