@@ -114,13 +114,13 @@ func minMaxTlsVersion() {
114114 }
115115 if insecureFlag {
116116 config := & tls.Config {
117- MinVersion : 0 , // EXCUSED (guarded by a flag suggesting deliberate insecurity)
117+ MinVersion : 0 , // OK (guarded by a flag suggesting deliberate insecurity)
118118 }
119119 _ = config
120120 }
121121 if oldVersionFlag {
122122 config := & tls.Config {
123- MinVersion : 0 , // EXCUSED (guarded by a flag suggesting deliberate legacy support)
123+ MinVersion : 0 , // OK (guarded by a flag suggesting deliberate legacy support)
124124 }
125125 _ = config
126126 }
@@ -130,7 +130,7 @@ func minMaxTlsVersion() {
130130 if unknown {
131131 version = tls .VersionTLS13
132132 } else {
133- version = tls .VersionSSL30 // EXCUSED (flows together with a modern version, suggesting configurable security)
133+ version = tls .VersionSSL30 // OK (flows together with a modern version, suggesting configurable security)
134134 }
135135 config := & tls.Config {
136136 MinVersion : version ,
@@ -143,7 +143,7 @@ func minMaxTlsVersion() {
143143 if unknown {
144144 config .MinVersion = tls .VersionTLS13
145145 } else {
146- config .MinVersion = tls .VersionSSL30 // EXCUSED (flows together with a modern version, suggesting configurable security)
146+ config .MinVersion = tls .VersionSSL30 // OK (flows together with a modern version, suggesting configurable security)
147147 }
148148 _ = config
149149 }
@@ -153,47 +153,47 @@ func minMaxTlsVersion() {
153153 if unknown {
154154 config .MinVersion = tls .VersionTLS13
155155 } else {
156- config .MinVersion = tls .VersionSSL30 // EXCUSED (flows together with a modern version, suggesting configurable security)
156+ config .MinVersion = tls .VersionSSL30 // OK (flows together with a modern version, suggesting configurable security)
157157 }
158158 _ = config
159159 }
160160 ///
161161 {
162162 insecureConfig := & tls.Config {
163- MinVersion : 0 , // EXCUSED (var name suggests deliberate insecurity)
163+ MinVersion : 0 , // OK (var name suggests deliberate insecurity)
164164 }
165165 _ = insecureConfig
166166 }
167167 ///
168168 {
169169 legacyConfig := & tls.Config {
170- MinVersion : 0 , // EXCUSED (var name suggests deliberate legacy support)
170+ MinVersion : 0 , // OK (var name suggests deliberate legacy support)
171171 }
172172 _ = legacyConfig
173173 }
174174 ///
175175 {
176176 var insecureConfig tls.Config
177- insecureConfig .MinVersion = 0 // EXCUSED (var name suggests deliberate insecurity)
177+ insecureConfig .MinVersion = 0 // OK (var name suggests deliberate insecurity)
178178 _ = insecureConfig
179179 }
180180 ///
181181 {
182182 var legacyConfig tls.Config
183- legacyConfig .MinVersion = 0 // EXCUSED (var name suggests deliberate legacy support)
183+ legacyConfig .MinVersion = 0 // OK (var name suggests deliberate legacy support)
184184 _ = legacyConfig
185185 }
186186 ///
187187 {
188188 switch unknown {
189189 case oldVersionFlag :
190190 config := & tls.Config {
191- MinVersion : 0 , // EXCUSED (switch-case name suggests legacy support)
191+ MinVersion : 0 , // OK (switch-case name suggests legacy support)
192192 }
193193 _ = config
194194 case insecureFlag :
195195 config := & tls.Config {
196- MinVersion : 0 , // EXCUSED (switch-case name suggests insecurity)
196+ MinVersion : 0 , // OK (switch-case name suggests insecurity)
197197 }
198198 _ = config
199199 default :
@@ -206,12 +206,12 @@ func minMaxTlsVersion() {
206206 switch os .Args [0 ] {
207207 case "oldVersionFlag" :
208208 config := & tls.Config {
209- MinVersion : 0 , // EXCUSED (switch-case name suggests legacy support)
209+ MinVersion : 0 , // OK (switch-case name suggests legacy support)
210210 }
211211 _ = config
212212 case "insecureFlag" :
213213 config := & tls.Config {
214- MinVersion : 0 , // EXCUSED (switch-case name suggests insecurity)
214+ MinVersion : 0 , // OK (switch-case name suggests insecurity)
215215 }
216216 _ = config
217217 default :
@@ -224,7 +224,7 @@ func minMaxTlsVersion() {
224224 ///
225225 if insecureFunc () {
226226 config := & tls.Config {
227- MinVersion : 0 , // EXCUSED (guarded by function call suggesting deliberate insecurity)
227+ MinVersion : 0 , // OK (guarded by function call suggesting deliberate insecurity)
228228 }
229229 _ = config
230230 }
@@ -233,21 +233,21 @@ func minMaxTlsVersion() {
