all: gofmt main repo

[This CL is part of a sequence implementing the proposal #51082.
The design doc is at https://go.dev/s/godocfmt-design.]

Run the updated gofmt, which reformats doc comments,
on the main repository. Vendored files are excluded.

For #51082.

Change-Id: I7332f099b60f716295fb34719c98c04eb1a85407
Reviewed-on: https://go-review.googlesource.com/c/go/+/384268
Reviewed-by: Jonathan Amsterdam <jba@google.com>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
This commit is contained in:
Russ Cox 2022-02-03 14:12:08 -05:00
parent 2613d75083
commit 13cd054c41
2 changed files with 31 additions and 29 deletions

View file

@ -217,56 +217,56 @@ var cipherSuitesTLS13 = []*cipherSuiteTLS13{ // TODO: replace with a map.
// //
// - Anything else comes before RC4 // - Anything else comes before RC4
// //
// RC4 has practically exploitable biases. See https://www.rc4nomore.com. // RC4 has practically exploitable biases. See https://www.rc4nomore.com.
// //
// - Anything else comes before CBC_SHA256 // - Anything else comes before CBC_SHA256
// //
// SHA-256 variants of the CBC ciphersuites don't implement any Lucky13 // SHA-256 variants of the CBC ciphersuites don't implement any Lucky13
// countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and // countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html. // https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
// //
// - Anything else comes before 3DES // - Anything else comes before 3DES
// //
// 3DES has 64-bit blocks, which makes it fundamentally susceptible to // 3DES has 64-bit blocks, which makes it fundamentally susceptible to
// birthday attacks. See https://sweet32.info. // birthday attacks. See https://sweet32.info.
// //
// - ECDHE comes before anything else // - ECDHE comes before anything else
// //
// Once we got the broken stuff out of the way, the most important // Once we got the broken stuff out of the way, the most important
// property a cipher suite can have is forward secrecy. We don't // property a cipher suite can have is forward secrecy. We don't
// implement FFDHE, so that means ECDHE. // implement FFDHE, so that means ECDHE.
// //
// - AEADs come before CBC ciphers // - AEADs come before CBC ciphers
// //
// Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites // Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites
// are fundamentally fragile, and suffered from an endless sequence of // are fundamentally fragile, and suffered from an endless sequence of
// padding oracle attacks. See https://eprint.iacr.org/2015/1129, // padding oracle attacks. See https://eprint.iacr.org/2015/1129,
// https://www.imperialviolet.org/2014/12/08/poodleagain.html, and // https://www.imperialviolet.org/2014/12/08/poodleagain.html, and
// https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/. // https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/.
// //
// - AES comes before ChaCha20 // - AES comes before ChaCha20
// //
// When AES hardware is available, AES-128-GCM and AES-256-GCM are faster // When AES hardware is available, AES-128-GCM and AES-256-GCM are faster
// than ChaCha20Poly1305. // than ChaCha20Poly1305.
// //
// When AES hardware is not available, AES-128-GCM is one or more of: much // When AES hardware is not available, AES-128-GCM is one or more of: much
// slower, way more complex, and less safe (because not constant time) // slower, way more complex, and less safe (because not constant time)
// than ChaCha20Poly1305. // than ChaCha20Poly1305.
// //
// We use this list if we think both peers have AES hardware, and // We use this list if we think both peers have AES hardware, and
// cipherSuitesPreferenceOrderNoAES otherwise. // cipherSuitesPreferenceOrderNoAES otherwise.
// //
// - AES-128 comes before AES-256 // - AES-128 comes before AES-256
// //
// The only potential advantages of AES-256 are better multi-target // The only potential advantages of AES-256 are better multi-target
// margins, and hypothetical post-quantum properties. Neither apply to // margins, and hypothetical post-quantum properties. Neither apply to
// TLS, and AES-256 is slower due to its four extra rounds (which don't // TLS, and AES-256 is slower due to its four extra rounds (which don't
// contribute to the advantages above). // contribute to the advantages above).
// //
// - ECDSA comes before RSA // - ECDSA comes before RSA
// //
// The relative order of ECDSA and RSA cipher suites doesn't matter, // The relative order of ECDSA and RSA cipher suites doesn't matter,
// as they depend on the certificate. Pick one to get a stable order. // as they depend on the certificate. Pick one to get a stable order.
var cipherSuitesPreferenceOrder = []uint16{ var cipherSuitesPreferenceOrder = []uint16{
// AEADs w/ ECDHE // AEADs w/ ECDHE
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,

View file

@ -587,12 +587,14 @@ func (c *Conn) readChangeCipherSpec() error {
// readRecordOrCCS reads one or more TLS records from the connection and // readRecordOrCCS reads one or more TLS records from the connection and
// updates the record layer state. Some invariants: // updates the record layer state. Some invariants:
// * c.in must be locked // - c.in must be locked
// * c.input must be empty // - c.input must be empty
//
// During the handshake one and only one of the following will happen: // During the handshake one and only one of the following will happen:
// - c.hand grows // - c.hand grows
// - c.in.changeCipherSpec is called // - c.in.changeCipherSpec is called
// - an error is returned // - an error is returned
//
// After the handshake one and only one of the following will happen: // After the handshake one and only one of the following will happen:
// - c.hand grows // - c.hand grows
// - c.input is set // - c.input is set