MySQL 8.0.39
Source Code Documentation
anonymous_namespace{tls_ciphers.h} Namespace Reference

Variables

const char default_tls13_ciphers []
 Configuring list of ciphers. More...
 
const char default_tls12_ciphers []
 
const char blocked_tls12_ciphers []
 
const char additional_client_ciphers []
 

Variable Documentation

◆ additional_client_ciphers

const char anonymous_namespace{tls_ciphers.h}::additional_client_ciphers[]

◆ blocked_tls12_ciphers

const char anonymous_namespace{tls_ciphers.h}::blocked_tls12_ciphers[]
Initial value:
= {
"!aNULL:"
"!eNULL:"
"!EXPORT:"
"!LOW:"
"!MD5:"
"!DES:"
"!3DES:"
"!RC2:"
"!RC4:"
"!PSK:"
"!DH-RSA-AES128-SHA256:"
"!DH-RSA-AES256-SHA256:"
"!DH-DSS-AES128-SHA256:"
"!DH-DSS-AES128-SHA:"
"!DH-DSS-AES256-SHA:"
"!DH-DSS-AES256-SHA256:"
"!DH-RSA-AES128-SHA:"
"!DH-RSA-AES256-SHA:"
"!DH-DSS-AES128-GCM-SHA256:"
"!DH-DSS-AES256-GCM-SHA384:"
"!DH-RSA-AES128-GCM-SHA256:"
"!DH-RSA-AES256-GCM-SHA384"}

◆ default_tls12_ciphers

const char anonymous_namespace{tls_ciphers.h}::default_tls12_ciphers[]
Initial value:
= {
"ECDHE-ECDSA-AES128-GCM-SHA256:"
"ECDHE-ECDSA-AES256-GCM-SHA384:"
"ECDHE-RSA-AES128-GCM-SHA256:"
"ECDHE-RSA-AES256-GCM-SHA384:"
"ECDHE-ECDSA-CHACHA20-POLY1305:"
"ECDHE-RSA-CHACHA20-POLY1305:"
"ECDHE-ECDSA-AES256-CCM:"
"ECDHE-ECDSA-AES128-CCM:"
"DHE-RSA-AES128-GCM-SHA256:"
"DHE-RSA-AES256-GCM-SHA384:"
"DHE-RSA-AES256-CCM:"
"DHE-RSA-AES128-CCM:"
"DHE-RSA-CHACHA20-POLY1305"}

◆ default_tls13_ciphers

const char anonymous_namespace{tls_ciphers.h}::default_tls13_ciphers[]
Initial value:
= {
"TLS_AES_128_GCM_SHA256:"
"TLS_AES_256_GCM_SHA384:"
"TLS_CHACHA20_POLY1305_SHA256:"
"TLS_AES_128_CCM_SHA256"}

Configuring list of ciphers.

TLSv1.2

Server: Specify in folllowing order:

  1. Blocked ciphers
  2. Approved ciphers

Client: Specify in following order:

  1. Blocked ciphers
  2. Approved ciphers
  3. Client specific ciphers

TLSv1.3

Server: Specify in folllowing order:

  1. Blocked ciphers (None atm)
  2. Approved ciphers

Client: Specify in following order:

  1. Blocked ciphers (None atm)
  2. Approved ciphers
  3. Client specific ciphers (None atm)