mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
crypto/tls: move defaults into defaults.go
Fixes #65265 Updates #60790 Change-Id: Iaa5f475d614d3ed87f091c93a3f888b7eb3433f2 Reviewed-on: https://go-review.googlesource.com/c/go/+/587296 Auto-Submit: Filippo Valsorda <filippo@golang.org> Reviewed-by: Roland Shoemaker <roland@golang.org> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Dmitri Shuralyov <dmitshur@google.com> Reviewed-by: Derek Parker <parkerderek86@gmail.com>
This commit is contained in:
parent
470b5f1f9d
commit
72f81ff7ec
7 changed files with 152 additions and 170 deletions
2
auth.go
2
auth.go
|
@ -242,7 +242,7 @@ func selectSignatureScheme(vers uint16, c *Certificate, peerAlgs []SignatureSche
|
||||||
// Pick signature scheme in the peer's preference order, as our
|
// Pick signature scheme in the peer's preference order, as our
|
||||||
// preference order is not configurable.
|
// preference order is not configurable.
|
||||||
for _, preferredAlg := range peerAlgs {
|
for _, preferredAlg := range peerAlgs {
|
||||||
if needFIPS() && !isSupportedSignatureAlgorithm(preferredAlg, fipsSupportedSignatureAlgorithms) {
|
if needFIPS() && !isSupportedSignatureAlgorithm(preferredAlg, defaultSupportedSignatureAlgorithmsFIPS) {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if isSupportedSignatureAlgorithm(preferredAlg, supportedAlgs) {
|
if isSupportedSignatureAlgorithm(preferredAlg, supportedAlgs) {
|
||||||
|
|
89
boring.go
89
boring.go
|
@ -6,93 +6,10 @@
|
||||||
|
|
||||||
package tls
|
package tls
|
||||||
|
|
||||||
import (
|
import "crypto/internal/boring/fipstls"
|
||||||
"crypto/internal/boring/fipstls"
|
|
||||||
)
|
|
||||||
|
|
||||||
// needFIPS returns fipstls.Required(); it avoids a new import in common.go.
|
// needFIPS returns fipstls.Required(), which is not available without the
|
||||||
|
// boringcrypto build tag.
|
||||||
func needFIPS() bool {
|
func needFIPS() bool {
|
||||||
return fipstls.Required()
|
return fipstls.Required()
|
||||||
}
|
}
|
||||||
|
|
||||||
// fipsMinVersion replaces c.minVersion in FIPS-only mode.
|
|
||||||
func fipsMinVersion(c *Config) uint16 {
|
|
||||||
// FIPS requires TLS 1.2.
|
|
||||||
return VersionTLS12
|
|
||||||
}
|
|
||||||
|
|
||||||
// fipsMaxVersion replaces c.maxVersion in FIPS-only mode.
|
|
||||||
func fipsMaxVersion(c *Config) uint16 {
|
|
||||||
// FIPS requires TLS 1.2.
|
|
||||||
return VersionTLS12
|
|
||||||
}
|
|
||||||
|
|
||||||
// default defaultFIPSCurvePreferences is the FIPS-allowed curves,
|
|
||||||
// in preference order (most preferable first).
|
|
||||||
var defaultFIPSCurvePreferences = []CurveID{CurveP256, CurveP384, CurveP521}
|
|
||||||
|
|
||||||
// fipsCurvePreferences replaces c.curvePreferences in FIPS-only mode.
|
|
||||||
func fipsCurvePreferences(c *Config) []CurveID {
|
|
||||||
if c == nil || len(c.CurvePreferences) == 0 {
|
|
||||||
return defaultFIPSCurvePreferences
|
|
||||||
}
|
|
||||||
var list []CurveID
|
|
||||||
for _, id := range c.CurvePreferences {
|
|
||||||
for _, allowed := range defaultFIPSCurvePreferences {
|
|
||||||
if id == allowed {
|
|
||||||
list = append(list, id)
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return list
|
|
||||||
}
|
|
||||||
|
|
||||||
// defaultCipherSuitesFIPS are the FIPS-allowed cipher suites.
