-
Notifications
You must be signed in to change notification settings - Fork 2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
pkgsite automatically links /RFC \d+/ to the mentioned RFC. Insert a bunch of spaces into doc-comments for that to match. Change-Id: I01834d7573428563f21c37e43316442e148dd8c4 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/442055 Reviewed-by: Joedian Reid <[email protected]> Run-TryBot: Ian Lance Taylor <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Ian Lance Taylor <[email protected]> Auto-Submit: Ian Lance Taylor <[email protected]>
- Loading branch information
Showing
8 changed files
with
13 additions
and
13 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -93,7 +93,7 @@ type ExtendedAgent interface { | |
type ConstraintExtension struct { | ||
// ExtensionName consist of a UTF-8 string suffixed by the | ||
// implementation domain following the naming scheme defined | ||
// in Section 4.2 of [RFC4251], e.g. "[email protected]". | ||
// in Section 4.2 of RFC 4251, e.g. "[email protected]". | ||
ExtensionName string | ||
// ExtensionDetails contains the actual content of the extended | ||
// constraint. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -96,21 +96,21 @@ func streamCipherMode(skip int, createFunc func(key, iv []byte) (cipher.Stream, | |
// are not supported and will not be negotiated, even if explicitly requested in | ||
// ClientConfig.Crypto.Ciphers. | ||
var cipherModes = map[string]*cipherMode{ | ||
// Ciphers from RFC4344, which introduced many CTR-based ciphers. Algorithms | ||
// Ciphers from RFC 4344, which introduced many CTR-based ciphers. Algorithms | ||
// are defined in the order specified in the RFC. | ||
"aes128-ctr": {16, aes.BlockSize, streamCipherMode(0, newAESCTR)}, | ||
"aes192-ctr": {24, aes.BlockSize, streamCipherMode(0, newAESCTR)}, | ||
"aes256-ctr": {32, aes.BlockSize, streamCipherMode(0, newAESCTR)}, | ||
|
||
// Ciphers from RFC4345, which introduces security-improved arcfour ciphers. | ||
// Ciphers from RFC 4345, which introduces security-improved arcfour ciphers. | ||
// They are defined in the order specified in the RFC. | ||
"arcfour128": {16, 0, streamCipherMode(1536, newRC4)}, | ||
"arcfour256": {32, 0, streamCipherMode(1536, newRC4)}, | ||
|
||
// Cipher defined in RFC 4253, which describes SSH Transport Layer Protocol. | ||
// Note that this cipher is not safe, as stated in RFC 4253: "Arcfour (and | ||
// RC4) has problems with weak keys, and should be used with caution." | ||
// RFC4345 introduces improved versions of Arcfour. | ||
// RFC 4345 introduces improved versions of Arcfour. | ||
"arcfour": {16, 0, streamCipherMode(0, newRC4)}, | ||
|
||
// AEAD ciphers | ||
|
@@ -641,7 +641,7 @@ const chacha20Poly1305ID = "[email protected]" | |
// | ||
// https://tools.ietf.org/html/draft-josefsson-ssh-chacha20-poly1305-openssh-00 | ||
// | ||
// the methods here also implement padding, which RFC4253 Section 6 | ||
// the methods here also implement padding, which RFC 4253 Section 6 | ||
// also requires of stream ciphers. | ||
type chacha20Poly1305Cipher struct { | ||
lengthKey [32]byte | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters