diff options
author | Adam Langley <agl@google.com> | 2015-06-02 13:27:06 -0700 |
---|---|---|
committer | Adam Langley <agl@google.com> | 2015-06-02 13:27:06 -0700 |
commit | 0d4deb2be14e6590f332920f62b84ef04d153ed1 (patch) | |
tree | 980ced8892d457027673bffb97ff17dfffba81d8 | |
parent | 86426f7cc9838613249690be03ddbee18efd1a29 (diff) | |
download | external_boringssl-0d4deb2be14e6590f332920f62b84ef04d153ed1.zip external_boringssl-0d4deb2be14e6590f332920f62b84ef04d153ed1.tar.gz external_boringssl-0d4deb2be14e6590f332920f62b84ef04d153ed1.tar.bz2 |
Disable 0xcafe cipher suite (PSK with AES-GCM).
This is a non-standard cipher suite that's not used in the Android
system.
Bug: 21522548
Change-Id: I07a2783965e9e891473327c9039583b4f89e9f27
-rw-r--r-- | src/ssl/s3_lib.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/ssl/s3_lib.c b/src/ssl/s3_lib.c index 13a4a19..92c923e 100644 --- a/src/ssl/s3_lib.c +++ b/src/ssl/s3_lib.c @@ -443,6 +443,7 @@ const SSL_CIPHER ssl3_ciphers[] = { /* ECDH PSK ciphersuites */ /* Cipher CAFE */ +#if !defined(ANDROID) { TLS1_TXT_ECDHE_PSK_WITH_AES_128_GCM_SHA256, TLS1_CK_ECDHE_PSK_WITH_AES_128_GCM_SHA256, SSL_kECDHE, SSL_aPSK, @@ -452,7 +453,6 @@ const SSL_CIPHER ssl3_ciphers[] = { 128, 128, }, -#if !defined(ANDROID) { TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305, TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305, SSL_kECDHE, SSL_aRSA, |