Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for rsaKexCiphers (0.17 sec)

  1. src/crypto/tls/defaults.go

    func defaultCipherSuites() []uint16 {
    	suites := slices.Clone(cipherSuitesPreferenceOrder)
    	return slices.DeleteFunc(suites, func(c uint16) bool {
    		return disabledCipherSuites[c] ||
    			tlsrsakex.Value() != "1" && rsaKexCiphers[c] ||
    			tls3des.Value() != "1" && tdesCiphers[c]
    	})
    }
    
    // defaultCipherSuitesTLS13 is also the preference order, since there are no
    // disabled by default TLS 1.3 cipher suites. The same AES vs ChaCha20 logic as
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  2. src/crypto/tls/cipher_suites.go

    	// RC4
    	TLS_ECDHE_ECDSA_WITH_RC4_128_SHA: true,
    	TLS_ECDHE_RSA_WITH_RC4_128_SHA:   true,
    	TLS_RSA_WITH_RC4_128_SHA:         true,
    }
    
    // rsaKexCiphers contains the ciphers which use RSA based key exchange,
    // which we also disable by default unless a GODEBUG is set.
    var rsaKexCiphers = map[uint16]bool{
    	TLS_RSA_WITH_RC4_128_SHA:        true,
    	TLS_RSA_WITH_3DES_EDE_CBC_SHA:   true,
    	TLS_RSA_WITH_AES_128_CBC_SHA:    true,
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_server.go

    		c.sendAlert(alertHandshakeFailure)
    		return errors.New("tls: no cipher suite supported by both client and server")
    	}
    	c.cipherSuite = hs.suite.id
    
    	if c.config.CipherSuites == nil && !needFIPS() && rsaKexCiphers[hs.suite.id] {
    		tlsrsakex.Value() // ensure godebug is initialized
    		tlsrsakex.IncNonDefault()
    	}
    	if c.config.CipherSuites == nil && !needFIPS() && tdesCiphers[hs.suite.id] {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client.go

    		hs.c.sendAlert(alertHandshakeFailure)
    		return errors.New("tls: server chose an unconfigured cipher suite")
    	}
    
    	if hs.c.config.CipherSuites == nil && !needFIPS() && rsaKexCiphers[hs.suite.id] {
    		tlsrsakex.Value() // ensure godebug is initialized
    		tlsrsakex.IncNonDefault()
    	}
    	if hs.c.config.CipherSuites == nil && !needFIPS() && tdesCiphers[hs.suite.id] {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  5. src/crypto/tls/tls_test.go

    	}
    
    	// Check that disabled suites are marked insecure.
    	for _, badSuites := range []map[uint16]bool{disabledCipherSuites, rsaKexCiphers} {
    		for id := range badSuites {
    			c := CipherSuiteByID(id)
    			if c == nil {
    				t.Errorf("%#04x: no CipherSuite entry", id)
    				continue
    			}
    			if !c.Insecure {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
Back to top