Index: webrtc/base/opensslstreamadapter.cc |
diff --git a/webrtc/base/opensslstreamadapter.cc b/webrtc/base/opensslstreamadapter.cc |
index 622c714a16c17505fcff4d2a42589ca0378efa91..270faa0809f42013c01aeb35854d7c98b3b9cc1f 100644 |
--- a/webrtc/base/opensslstreamadapter.cc |
+++ b/webrtc/base/opensslstreamadapter.cc |
@@ -160,10 +160,12 @@ |
static int kDefaultSslEcCipher12 = |
static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256); |
// Fallback cipher for DTLS 1.2 if hardware-accelerated AES-GCM is unavailable. |
+// TODO(davidben): Switch to the standardized CHACHA20_POLY1305 variant when |
+// available. |
static int kDefaultSslCipher12NoAesGcm = |
- static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256); |
+ static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305_OLD); |
static int kDefaultSslEcCipher12NoAesGcm = |
- static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256); |
+ static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305_OLD); |
#else // !OPENSSL_IS_BORINGSSL |
// OpenSSL sorts differently than BoringSSL, so the default cipher doesn't |
// change between TLS 1.0 and TLS 1.2 with the current setup. |
@@ -171,7 +173,7 @@ |
static_cast<uint16_t>(TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA); |
static int kDefaultSslEcCipher12 = |
static_cast<uint16_t>(TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA); |
-#endif // OPENSSL_IS_BORINGSSL |
+#endif |
#if defined(_MSC_VER) |
#pragma warning(pop) |