|
|
||||||
var defaultCipherSuitesFIPS = []uint16{
|
|
||||||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
||||||
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
||||||
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
|
||||||
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
}
|
|
||||||
|
|
||||||
// fipsCipherSuites replaces c.cipherSuites in FIPS-only mode.
|
|
||||||
func fipsCipherSuites(c *Config) []uint16 {
|
|
||||||
if c == nil || c.CipherSuites == nil {
|
|
||||||
return defaultCipherSuitesFIPS
|
|
||||||
}
|
|
||||||
list := make([]uint16, 0, len(defaultCipherSuitesFIPS))
|
|
||||||
for _, id := range c.CipherSuites {
|
|
||||||
for _, allowed := range defaultCipherSuitesFIPS {
|
|
||||||
if id == allowed {
|
|
||||||
list = append(list, id)
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return list
|
|
||||||
}
|
|
||||||
|
|
||||||
// fipsSupportedSignatureAlgorithms currently are a subset of
|
|
||||||
// defaultSupportedSignatureAlgorithms without Ed25519 and SHA-1.
|
|
||||||
var fipsSupportedSignatureAlgorithms = []SignatureScheme{
|
|
||||||
PSSWithSHA256,
|
|
||||||
PSSWithSHA384,
|
|
||||||
PSSWithSHA512,
|
|
||||||
PKCS1WithSHA256,
|
|
||||||
ECDSAWithP256AndSHA256,
|
|
||||||
PKCS1WithSHA384,
|
|
||||||
ECDSAWithP384AndSHA384,
|
|
||||||
PKCS1WithSHA512,
|
|
||||||
ECDSAWithP521AndSHA512,
|
|
||||||
}
|
|
||||||
|
|
||||||
// supportedSignatureAlgorithms returns the supported signature algorithms.
|
|
||||||
func supportedSignatureAlgorithms() []SignatureScheme {
|
|
||||||
if !needFIPS() {
|
|
||||||
return defaultSupportedSignatureAlgorithms
|
|
||||||
}
|
|
||||||
return fipsSupportedSignatureAlgorithms
|
|
||||||
}
|
|
||||||
|
|
|
@ -136,7 +136,7 @@ func TestBoringServerCipherSuites(t *testing.T) {
|
||||||
random: make([]byte, 32),
|
random: make([]byte, 32),
|
||||||
cipherSuites: []uint16{id},
|
cipherSuites: []uint16{id},
|
||||||
compressionMethods: []uint8{compressionNone},
|
compressionMethods: []uint8{compressionNone},
|
||||||
supportedCurves: defaultCurvePreferences,
|
supportedCurves: defaultCurvePreferences(),
|
||||||
supportedPoints: []uint8{pointFormatUncompressed},
|
supportedPoints: []uint8{pointFormatUncompressed},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -161,7 +161,7 @@ func TestBoringServerCurves(t *testing.T) {
|
||||||
serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
|
serverConfig.Certificates[0].PrivateKey = testECDSAPrivateKey
|
||||||
serverConfig.BuildNameToCertificate()
|
serverConfig.BuildNameToCertificate()
|
||||||
|
|
||||||
for _, curveid := range defaultCurvePreferences {
|
for _, curveid := range defaultCurvePreferences() {
|
||||||
t.Run(fmt.Sprintf("curve=%d", curveid), func(t *testing.T) {
|
t.Run(fmt.Sprintf("curve=%d", curveid), func(t *testing.T) {
|
||||||
clientConfig := testConfig.Clone()
|
clientConfig := testConfig.Clone()
|
||||||
clientConfig.CurvePreferences = []CurveID{curveid}
|
clientConfig.CurvePreferences = []CurveID{curveid}
|
||||||
|
@ -274,7 +274,7 @@ func TestBoringClientHello(t *testing.T) {
|
||||||
clientConfig.MinVersion = VersionSSL30
|
clientConfig.MinVersion = VersionSSL30
|
||||||
clientConfig.MaxVersion = VersionTLS13
|
clientConfig.MaxVersion = VersionTLS13
|
||||||
clientConfig.CipherSuites = allCipherSuites()
|
clientConfig.CipherSuites = allCipherSuites()
|
||||||
clientConfig.CurvePreferences = defaultCurvePreferences
|
