| Index: net/ssl/ssl_cipher_suite_names.h
|
| diff --git a/net/ssl/ssl_cipher_suite_names.h b/net/ssl/ssl_cipher_suite_names.h
|
| index 5145fb24c5ee1393511b3c1ca0f5f40741a39349..29c03a1aea0e64ee391ee618146c92c2eafc1db1 100644
|
| --- a/net/ssl/ssl_cipher_suite_names.h
|
| +++ b/net/ssl/ssl_cipher_suite_names.h
|
| @@ -46,6 +46,17 @@ NET_EXPORT void SSLVersionToString(const char** name, int ssl_version);
|
| NET_EXPORT bool ParseSSLCipherString(const std::string& cipher_string,
|
| uint16* cipher_suite);
|
|
|
| +// |cipher_suite| is the IANA id for the cipher suite. What a "secure"
|
| +// cipher suite is arbitrarily determined here. The intent is to indicate what
|
| +// cipher suites meet modern security standards when backwards compatibility can
|
| +// be ignored. Notably, HTTP/2 requires/encourages this sort of validation of
|
| +// cipher suites: https://http2.github.io/http2-spec/#TLSUsage.
|
| +//
|
| +// Currently, this function follows these criteria:
|
| +// 1) Only uses forward secure key exchanges
|
| +// 2) Only uses AEADs
|
| +NET_EXPORT_PRIVATE bool IsSecureTLSCipherSuite(uint16 cipher_suite);
|
| +
|
| } // namespace net
|
|
|
| #endif // NET_SSL_SSL_CIPHER_SUITE_NAMES_H_
|
|
|