233233 isInsecurePtr := & isInsecure
234234 if * isInsecurePtr {
235235 config := & tls.Config {
236- MinVersion : 0 , // EXCUSED (guarded by pointer deref suggesting deliberate insecurity)
236+ MinVersion : 0 , // OK (guarded by pointer deref suggesting deliberate insecurity)
237237 }
238238 _ = config
239239 }
240240 ///
241241 if os .Getenv ("DISABLE_TLS_VERIFICATION" ) == "true" {
242242 config := & tls.Config {
243- MinVersion : 0 , // EXCUSED (guarded by environment variable)
243+ MinVersion : 0 , // OK (guarded by environment variable)
244244 }
245245 _ = config
246246 }
247247 ///
248248 if isInsecure == true {
249249 config := & tls.Config {
250- MinVersion : 0 , // EXCUSED (guarded by comparison)
250+ MinVersion : 0 , // OK (guarded by comparison)
251251 }
252252 _ = config
253253 }
@@ -368,46 +368,46 @@ func cipherSuites() {
368368 if insecureFlag {
369369 config := & tls.Config {
370370 CipherSuites : []uint16 {
371- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (guarded by a flag suggesting deliberate insecurity)
371+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (guarded by a flag suggesting deliberate insecurity)
372372 },
373373 }
374374 _ = config
375375 }
376376 if oldVersionFlag {
377377 config := & tls.Config {
378378 CipherSuites : []uint16 {
379- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (guarded by a flag suggesting deliberate legacy support)
379+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (guarded by a flag suggesting deliberate legacy support)
380380 },
381381 }
382382 _ = config
383383 }
384384 {
385385 insecureConfig := & tls.Config {
386386 CipherSuites : []uint16 {
387- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (var name suggests deliberate insecurity)
387+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (var name suggests deliberate insecurity)
388388 },
389389 }
390390 _ = insecureConfig
391391 }
392392 {
393393 legacyConfig := & tls.Config {
394394 CipherSuites : []uint16 {
395- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (var name suggests deliberate legacy support)
395+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (var name suggests deliberate legacy support)
396396 },
397397 }
398398 _ = legacyConfig
399399 }
400400 {
401401 var insecureConfig tls.Config
402402 insecureConfig .CipherSuites = []uint16 {
403- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (var name suggests deliberate insecurity)
403+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (var name suggests deliberate insecurity)
404404 }
405405 _ = insecureConfig
406406 }
407407 {
408408 var legacyConfig tls.Config
409409 legacyConfig .CipherSuites = []uint16 {
410- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (var name suggests deliberate legacy support)
410+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (var name suggests deliberate legacy support)
411411 }
412412 _ = legacyConfig
413413 }
@@ -416,14 +416,14 @@ func cipherSuites() {
416416 case oldVersionFlag :
417417 config := & tls.Config {
418418 CipherSuites : []uint16 {
419- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (switch-case name suggests legacy support)
419+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (switch-case name suggests legacy support)
420420 },
421421 }
422422 _ = config
423423 case insecureFlag :
424424 config := & tls.Config {
425425 CipherSuites : []uint16 {
426- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (switch-case name suggests insecurity)
426+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (switch-case name suggests insecurity)
427427 },
428428 }
429429 _ = config
@@ -440,14 +440,14 @@ func cipherSuites() {
440440 case "oldVersionFlag" :
441441 config := & tls.Config {
442442 CipherSuites : []uint16 {
443- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (switch-case name suggests legacy support)
443+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (switch-case name suggests legacy support)
444444 },
445445 }
446446 _ = config
447447 case "insecureFlag" :
448448 config := & tls.Config {
449449 CipherSuites : []uint16 {
450- tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // EXCUSED (switch-case name suggests insecurity)
450+ tls .TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 , // OK (switch-case name suggests insecurity)
451451 },
452452 }
453453 _ = config
0 commit comments