Chromium Code Reviews| Index: net/third_party/nss/ssl/ssl3con.c |
| diff --git a/net/third_party/nss/ssl/ssl3con.c b/net/third_party/nss/ssl/ssl3con.c |
| index ee960890f836fb8bdb2ec76ca64bc1145f793d5b..3b0c22e02af5e7dcc6a8dcbf3bba2d9d73035e12 100644 |
| --- a/net/third_party/nss/ssl/ssl3con.c |
| +++ b/net/third_party/nss/ssl/ssl3con.c |
| @@ -6416,7 +6416,10 @@ ssl3_CanFalseStart(sslSocket *ss) { |
| (ss->ssl3.hs.kea_def->kea == kea_dhe_dss || |
| ss->ssl3.hs.kea_def->kea == kea_dhe_rsa || |
| ss->ssl3.hs.kea_def->kea == kea_ecdhe_ecdsa || |
| - ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa); |
| + ss->ssl3.hs.kea_def->kea == kea_ecdhe_rsa) && |
| + /* In light of recent RC4 analysis (http://www.isg.rhul.ac.uk/tls/), we |
| + * don't allow False Start with RC4. */ |
|
Ryan Sleevi
2013/04/15 18:08:35
Perhaps this should be integrated with the comment
agl
2013/04/16 14:59:29
Done.
|
| + ss->ssl3.cwSpec->cipher_def->cipher != cipher_rc4; |
| ssl_ReleaseSpecReadLock(ss); |
| return rv; |
| } |