summaryrefslogtreecommitdiffstats
path: root/net/ssl
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-06-24 17:37:16 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-06-24 17:37:16 +0000
commit93549b357ebc45ab4608eebcd37ad98050382e57 (patch)
tree2bf905a2d4944555d9a5be82cb2317e9637ce4ca /net/ssl
parente91c9b9c199d01d8fac68973d81726727c939849 (diff)
downloadchromium_src-93549b357ebc45ab4608eebcd37ad98050382e57.zip
chromium_src-93549b357ebc45ab4608eebcd37ad98050382e57.tar.gz
chromium_src-93549b357ebc45ab4608eebcd37ad98050382e57.tar.bz2
Revert 207759 "Disable TLS 1.2 if USE_OPENSSL is defined (such a..."
With r208081 (https://codereview.chromium.org/16879015), it is safe to re-enable TLS 1.2 for USE_OPENSSL. > Disable TLS 1.2 if USE_OPENSSL is defined (such as on Android) to > prevent ClientHello from being larger than 256 bytes. Some broken > servers can't handle a large ClientHello. > > R=agl@chromium.org,rsleevi@chromium.org > BUG=90392,245500,247691 > TEST=none > > Review URL: https://chromiumcodereview.appspot.com/17094016 TBR=wtc@chromium.org Review URL: https://codereview.chromium.org/17575013 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@208230 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/ssl')
-rw-r--r--net/ssl/ssl_config_service.cc6
1 files changed, 3 insertions, 3 deletions
diff --git a/net/ssl/ssl_config_service.cc b/net/ssl/ssl_config_service.cc
index 604d7f0..0561e7f 100644
--- a/net/ssl/ssl_config_service.cc
+++ b/net/ssl/ssl_config_service.cc
@@ -20,9 +20,9 @@ static uint16 g_default_version_min = SSL_PROTOCOL_VERSION_SSL3;
static uint16 g_default_version_max =
#if defined(USE_OPENSSL)
-// TODO(wtc): do not enable TLS 1.2 until we can keep ClientHello under 256
-// bytes. See http://crbug.com/245500 and http://crbug.com/247691.
-#if defined(SSL_OP_NO_TLSv1_1)
+#if defined(SSL_OP_NO_TLSv1_2)
+ SSL_PROTOCOL_VERSION_TLS1_2;
+#elif defined(SSL_OP_NO_TLSv1_1)
SSL_PROTOCOL_VERSION_TLS1_1;
#else
SSL_PROTOCOL_VERSION_TLS1;