Index: net/ssl/ssl_cipher_suite_names.cc |
diff --git a/net/ssl/ssl_cipher_suite_names.cc b/net/ssl/ssl_cipher_suite_names.cc |
index 0b21edb521778994056e70e9ddf83db3913c0627..c99ac0bdeb20591ed7319431b505a1f85b478037 100644 |
--- a/net/ssl/ssl_cipher_suite_names.cc |
+++ b/net/ssl/ssl_cipher_suite_names.cc |
@@ -366,9 +366,8 @@ bool IsSecureTLSCipherSuite(uint16 cipher_suite) { |
if (!GetCipherProperties(cipher_suite, &key_exchange, &cipher, &mac)) |
return false; |
- // Only allow forward secure key exchanges. |
+ // Only allow ECDHE key exchanges. |
switch (key_exchange) { |
- case 10: // DHE_RSA |
case 14: // ECDHE_ECDSA |
case 16: // ECDHE_RSA |
break; |
@@ -392,13 +391,14 @@ bool IsSecureTLSCipherSuite(uint16 cipher_suite) { |
return true; |
} |
-bool IsFalseStartableTLSCipherSuite(uint16 cipher_suite) { |
+bool IsTLSCipherSuiteAllowedByHTTP2(uint16 cipher_suite) { |
int key_exchange, cipher, mac; |
if (!GetCipherProperties(cipher_suite, &key_exchange, &cipher, &mac)) |
return false; |
- // Only allow ECDHE key exchanges. |
+ // Only allow forward secure key exchanges. |
switch (key_exchange) { |
+ case 10: // DHE_RSA |
case 14: // ECDHE_ECDSA |
case 16: // ECDHE_RSA |
break; |