clientConfig.CurvePreferences = defaultCurvePreferences()
|
||||||
|
|
||||||
go Client(c, clientConfig).Handshake()
|
go Client(c, clientConfig).Handshake()
|
||||||
srv := Server(s, testConfig)
|
srv := Server(s, testConfig)
|
||||||
|
|
|
@ -17,9 +17,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"hash"
|
"hash"
|
||||||
"internal/cpu"
|
"internal/cpu"
|
||||||
"internal/godebug"
|
|
||||||
"runtime"
|
"runtime"
|
||||||
"slices"
|
|
||||||
|
|
||||||
"golang.org/x/crypto/chacha20poly1305"
|
"golang.org/x/crypto/chacha20poly1305"
|
||||||
)
|
)
|
||||||
|
@ -336,8 +334,6 @@ var disabledCipherSuites = map[uint16]bool{
|
||||||
TLS_RSA_WITH_RC4_128_SHA: true,
|
TLS_RSA_WITH_RC4_128_SHA: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
var tlsrsakex = godebug.New("tlsrsakex")
|
|
||||||
|
|
||||||
// rsaKexCiphers contains the ciphers which use RSA based key exchange,
|
// rsaKexCiphers contains the ciphers which use RSA based key exchange,
|
||||||
// which we also disable by default unless a GODEBUG is set.
|
// which we also disable by default unless a GODEBUG is set.
|
||||||
var rsaKexCiphers = map[uint16]bool{
|
var rsaKexCiphers = map[uint16]bool{
|
||||||
|
@ -350,8 +346,6 @@ var rsaKexCiphers = map[uint16]bool{
|
||||||
TLS_RSA_WITH_AES_256_GCM_SHA384: true,
|
TLS_RSA_WITH_AES_256_GCM_SHA384: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
var tls3des = godebug.New("tls3des")
|
|
||||||
|
|
||||||
// tdesCiphers contains 3DES ciphers,
|
// tdesCiphers contains 3DES ciphers,
|
||||||
// which we also disable by default unless a GODEBUG is set.
|
// which we also disable by default unless a GODEBUG is set.
|
||||||
var tdesCiphers = map[uint16]bool{
|
var tdesCiphers = map[uint16]bool{
|
||||||
|
@ -359,30 +353,6 @@ var tdesCiphers = map[uint16]bool{
|
||||||
TLS_RSA_WITH_3DES_EDE_CBC_SHA: true,
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
func defaultCipherSuites() []uint16 {
|
|
||||||
suites := slices.Clone(cipherSuitesPreferenceOrder)
|
|
||||||
return slices.DeleteFunc(suites, func(c uint16) bool {
|
|
||||||
return disabledCipherSuites[c] ||
|
|
||||||
tlsrsakex.Value() != "1" && rsaKexCiphers[c] ||
|
|
||||||
tls3des.Value() != "1" && tdesCiphers[c]
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
// defaultCipherSuitesTLS13 is also the preference order, since there are no
|
|
||||||
// disabled by default TLS 1.3 cipher suites. The same AES vs ChaCha20 logic as
|
|
||||||
// cipherSuitesPreferenceOrder applies.
|
|
||||||
var defaultCipherSuitesTLS13 = []uint16{
|
|
||||||
TLS_AES_128_GCM_SHA256,
|
|
||||||
TLS_AES_256_GCM_SHA384,
|
|
||||||
TLS_CHACHA20_POLY1305_SHA256,
|
|
||||||
}
|
|
||||||
|
|
||||||
var defaultCipherSuitesTLS13NoAES = []uint16{
|
|
||||||
TLS_CHACHA20_POLY1305_SHA256,
|
|
||||||
TLS_AES_128_GCM_SHA256,
|
|
||||||
TLS_AES_256_GCM_SHA384,
|
|
||||||
}
|
|
||||||
|
|
||||||
var (
|
var (
|
||||||
hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ
|
hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ
|
||||||
hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
|
hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
|
||||||
|
|
77
common.go
77
common.go
|
@ -21,6 +21,7 @@ import (
|
||||||
"internal/godebug"
|
"internal/godebug"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
|
"slices"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
@ -200,25 +201,6 @@ const (
|
||||||
// hash function associated with the Ed25519 signature scheme.
