mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
all: gofmt main repo
[This CL is part of a sequence implementing the proposal #51082. The design doc is at https://go.dev/s/godocfmt-design.] Run the updated gofmt, which reformats doc comments, on the main repository. Vendored files are excluded. For #51082. Change-Id: I7332f099b60f716295fb34719c98c04eb1a85407 Reviewed-on: https://go-review.googlesource.com/c/go/+/384268 Reviewed-by: Jonathan Amsterdam <jba@google.com> Reviewed-by: Ian Lance Taylor <iant@golang.org>
This commit is contained in:
parent
2613d75083
commit
13cd054c41
2 changed files with 31 additions and 29 deletions
|
@ -217,56 +217,56 @@ var cipherSuitesTLS13 = []*cipherSuiteTLS13{ // TODO: replace with a map.
|
||||||
//
|
//
|
||||||
// - Anything else comes before RC4
|
// - Anything else comes before RC4
|
||||||
//
|
//
|
||||||
// RC4 has practically exploitable biases. See https://www.rc4nomore.com.
|
// RC4 has practically exploitable biases. See https://www.rc4nomore.com.
|
||||||
//
|
//
|
||||||
// - Anything else comes before CBC_SHA256
|
// - Anything else comes before CBC_SHA256
|
||||||
//
|
//
|
||||||
// SHA-256 variants of the CBC ciphersuites don't implement any Lucky13
|
// SHA-256 variants of the CBC ciphersuites don't implement any Lucky13
|
||||||
// countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and
|
// countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and
|
||||||
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
|
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
|
||||||
//
|
//
|
||||||
// - Anything else comes before 3DES
|
// - Anything else comes before 3DES
|
||||||
//
|
//
|
||||||
// 3DES has 64-bit blocks, which makes it fundamentally susceptible to
|
// 3DES has 64-bit blocks, which makes it fundamentally susceptible to
|
||||||
// birthday attacks. See https://sweet32.info.
|
// birthday attacks. See https://sweet32.info.
|
||||||
//
|
//
|
||||||
// - ECDHE comes before anything else
|
// - ECDHE comes before anything else
|
||||||
//
|
//
|
||||||
// Once we got the broken stuff out of the way, the most important
|
// Once we got the broken stuff out of the way, the most important
|
||||||
// property a cipher suite can have is forward secrecy. We don't
|
// property a cipher suite can have is forward secrecy. We don't
|
||||||
// implement FFDHE, so that means ECDHE.
|
// implement FFDHE, so that means ECDHE.
|
||||||
//
|
//
|
||||||
// - AEADs come before CBC ciphers
|
// - AEADs come before CBC ciphers
|
||||||
//
|
//
|
||||||
// Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites
|
// Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites
|
||||||
// are fundamentally fragile, and suffered from an endless sequence of
|
// are fundamentally fragile, and suffered from an endless sequence of
|
||||||
// padding oracle attacks. See https://eprint.iacr.org/2015/1129,
|
// padding oracle attacks. See https://eprint.iacr.org/2015/1129,
|
||||||
// https://www.imperialviolet.org/2014/12/08/poodleagain.html, and
|
// https://www.imperialviolet.org/2014/12/08/poodleagain.html, and
|
||||||
// https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/.
|
// https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/.
|
||||||
//
|
//
|
||||||
// - AES comes before ChaCha20
|
// - AES comes before ChaCha20
|
||||||
//
|
//
|
||||||
// When AES hardware is available, AES-128-GCM and AES-256-GCM are faster
|
// When AES hardware is available, AES-128-GCM and AES-256-GCM are faster
|
||||||
// than ChaCha20Poly1305.
|
// than ChaCha20Poly1305.
|
||||||
//
|
//
|
||||||
// When AES hardware is not available, AES-128-GCM is one or more of: much
|
// When AES hardware is not available, AES-128-GCM is one or more of: much
|
||||||
// slower, way more complex, and less safe (because not constant time)
|
// slower, way more complex, and less safe (because not constant time)
|
||||||
// than ChaCha20Poly1305.
|
// than ChaCha20Poly1305.
|
||||||
//
|
//
|
||||||
// We use this list if we think both peers have AES hardware, and
|
// We use this list if we think both peers have AES hardware, and
|
||||||
// cipherSuitesPreferenceOrderNoAES otherwise.
|
// cipherSuitesPreferenceOrderNoAES otherwise.
|
||||||
//
|
//
|
||||||
// - AES-128 comes before AES-256
|
// - AES-128 comes before AES-256
|
||||||
//
|
//
|
||||||
// The only potential advantages of AES-256 are better multi-target
|
// The only potential advantages of AES-256 are better multi-target
|
||||||
// margins, and hypothetical post-quantum properties. Neither apply to
|
// margins, and hypothetical post-quantum properties. Neither apply to
|
||||||
// TLS, and AES-256 is slower due to its four extra rounds (which don't
|
// TLS, and AES-256 is slower due to its four extra rounds (which don't
|
||||||
// contribute to the advantages above).
|
// contribute to the advantages above).
|
||||||
//
|
//
|
||||||
// - ECDSA comes before RSA
|
// - ECDSA comes before RSA
|
||||||
//
|
//
|
||||||
// The relative order of ECDSA and RSA cipher suites doesn't matter,
|
// The relative order of ECDSA and RSA cipher suites doesn't matter,
|
||||||
// as they depend on the certificate. Pick one to get a stable order.
|
// as they depend on the certificate. Pick one to get a stable order.
|
||||||
var cipherSuitesPreferenceOrder = []uint16{
|
var cipherSuitesPreferenceOrder = []uint16{
|
||||||
// AEADs w/ ECDHE
|
// AEADs w/ ECDHE
|
||||||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
|
6
conn.go
6
conn.go
|
@ -587,12 +587,14 @@ func (c *Conn) readChangeCipherSpec() error {
|
||||||
|
|
||||||
// readRecordOrCCS reads one or more TLS records from the connection and
|
// readRecordOrCCS reads one or more TLS records from the connection and
|
||||||
// updates the record layer state. Some invariants:
|
// updates the record layer state. Some invariants:
|
||||||
// * c.in must be locked
|
// - c.in must be locked
|
||||||
// * c.input must be empty
|
// - c.input must be empty
|
||||||
|
//
|
||||||
// During the handshake one and only one of the following will happen:
|
// During the handshake one and only one of the following will happen:
|
||||||
// - c.hand grows
|
// - c.hand grows
|
||||||
// - c.in.changeCipherSpec is called
|
// - c.in.changeCipherSpec is called
|
||||||
// - an error is returned
|
// - an error is returned
|
||||||
|
//
|
||||||
// After the handshake one and only one of the following will happen:
|
// After the handshake one and only one of the following will happen:
|
||||||
// - c.hand grows
|
// - c.hand grows
|
||||||
// - c.input is set
|
// - c.input is set
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue