mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-13 05:40:42 +01:00
Remove 3DES from WebRTC
I meant to do this with the Chromium change but forgot. UMA registers zero uses of 3DES, so this should be safe. (Not too surprising, since 3DES had already been obsolete for just under a decade by the time WebRTC existed.) Bug: chromium:1203442 Change-Id: I5bddd2bd3f24beb486c8246fa5dab5836883b8c1 Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/229120 Reviewed-by: Harald Alvestrand <hta@webrtc.org> Commit-Queue: David Benjamin <davidben@webrtc.org> Cr-Commit-Position: refs/heads/master@{#34806}
This commit is contained in:
parent
8d8bc62265
commit
7a46cc5f3d
2 changed files with 5 additions and 4 deletions
|
@ -976,9 +976,9 @@ SSL_CTX* OpenSSLAdapter::CreateContext(SSLMode mode, bool enable_cache) {
|
|||
// Use defaults, but disable HMAC-SHA256 and HMAC-SHA384 ciphers
|
||||
// (note that SHA256 and SHA384 only select legacy CBC ciphers).
|
||||
// Additionally disable HMAC-SHA1 ciphers in ECDSA. These are the remaining
|
||||
// CBC-mode ECDSA ciphers.
|
||||
// CBC-mode ECDSA ciphers. Finally, disable 3DES.
|
||||
SSL_CTX_set_cipher_list(
|
||||
ctx, "ALL:!SHA256:!SHA384:!aPSK:!ECDSA+SHA1:!ADH:!LOW:!EXP:!MD5");
|
||||
ctx, "ALL:!SHA256:!SHA384:!aPSK:!ECDSA+SHA1:!ADH:!LOW:!EXP:!MD5:!3DES");
|
||||
|
||||
if (mode == SSL_MODE_DTLS) {
|
||||
SSL_CTX_set_read_ahead(ctx, 1);
|
||||
|
|
|
@ -1093,9 +1093,10 @@ SSL_CTX* OpenSSLStreamAdapter::SetupSSLContext() {
|
|||
// Select list of available ciphers. Note that !SHA256 and !SHA384 only
|
||||
// remove HMAC-SHA256 and HMAC-SHA384 cipher suites, not GCM cipher suites
|
||||
// with SHA256 or SHA384 as the handshake hash.
|
||||
// This matches the list of SSLClientSocketOpenSSL in Chromium.
|
||||
// This matches the list of SSLClientSocketImpl in Chromium.
|
||||
SSL_CTX_set_cipher_list(
|
||||
ctx, "DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK");
|
||||
ctx,
|
||||
"DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK:!3DES");
|
||||
|
||||
if (!srtp_ciphers_.empty()) {
|
||||
if (SSL_CTX_set_tlsext_use_srtp(ctx, srtp_ciphers_.c_str())) {
|
||||
|
|
Loading…
Reference in a new issue