|
// hash function associated with the Ed25519 signature scheme.
|
||||||
var directSigning crypto.Hash = 0
|
var directSigning crypto.Hash = 0
|
||||||
|
|
||||||
// defaultSupportedSignatureAlgorithms contains the signature and hash algorithms that
|
|
||||||
// the code advertises as supported in a TLS 1.2+ ClientHello and in a TLS 1.2+
|
|
||||||
// CertificateRequest. The two fields are merged to match with TLS 1.3.
|
|
||||||
// Note that in TLS 1.2, the ECDSA algorithms are not constrained to P-256, etc.
|
|
||||||
var defaultSupportedSignatureAlgorithms = []SignatureScheme{
|
|
||||||
PSSWithSHA256,
|
|
||||||
ECDSAWithP256AndSHA256,
|
|
||||||
Ed25519,
|
|
||||||
PSSWithSHA384,
|
|
||||||
PSSWithSHA512,
|
|
||||||
PKCS1WithSHA256,
|
|
||||||
PKCS1WithSHA384,
|
|
||||||
PKCS1WithSHA512,
|
|
||||||
ECDSAWithP384AndSHA384,
|
|
||||||
ECDSAWithP521AndSHA512,
|
|
||||||
PKCS1WithSHA1,
|
|
||||||
ECDSAWithSHA1,
|
|
||||||
}
|
|
||||||
|
|
||||||
// helloRetryRequestRandom is set as the Random value of a ServerHello
|
// helloRetryRequestRandom is set as the Random value of a ServerHello
|
||||||
// to signal that the message is actually a HelloRetryRequest.
|
// to signal that the message is actually a HelloRetryRequest.
|
||||||
var helloRetryRequestRandom = []byte{ // See RFC 8446, Section 4.1.3.
|
var helloRetryRequestRandom = []byte{ // See RFC 8446, Section 4.1.3.
|
||||||
|
@ -1028,13 +1010,19 @@ func (c *Config) time() time.Time {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Config) cipherSuites() []uint16 {
|
func (c *Config) cipherSuites() []uint16 {
|
||||||
|
if c.CipherSuites == nil {
|
||||||
|
if needFIPS() {
|
||||||
|
return defaultCipherSuitesFIPS
|
||||||
|
}
|
||||||
|
return defaultCipherSuites()
|
||||||
|
}
|
||||||
if needFIPS() {
|
if needFIPS() {
|
||||||
return fipsCipherSuites(c)
|
cipherSuites := slices.Clone(c.CipherSuites)
|
||||||
|
return slices.DeleteFunc(cipherSuites, func(id uint16) bool {
|
||||||
|
return !slices.Contains(defaultCipherSuitesFIPS, id)
|
||||||
|
})
|
||||||
}
|
}
|
||||||
if c.CipherSuites != nil {
|
return c.CipherSuites
|
||||||
return c.CipherSuites
|
|
||||||
}
|
|
||||||
return defaultCipherSuites()
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var supportedVersions = []uint16{
|
var supportedVersions = []uint16{
|
||||||
|
@ -1054,7 +1042,7 @@ var tls10server = godebug.New("tls10server")
|
||||||
func (c *Config) supportedVersions(isClient bool) []uint16 {
|
func (c *Config) supportedVersions(isClient bool) []uint16 {
|
||||||
versions := make([]uint16, 0, len(supportedVersions))
|
versions := make([]uint16, 0, len(supportedVersions))
|
||||||
for _, v := range supportedVersions {
|
for _, v := range supportedVersions {
|
||||||
if needFIPS() && (v < fipsMinVersion(c) || v > fipsMaxVersion(c)) {
|
if needFIPS() && !slices.Contains(defaultSupportedVersionsFIPS, v) {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if (c == nil || c.MinVersion == 0) && v < VersionTLS12 {
|
if (c == nil || c.MinVersion == 0) && v < VersionTLS12 {
|
||||||
|
@ -1095,23 +1083,26 @@ func supportedVersionsFromMax(maxVersion uint16) []uint16 {
|
||||||
return versions
|
return versions
|
||||||
}
|
}
|
||||||
|
|
||||||
var tlskyber = godebug.New("tlskyber")
|
|
||||||
|
|
||||||
var defaultCurvePreferences = []CurveID{x25519Kyber768Draft00, X25519, CurveP256, CurveP384, CurveP521}
