diff options
author | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-10 17:35:49 +0000 |
---|---|---|
committer | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-10 17:35:49 +0000 |
commit | 8342677414b8463ece6cb6f5c749e0ca1d2953df (patch) | |
tree | e8d040623d4435badfd6efcd73daee6e4e7e9167 /chrome/VERSION | |
parent | 75f9d4019c7d9f9f501b7125a36a840d773c1d84 (diff) | |
download | chromium_src-8342677414b8463ece6cb6f5c749e0ca1d2953df.zip chromium_src-8342677414b8463ece6cb6f5c749e0ca1d2953df.tar.gz chromium_src-8342677414b8463ece6cb6f5c749e0ca1d2953df.tar.bz2 |
List TLS_DHE_RSA_WITH_AES_256_CBC_SHA after
TLS_RSA_WITH_AES_256_CBC_SHA in ClientHello so that we
communicate securely with some servers that use 256-bit
DH keys.
The proper fix is to upgrade to NSS 3.12.7 to pick up
the DH key size checks. This is just a workaround.
R=agl
BUG=51694
TEST=none
Review URL: http://codereview.chromium.org/3118002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@55580 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/VERSION')
0 files changed, 0 insertions, 0 deletions