|
|
@@ -339,30 +339,6 @@ func (s *Server) ServeConn(c net.Conn, opts *ServeConnOpts) {
|
|
|
sc.serve()
|
|
|
}
|
|
|
|
|
|
-// isBadCipher reports whether the cipher is blacklisted by the HTTP/2 spec.
|
|
|
-func isBadCipher(cipher uint16) bool {
|
|
|
- switch cipher {
|
|
|
- case tls.TLS_RSA_WITH_RC4_128_SHA,
|
|
|
- tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
- tls.TLS_RSA_WITH_AES_128_CBC_SHA,
|
|
|
- tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
|
- tls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
|
|
|
- tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
|
|
- tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
|
|
- tls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,
|
|
|
- tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
- tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
|
|
- tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA:
|
|
|
- // Reject cipher suites from Appendix A.
|
|
|
- // "This list includes those cipher suites that do not
|
|
|
- // offer an ephemeral key exchange and those that are
|
|
|
- // based on the TLS null, stream or block cipher type"
|
|
|
- return true
|
|
|
- default:
|
|
|
- return false
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
func (sc *serverConn) rejectConn(err ErrCode, debug string) {
|
|
|
sc.vlogf("http2: server rejecting conn: %v, %s", err, debug)
|
|
|
// ignoring errors. hanging up anyway.
|