|
|
||||||
|
|
||||||
var defaultCurvePreferencesWithoutKyber = []CurveID{X25519, CurveP256, CurveP384, CurveP521}
|
|
||||||
|
|
||||||
func (c *Config) curvePreferences(version uint16) []CurveID {
|
func (c *Config) curvePreferences(version uint16) []CurveID {
|
||||||
if needFIPS() {
|
var curvePreferences []CurveID
|
||||||
return fipsCurvePreferences(c)
|
if c != nil && len(c.CurvePreferences) != 0 {
|
||||||
}
|
curvePreferences = slices.Clone(c.CurvePreferences)
|
||||||
if c == nil || len(c.CurvePreferences) == 0 {
|
if needFIPS() {
|
||||||
if version < VersionTLS13 || tlskyber.Value() == "0" {
|
return slices.DeleteFunc(curvePreferences, func(c CurveID) bool {
|
||||||
return defaultCurvePreferencesWithoutKyber
|
return !slices.Contains(defaultCurvePreferencesFIPS, c)
|
||||||
|
})
|
||||||
}
|
}
|
||||||
return defaultCurvePreferences
|
} else if needFIPS() {
|
||||||
|
curvePreferences = slices.Clone(defaultCurvePreferencesFIPS)
|
||||||
|
} else {
|
||||||
|
curvePreferences = defaultCurvePreferences()
|
||||||
}
|
}
|
||||||
return c.CurvePreferences
|
if version < VersionTLS13 {
|
||||||
|
return slices.DeleteFunc(curvePreferences, func(c CurveID) bool {
|
||||||
|
return c == x25519Kyber768Draft00
|
||||||
|
})
|
||||||
|
}
|
||||||
|
return curvePreferences
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Config) supportsCurve(version uint16, curve CurveID) bool {
|
func (c *Config) supportsCurve(version uint16, curve CurveID) bool {
|
||||||
|
@ -1562,6 +1553,14 @@ func unexpectedMessageError(wanted, got any) error {
|
||||||
return fmt.Errorf("tls: received unexpected handshake message of type %T when waiting for %T", got, wanted)
|
return fmt.Errorf("tls: received unexpected handshake message of type %T when waiting for %T", got, wanted)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// supportedSignatureAlgorithms returns the supported signature algorithms.
|
||||||
|
func supportedSignatureAlgorithms() []SignatureScheme {
|
||||||
|
if !needFIPS() {
|
||||||
|
return defaultSupportedSignatureAlgorithms
|
||||||
|
}
|
||||||
|
return defaultSupportedSignatureAlgorithmsFIPS
|
||||||
|
}
|
||||||
|
|
||||||
func isSupportedSignatureAlgorithm(sigAlg SignatureScheme, supportedSignatureAlgorithms []SignatureScheme) bool {
|
func isSupportedSignatureAlgorithm(sigAlg SignatureScheme, supportedSignatureAlgorithms []SignatureScheme) bool {
|
||||||
for _, s := range supportedSignatureAlgorithms {
|
for _, s := range supportedSignatureAlgorithms {
|
||||||
if s == sigAlg {
|
if s == sigAlg {
|
||||||
|
|
107
defaults.go
Normal file
107
defaults.go
Normal file
|
@ -0,0 +1,107 @@
|
||||||
|
// Copyright 2024 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package tls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"internal/godebug"
|
||||||
|
"slices"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Defaults are collected in this file to allow distributions to more easily patch
|
||||||
|
// them to apply local policies.
|
||||||
|
|
||||||
|
var tlskyber = godebug.New("tlskyber")
|
||||||
|
|
||||||
|
func defaultCurvePreferences() []CurveID {
|
||||||
|
if tlskyber.Value() == "0" {
|
||||||
|
return []CurveID{X25519, CurveP256, CurveP384, CurveP521}
|
||||||
|
}
|
||||||
|
// For now, x25519Kyber768Draft00 must always be followed by X25519.
