mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 14:42:26 -05:00 
			
		
		
		
	[chore]: Bump golang.org/x/net from 0.15.0 to 0.16.0 (#2260)
Bumps [golang.org/x/net](https://github.com/golang/net) from 0.15.0 to 0.16.0. - [Commits](https://github.com/golang/net/compare/v0.15.0...v0.16.0) --- updated-dependencies: - dependency-name: golang.org/x/net dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
This commit is contained in:
		
					parent
					
						
							
								d173fcdfa3
							
						
					
				
			
			
				commit
				
					
						5aeceb5ff7
					
				
			
		
					 99 changed files with 926 additions and 2273 deletions
				
			
		
							
								
								
									
										38
									
								
								vendor/golang.org/x/crypto/ssh/certs.go
									
										
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										38
									
								
								vendor/golang.org/x/crypto/ssh/certs.go
									
										
									
										generated
									
									
										vendored
									
									
								
							|  | @ -16,8 +16,9 @@ import ( | |||
| 
 | ||||
| // Certificate algorithm names from [PROTOCOL.certkeys]. These values can appear | ||||
| // in Certificate.Type, PublicKey.Type, and ClientConfig.HostKeyAlgorithms. | ||||
| // Unlike key algorithm names, these are not passed to AlgorithmSigner and don't | ||||
| // appear in the Signature.Format field. | ||||
| // Unlike key algorithm names, these are not passed to AlgorithmSigner nor | ||||
| // returned by MultiAlgorithmSigner and don't appear in the Signature.Format | ||||
| // field. | ||||
| const ( | ||||
| 	CertAlgoRSAv01        = "ssh-rsa-cert-v01@openssh.com" | ||||
| 	CertAlgoDSAv01        = "ssh-dss-cert-v01@openssh.com" | ||||
|  | @ -255,10 +256,17 @@ func NewCertSigner(cert *Certificate, signer Signer) (Signer, error) { | |||
| 		return nil, errors.New("ssh: signer and cert have different public key") | ||||
| 	} | ||||
| 
 | ||||
| 	if algorithmSigner, ok := signer.(AlgorithmSigner); ok { | ||||
| 	switch s := signer.(type) { | ||||
| 	case MultiAlgorithmSigner: | ||||
| 		return &multiAlgorithmSigner{ | ||||
| 			AlgorithmSigner: &algorithmOpenSSHCertSigner{ | ||||
| 				&openSSHCertSigner{cert, signer}, s}, | ||||
| 			supportedAlgorithms: s.Algorithms(), | ||||
| 		}, nil | ||||
| 	case AlgorithmSigner: | ||||
| 		return &algorithmOpenSSHCertSigner{ | ||||
| 			&openSSHCertSigner{cert, signer}, algorithmSigner}, nil | ||||
| 	} else { | ||||
| 			&openSSHCertSigner{cert, signer}, s}, nil | ||||
| 	default: | ||||
| 		return &openSSHCertSigner{cert, signer}, nil | ||||
| 	} | ||||
| } | ||||
|  | @ -432,7 +440,9 @@ func (c *CertChecker) CheckCert(principal string, cert *Certificate) error { | |||
| } | ||||
| 
 | ||||
| // SignCert signs the certificate with an authority, setting the Nonce, | ||||
| // SignatureKey, and Signature fields. | ||||
| // SignatureKey, and Signature fields. If the authority implements the | ||||
| // MultiAlgorithmSigner interface the first algorithm in the list is used. This | ||||
| // is useful if you want to sign with a specific algorithm. | ||||
| func (c *Certificate) SignCert(rand io.Reader, authority Signer) error { | ||||
| 	c.Nonce = make([]byte, 32) | ||||
| 	if _, err := io.ReadFull(rand, c.Nonce); err != nil { | ||||
|  | @ -440,8 +450,20 @@ func (c *Certificate) SignCert(rand io.Reader, authority Signer) error { | |||
| 	} | ||||
| 	c.SignatureKey = authority.PublicKey() | ||||
| 
 | ||||
| 	// Default to KeyAlgoRSASHA512 for ssh-rsa signers. | ||||
| 	if v, ok := authority.(AlgorithmSigner); ok && v.PublicKey().Type() == KeyAlgoRSA { | ||||
| 	if v, ok := authority.(MultiAlgorithmSigner); ok { | ||||
| 		if len(v.Algorithms()) == 0 { | ||||
| 			return errors.New("the provided authority has no signature algorithm") | ||||
| 		} | ||||
| 		// Use the first algorithm in the list. | ||||
| 		sig, err := v.SignWithAlgorithm(rand, c.bytesForSigning(), v.Algorithms()[0]) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 		c.Signature = sig | ||||
| 		return nil | ||||
| 	} else if v, ok := authority.(AlgorithmSigner); ok && v.PublicKey().Type() == KeyAlgoRSA { | ||||
| 		// Default to KeyAlgoRSASHA512 for ssh-rsa signers. | ||||
| 		// TODO: consider using KeyAlgoRSASHA256 as default. | ||||
| 		sig, err := v.SignWithAlgorithm(rand, c.bytesForSigning(), KeyAlgoRSASHA512) | ||||
| 		if err != nil { | ||||
| 			return err | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue