Chromium Code Reviews| Index: webrtc/base/opensslstreamadapter.cc |
| diff --git a/webrtc/base/opensslstreamadapter.cc b/webrtc/base/opensslstreamadapter.cc |
| index 270faa0809f42013c01aeb35854d7c98b3b9cc1f..f445dd4140bb95e43575e7df3a649c467035bea8 100644 |
| --- a/webrtc/base/opensslstreamadapter.cc |
| +++ b/webrtc/base/opensslstreamadapter.cc |
| @@ -160,12 +160,27 @@ static int kDefaultSslCipher12 = |
| static int kDefaultSslEcCipher12 = |
| static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256); |
| // Fallback cipher for DTLS 1.2 if hardware-accelerated AES-GCM is unavailable. |
| -// TODO(davidben): Switch to the standardized CHACHA20_POLY1305 variant when |
| -// available. |
| + |
| +#ifdef TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 |
|
davidben_webrtc
2016/01/06 04:04:44
Do you actually need this? Surely by now DEPS roll
torbjorng (webrtc)
2016/01/13 13:16:47
OK. I added this to for the benefit of third parti
davidben_webrtc
2016/01/13 20:42:53
Pre-installed versions of BoringSSL are explicitly
torbjorng (webrtc)
2016/01/14 14:27:09
:-)
I cannot take credit for those tests, unfortu
|
| + // This was added in boringssl 13414b3a048f17074253d23d03c0ab97c49b54e2, |
| + // changing the fallback. For now, support old boringssl versions. |
| +static int kDefaultSslCipher12NoAesGcm = |
| + static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256); |
|
davidben_webrtc
2016/01/06 04:04:44
So, this is fine, but it seems poor that you'd nee
torbjorng (webrtc)
2016/01/13 13:16:47
We might want to clean this up at some point, as w
davidben_webrtc
2016/01/13 20:42:53
Yeah, I would definitely ask that you change this,
torbjorng (webrtc)
2016/01/14 14:27:09
I suppose somebody added these tests as a test of
|
| +#else |
| static int kDefaultSslCipher12NoAesGcm = |
| static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305_OLD); |
| +#endif |
| + |
| +#ifdef TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 |
| + // This was added in boringssl 13414b3a048f17074253d23d03c0ab97c49b54e2, |
| + // changing the fallback. For now, support old boringssl versions. |
| +static int kDefaultSslEcCipher12NoAesGcm = |
| + static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256); |
| +#else |
| static int kDefaultSslEcCipher12NoAesGcm = |
| static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305_OLD); |
| +#endif |
| + |
| #else // !OPENSSL_IS_BORINGSSL |
| // OpenSSL sorts differently than BoringSSL, so the default cipher doesn't |
| // change between TLS 1.0 and TLS 1.2 with the current setup. |
| @@ -173,7 +188,7 @@ static int kDefaultSslCipher12 = |
| static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA); |
| static int kDefaultSslEcCipher12 = |
| static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA); |
| -#endif |
| +#endif // OPENSSL_IS_BORINGSSL |
| #if defined(_MSC_VER) |
| #pragma warning(pop) |