OLD | NEW |
---|---|
(Empty) | |
1 diff --git a/net/third_party/nss/ssl/ssl3con.c b/net/third_party/nss/ssl/ssl3con .c | |
2 index ee96089..3b0c22e 100644 | |
3 --- a/net/third_party/nss/ssl/ssl3con.c | |
4 +++ b/net/third_party/nss/ssl/ssl3con.c | |
5 @@ -6416,7 +6416,10 @@ ssl3_CanFalseStart(sslSocket *ss) { | |
6 (ss->ssl3.hs.kea_def->kea == kea_dhe_dss || | |
7 ss->ssl3.hs.kea_def->kea == kea_dhe_rsa || | |
8 ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa || | |
9 - ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa); | |
10 + ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa) && | |
11 + /* In light of recent RC4 analysis (http://www.isg.rhul.ac.uk/tls/), we | |
12 + * don't allow False Start with RC4. */ | |
Ryan Sleevi
2013/04/15 18:08:35
In 5 years (as NSS code easily lives on), this wil
agl
2013/04/16 14:59:29
Good point. Done.
| |
13 + ss->ssl3.cwSpec->cipher_def->cipher != cipher_rc4; | |
14 ssl_ReleaseSpecReadLock(ss); | |
15 return rv; | |
16 } | |
OLD | NEW |