mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-29 07:42:04 +00:00
Bug 1247860 - Enable ChaCha20/Poly1305 cipher suites r=emk,keeler
This commit is contained in:
parent
1a3a107998
commit
896a7362d7
@ -18,6 +18,8 @@ pref("security.ssl.enable_alpn", true);
|
||||
|
||||
pref("security.ssl3.ecdhe_rsa_aes_128_gcm_sha256", true);
|
||||
pref("security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256", true);
|
||||
pref("security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256", true);
|
||||
pref("security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256", true);
|
||||
pref("security.ssl3.ecdhe_rsa_aes_128_sha", true);
|
||||
pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", true);
|
||||
pref("security.ssl3.ecdhe_rsa_aes_256_sha", true);
|
||||
|
@ -989,9 +989,9 @@ CanFalseStartCallback(PRFileDesc* fd, void* client_data, PRBool *canFalseStart)
|
||||
// Prevent downgrade attacks on the symmetric cipher. We do not allow CBC
|
||||
// mode due to BEAST, POODLE, and other attacks on the MAC-then-Encrypt
|
||||
// design. See bug 1109766 for more details.
|
||||
if (cipherInfo.symCipher != ssl_calg_aes_gcm) {
|
||||
if (cipherInfo.macAlgorithm != ssl_mac_aead) {
|
||||
MOZ_LOG(gPIPNSSLog, LogLevel::Debug,
|
||||
("CanFalseStartCallback [%p] failed - Symmetric cipher used, %d, "
|
||||
("CanFalseStartCallback [%p] failed - non-AEAD cipher used, %d, "
|
||||
"is not supported with False Start.\n", fd,
|
||||
static_cast<int32_t>(cipherInfo.symCipher)));
|
||||
reasonsForNotFalseStarting |= POSSIBLE_CIPHER_SUITE_DOWNGRADE;
|
||||
@ -1077,6 +1077,8 @@ AccumulateCipherSuite(Telemetry::ID probe, const SSLChannelInfo& channelInfo)
|
||||
case TLS_ECDHE_RSA_WITH_RC4_128_SHA: value = 8; break;
|
||||
case TLS_ECDHE_ECDSA_WITH_RC4_128_SHA: value = 9; break;
|
||||
case TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: value = 10; break;
|
||||
case TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: value = 11; break;
|
||||
case TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: value = 12; break;
|
||||
// DHE key exchange
|
||||
case TLS_DHE_RSA_WITH_AES_128_CBC_SHA: value = 21; break;
|
||||
case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA: value = 22; break;
|
||||
|
@ -612,13 +612,17 @@ typedef struct {
|
||||
bool weak;
|
||||
} CipherPref;
|
||||
|
||||
// Update the switch statement in HandshakeCallback in nsNSSCallbacks.cpp when
|
||||
// you add/remove cipher suites here.
|
||||
// Update the switch statement in AccumulateCipherSuite in nsNSSCallbacks.cpp
|
||||
// when you add/remove cipher suites here.
|
||||
static const CipherPref sCipherPrefs[] = {
|
||||
{ "security.ssl3.ecdhe_rsa_aes_128_gcm_sha256",
|
||||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, true },
|
||||
{ "security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256",
|
||||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, true },
|
||||
{ "security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256",
|
||||
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, true },
|
||||
{ "security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256",
|
||||
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, true },
|
||||
{ "security.ssl3.ecdhe_rsa_aes_128_sha",
|
||||
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, true },
|
||||
{ "security.ssl3.ecdhe_ecdsa_aes_128_sha",
|
||||
|
Loading…
Reference in New Issue
Block a user