summaryrefslogtreecommitdiffstats
path: root/net/ssl
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-06-22 23:54:28 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-06-22 23:54:28 +0000
commit0d0b1a7ee20003bb8bd3dcf9ff51b540dc6c8341 (patch)
tree5e7ad342197bfcdbbefed205506f313cd24491a4 /net/ssl
parente027de8637a8294f92df68d0244978329a08d3eb (diff)
downloadchromium_src-0d0b1a7ee20003bb8bd3dcf9ff51b540dc6c8341.zip
chromium_src-0d0b1a7ee20003bb8bd3dcf9ff51b540dc6c8341.tar.gz
chromium_src-0d0b1a7ee20003bb8bd3dcf9ff51b540dc6c8341.tar.bz2
Revert 207759 "Disable TLS 1.2 if USE_OPENSSL is defined (such a..."
With r208081 (https://codereview.chromium.org/16879015), it is safe to re-enable TLS 1.2 for USE_OPENSSL. > Disable TLS 1.2 if USE_OPENSSL is defined (such as on Android) to > prevent ClientHello from being larger than 256 bytes. Some broken > servers can't handle a large ClientHello. > > R=agl@chromium.org,rsleevi@chromium.org > BUG=90392,245500,247691 > TEST=none > > Review URL: https://chromiumcodereview.appspot.com/17094016 TBR=wtc@chromium.org Review URL: https://codereview.chromium.org/17553016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@208102 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/ssl')
-rw-r--r--net/ssl/ssl_config_service.cc6
1 files changed, 3 insertions, 3 deletions
diff --git a/net/ssl/ssl_config_service.cc b/net/ssl/ssl_config_service.cc
index 604d7f0..0561e7f 100644
--- a/net/ssl/ssl_config_service.cc
+++ b/net/ssl/ssl_config_service.cc
@@ -20,9 +20,9 @@ static uint16 g_default_version_min = SSL_PROTOCOL_VERSION_SSL3;
static uint16 g_default_version_max =
#if defined(USE_OPENSSL)
-// TODO(wtc): do not enable TLS 1.2 until we can keep ClientHello under 256
-// bytes. See http://crbug.com/245500 and http://crbug.com/247691.
-#if defined(SSL_OP_NO_TLSv1_1)
+#if defined(SSL_OP_NO_TLSv1_2)
+ SSL_PROTOCOL_VERSION_TLS1_2;
+#elif defined(SSL_OP_NO_TLSv1_1)
SSL_PROTOCOL_VERSION_TLS1_1;
#else
SSL_PROTOCOL_VERSION_TLS1;