]> Cypherpunks repositories - gostls13.git/commitdiff
crypto/tls: Improve ambiguous comment in cipher_suites.go
authorBrady Sullivan <brady@bsull.com>
Mon, 22 Feb 2016 23:19:18 +0000 (15:19 -0800)
committerBrad Fitzpatrick <bradfitz@golang.org>
Mon, 22 Feb 2016 23:56:37 +0000 (23:56 +0000)
A comment existed referencing RC4 coming before AES because of it's
vulnerability to the Lucky 13 attack. This clarifies that the Lucky 13 attack
only effects AES-CBC, and not AES-GCM.

Fixes #14474

Change-Id: Idcb07b5e0cdb0f9257cf75abea60129ba495b5f5
Reviewed-on: https://go-review.googlesource.com/19845
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
src/crypto/tls/cipher_suites.go

index 869ffa50bd32af832f68d286967be541c81656b6..224ed1bc86c4e82ecb87ea7014c2d3525ad5fecc 100644 (file)
@@ -74,7 +74,7 @@ type cipherSuite struct {
 
 var cipherSuites = []*cipherSuite{
        // Ciphersuite order is chosen so that ECDHE comes before plain RSA
-       // and RC4 comes before AES (because of the Lucky13 attack).
+       // and RC4 comes before AES-CBC (because of the Lucky13 attack).
        {TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, 16, 0, 4, ecdheRSAKA, suiteECDHE | suiteTLS12, nil, nil, aeadAESGCM},
        {TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, 16, 0, 4, ecdheECDSAKA, suiteECDHE | suiteECDSA | suiteTLS12, nil, nil, aeadAESGCM},
        {TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, 32, 0, 4, ecdheRSAKA, suiteECDHE | suiteTLS12 | suiteSHA384, nil, nil, aeadAESGCM},