summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-08-20 22:18:23 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-08-20 22:18:23 +0000
commit21a1a185448a3f9cd275933af3b41a4f94ea0cec (patch)
tree93ade7c6189aa56497840f8fb4d779a272a63db5
parent9f843612c468993f55baf0e4848f26bccf6bc018 (diff)
downloadchromium_src-21a1a185448a3f9cd275933af3b41a4f94ea0cec.zip
chromium_src-21a1a185448a3f9cd275933af3b41a4f94ea0cec.tar.gz
chromium_src-21a1a185448a3f9cd275933af3b41a4f94ea0cec.tar.bz2
Revert 151198 - Turn off TLS 1.1.
Review URL: https://chromiumcodereview.appspot.com/10828272 Bug 141629 has been fixed. We can turn on TLS 1.1 on the trunk. TBR=agl@chromium.org,rsleevi@chromium.org BUG=142172 TEST=Visit https://www.google.com/ and https://www.facebook.com/. Click the lock icon. The page info bubble should say "The connection uses TLS 1.1." Review URL: https://chromiumcodereview.appspot.com/10854212 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@152404 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r--net/base/ssl_config_service.cc11
-rw-r--r--net/socket/ssl_server_socket_nss.cc2
-rw-r--r--net/socket/ssl_server_socket_unittest.cc2
-rw-r--r--net/url_request/url_request_unittest.cc4
4 files changed, 16 insertions, 3 deletions
diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc
index 2dbee56..ad2928e16 100644
--- a/net/base/ssl_config_service.cc
+++ b/net/base/ssl_config_service.cc
@@ -18,7 +18,16 @@ namespace net {
static uint16 g_default_version_min = SSL_PROTOCOL_VERSION_SSL3;
-static uint16 g_default_version_max = SSL_PROTOCOL_VERSION_TLS1;
+static uint16 g_default_version_max =
+#if defined(USE_OPENSSL)
+#if defined(SSL_OP_NO_TLSv1_1)
+ SSL_PROTOCOL_VERSION_TLS1_1;
+#else
+ SSL_PROTOCOL_VERSION_TLS1;
+#endif
+#else
+ SSL_PROTOCOL_VERSION_TLS1_1;
+#endif
SSLConfig::CertAndStatus::CertAndStatus() : cert_status(0) {}
diff --git a/net/socket/ssl_server_socket_nss.cc b/net/socket/ssl_server_socket_nss.cc
index 0a119a1..7203881 100644
--- a/net/socket/ssl_server_socket_nss.cc
+++ b/net/socket/ssl_server_socket_nss.cc
@@ -103,7 +103,7 @@ SSLServerSocketNSS::SSLServerSocketNSS(
completed_handshake_(false) {
ssl_config_.false_start_enabled = false;
ssl_config_.version_min = SSL_PROTOCOL_VERSION_SSL3;
- ssl_config_.version_max = SSL_PROTOCOL_VERSION_TLS1;
+ ssl_config_.version_max = SSL_PROTOCOL_VERSION_TLS1_1;
// TODO(hclam): Need a better way to clone a key.
std::vector<uint8> key_bytes;
diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc
index 5c3c5a7..f93d7c6 100644
--- a/net/socket/ssl_server_socket_unittest.cc
+++ b/net/socket/ssl_server_socket_unittest.cc
@@ -335,7 +335,7 @@ class SSLServerSocketTest : public PlatformTest {
ssl_config.false_start_enabled = false;
ssl_config.channel_id_enabled = false;
ssl_config.version_min = SSL_PROTOCOL_VERSION_SSL3;
- ssl_config.version_max = SSL_PROTOCOL_VERSION_TLS1;
+ ssl_config.version_max = SSL_PROTOCOL_VERSION_TLS1_1;
// Certificate provided by the host doesn't need authority.
net::SSLConfig::CertAndStatus cert_and_status;
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
index de020b2..a61a206 100644
--- a/net/url_request/url_request_unittest.cc
+++ b/net/url_request/url_request_unittest.cc
@@ -1825,6 +1825,10 @@ TEST_F(HTTPSRequestTest, SSLv3Fallback) {
// than necessary.
TEST_F(HTTPSRequestTest, TLSv1Fallback) {
uint16 default_version_max = SSLConfigService::default_version_max();
+ // The OpenSSL library in use may not support TLS 1.1.
+#if !defined(USE_OPENSSL)
+ EXPECT_GT(default_version_max, SSL_PROTOCOL_VERSION_TLS1);
+#endif
if (default_version_max <= SSL_PROTOCOL_VERSION_TLS1)
return;