OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
151 static int kDefaultSslCipher10 = | 151 static int kDefaultSslCipher10 = |
152 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA); | 152 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA); |
153 static int kDefaultSslEcCipher10 = | 153 static int kDefaultSslEcCipher10 = |
154 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA); | 154 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA); |
155 #ifdef OPENSSL_IS_BORINGSSL | 155 #ifdef OPENSSL_IS_BORINGSSL |
156 static int kDefaultSslCipher12 = | 156 static int kDefaultSslCipher12 = |
157 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256); | 157 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256); |
158 static int kDefaultSslEcCipher12 = | 158 static int kDefaultSslEcCipher12 = |
159 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256); | 159 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256); |
160 // Fallback cipher for DTLS 1.2 if hardware-accelerated AES-GCM is unavailable. | 160 // Fallback cipher for DTLS 1.2 if hardware-accelerated AES-GCM is unavailable. |
161 // TODO(davidben): Switch to the standardized CHACHA20_POLY1305 variant when | |
162 // available. | |
161 static int kDefaultSslCipher12NoAesGcm = | 163 static int kDefaultSslCipher12NoAesGcm = |
162 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305); | 164 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305_OLD); |
163 static int kDefaultSslEcCipher12NoAesGcm = | 165 static int kDefaultSslEcCipher12NoAesGcm = |
164 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305); | 166 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305_OLD); |
pthatcher2
2015/11/16 23:24:17
Can we also rename this?
Perhaps:
kDefaultSslC
davidben_webrtc
2015/11/16 23:39:28
I don't think we want to. This is kDefaultSslCiphe
| |
165 #else // !OPENSSL_IS_BORINGSSL | 167 #else // !OPENSSL_IS_BORINGSSL |
166 // OpenSSL sorts differently than BoringSSL, so the default cipher doesn't | 168 // OpenSSL sorts differently than BoringSSL, so the default cipher doesn't |
167 // change between TLS 1.0 and TLS 1.2 with the current setup. | 169 // change between TLS 1.0 and TLS 1.2 with the current setup. |
168 static int kDefaultSslCipher12 = | 170 static int kDefaultSslCipher12 = |
169 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA); | 171 static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA); |
170 static int kDefaultSslEcCipher12 = | 172 static int kDefaultSslEcCipher12 = |
171 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA); | 173 static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA); |
172 #endif | 174 #endif |
173 | 175 |
174 #if defined(_MSC_VER) | 176 #if defined(_MSC_VER) |
(...skipping 992 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1167 } | 1169 } |
1168 } else { | 1170 } else { |
1169 RTC_NOTREACHED(); | 1171 RTC_NOTREACHED(); |
1170 return kDefaultSslEcCipher12; | 1172 return kDefaultSslEcCipher12; |
1171 } | 1173 } |
1172 } | 1174 } |
1173 | 1175 |
1174 } // namespace rtc | 1176 } // namespace rtc |
1175 | 1177 |
1176 #endif // HAVE_OPENSSL_SSL_H | 1178 #endif // HAVE_OPENSSL_SSL_H |
OLD | NEW |