Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(29)

Side by Side Diff: net/ssl/ssl_config.h

Issue 2653773003: Remove remnants of DHE support. (Closed)
Patch Set: Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_SSL_SSL_CONFIG_H_ 5 #ifndef NET_SSL_SSL_CONFIG_H_
6 #define NET_SSL_SSL_CONFIG_H_ 6 #define NET_SSL_SSL_CONFIG_H_
7 7
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include "base/memory/ref_counted.h" 10 #include "base/memory/ref_counted.h"
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after
88 // Presorted list of cipher suites which should be explicitly prevented from 88 // Presorted list of cipher suites which should be explicitly prevented from
89 // being used in addition to those disabled by the net built-in policy. 89 // being used in addition to those disabled by the net built-in policy.
90 // 90 //
91 // Though cipher suites are sent in TLS as "uint8_t CipherSuite[2]", in 91 // Though cipher suites are sent in TLS as "uint8_t CipherSuite[2]", in
92 // big-endian form, they should be declared in host byte order, with the 92 // big-endian form, they should be declared in host byte order, with the
93 // first uint8_t occupying the most significant byte. 93 // first uint8_t occupying the most significant byte.
94 // Ex: To disable TLS_RSA_WITH_RC4_128_MD5, specify 0x0004, while to 94 // Ex: To disable TLS_RSA_WITH_RC4_128_MD5, specify 0x0004, while to
95 // disable TLS_ECDH_ECDSA_WITH_RC4_128_SHA, specify 0xC002. 95 // disable TLS_ECDH_ECDSA_WITH_RC4_128_SHA, specify 0xC002.
96 std::vector<uint16_t> disabled_cipher_suites; 96 std::vector<uint16_t> disabled_cipher_suites;
97 97
98 // Enables deprecated cipher suites. These cipher suites are selected under a
99 // fallback to distinguish servers which require them from servers which
100 // merely prefer them.
101 //
102 // NOTE: because they are under a fallback, connections are still vulnerable
103 // to them as far as downgrades are concerned, so this should only be used for
104 // measurement of ciphers not to be carried long-term. It is no fix for
105 // servers with bad configurations without full removal.
106 bool deprecated_cipher_suites_enabled;
107
108 // Enables DHE cipher suites.
109 bool dhe_enabled;
110
111 bool channel_id_enabled; // True if TLS channel ID extension is enabled. 98 bool channel_id_enabled; // True if TLS channel ID extension is enabled.
112 99
113 // List of Token Binding key parameters supported by the client. If empty, 100 // List of Token Binding key parameters supported by the client. If empty,
114 // Token Binding will be disabled, even if token_binding_enabled is true. 101 // Token Binding will be disabled, even if token_binding_enabled is true.
115 std::vector<TokenBindingParam> token_binding_params; 102 std::vector<TokenBindingParam> token_binding_params;
116 103
117 bool false_start_enabled; // True if we'll use TLS False Start. 104 bool false_start_enabled; // True if we'll use TLS False Start.
118 // True if the Certificate Transparency signed_certificate_timestamp 105 // True if the Certificate Transparency signed_certificate_timestamp
119 // TLS extension is enabled. 106 // TLS extension is enabled.
120 bool signed_cert_timestamps_enabled; 107 bool signed_cert_timestamps_enabled;
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
165 // The list of application-level protocols to enable renegotiation for. 152 // The list of application-level protocols to enable renegotiation for.
166 NextProtoVector renego_allowed_for_protos; 153 NextProtoVector renego_allowed_for_protos;
167 154
168 scoped_refptr<X509Certificate> client_cert; 155 scoped_refptr<X509Certificate> client_cert;
169 scoped_refptr<SSLPrivateKey> client_private_key; 156 scoped_refptr<SSLPrivateKey> client_private_key;
170 }; 157 };
171 158
172 } // namespace net 159 } // namespace net
173 160
174 #endif // NET_SSL_SSL_CONFIG_H_ 161 #endif // NET_SSL_SSL_CONFIG_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698