|
||||||
|
return []CurveID{x25519Kyber768Draft00, X25519, CurveP256, CurveP384, CurveP521}
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultSupportedSignatureAlgorithms contains the signature and hash algorithms that
|
||||||
|
// the code advertises as supported in a TLS 1.2+ ClientHello and in a TLS 1.2+
|
||||||
|
// CertificateRequest. The two fields are merged to match with TLS 1.3.
|
||||||
|
// Note that in TLS 1.2, the ECDSA algorithms are not constrained to P-256, etc.
|
||||||
|
var defaultSupportedSignatureAlgorithms = []SignatureScheme{
|
||||||
|
PSSWithSHA256,
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
Ed25519,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
ECDSAWithP521AndSHA512,
|
||||||
|
PKCS1WithSHA1,
|
||||||
|
ECDSAWithSHA1,
|
||||||
|
}
|
||||||
|
|
||||||
|
var tlsrsakex = godebug.New("tlsrsakex")
|
||||||
|
var tls3des = godebug.New("tls3des")
|
||||||
|
|
||||||
|
func defaultCipherSuites() []uint16 {
|
||||||
|
suites := slices.Clone(cipherSuitesPreferenceOrder)
|
||||||
|
return slices.DeleteFunc(suites, func(c uint16) bool {
|
||||||
|
return disabledCipherSuites[c] ||
|
||||||
|
tlsrsakex.Value() != "1" && rsaKexCiphers[c] ||
|
||||||
|
tls3des.Value() != "1" && tdesCiphers[c]
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultCipherSuitesTLS13 is also the preference order, since there are no
|
||||||
|
// disabled by default TLS 1.3 cipher suites. The same AES vs ChaCha20 logic as
|
||||||
|
// cipherSuitesPreferenceOrder applies.
|
||||||
|
var defaultCipherSuitesTLS13 = []uint16{
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
}
|
||||||
|
|
||||||
|
var defaultCipherSuitesTLS13NoAES = []uint16{
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
}
|
||||||
|
|
||||||
|
var defaultSupportedVersionsFIPS = []uint16{
|
||||||
|
VersionTLS12,
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultCurvePreferencesFIPS are the FIPS-allowed curves,
|
||||||
|
// in preference order (most preferable first).
|
||||||
|
var defaultCurvePreferencesFIPS = []CurveID{CurveP256, CurveP384, CurveP521}
|
||||||
|
|
||||||
|
// defaultSupportedSignatureAlgorithmsFIPS currently are a subset of
|
||||||
|
// defaultSupportedSignatureAlgorithms without Ed25519 and SHA-1.
|
||||||
|
var defaultSupportedSignatureAlgorithmsFIPS = []SignatureScheme{
|
||||||
|
PSSWithSHA256,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
ECDSAWithP521AndSHA512,
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultCipherSuitesFIPS are the FIPS-allowed cipher suites.
|
||||||
|
var defaultCipherSuitesFIPS = []uint16{
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
}
|
||||||
|
|
||||||
|
// defaultCipherSuitesTLS13FIPS are the FIPS-allowed cipher suites for TLS 1.3.
|
||||||
|
var defaultCipherSuitesTLS13FIPS = []uint16{
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
}
|
11
notboring.go
11
notboring.go
|
@ -7,14 +7,3 @@
|
||||||
package tls
|
package tls
|
||||||
|
|
||||||
func needFIPS() bool { return false }
|
func needFIPS() bool { return false }
|
||||||
|
|
||||||
func supportedSignatureAlgorithms() []SignatureScheme {
|
|
||||||
return defaultSupportedSignatureAlgorithms
|
|
||||||
}
|
|
||||||
|
|
||||||
func fipsMinVersion(c *Config) uint16 { panic("fipsMinVersion") }
|
|
||||||
func fipsMaxVersion(c *Config) uint16 { panic("fipsMaxVersion") }
|
|
||||||
func fipsCurvePreferences(c *Config) []CurveID { panic("fipsCurvePreferences") }
|
|
||||||
func fipsCipherSuites(c *Config) []uint16 { panic("fipsCipherSuites") }
|
|
||||||
|
|
||||||
var fipsSupportedSignatureAlgorithms []SignatureScheme
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue