Skip to content

Commit

Permalink
closes #480: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 plus SHA-384 base …
Browse files Browse the repository at this point in the history
…plumbing from M923089+M1276618+M1278434
  • Loading branch information
classilla committed Apr 10, 2018
1 parent 2a28a03 commit 1f117b4
Show file tree
Hide file tree
Showing 14 changed files with 190 additions and 63 deletions.
3 changes: 3 additions & 0 deletions media/mtransport/transportlayerdtls.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -673,6 +673,9 @@ static const uint32_t EnabledCiphers[] = {
// Anything outside this list is governed by the usual combination of policy
// and user preferences.
static const uint32_t DisabledCiphers[] = {
// ALL SHA384 ciphers are disabled per bug 1310061.
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,

TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
Expand Down
1 change: 1 addition & 0 deletions netwerk/base/security-prefs.js
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ pref("security.ssl.enable_alpn", true);

pref("security.ssl3.ecdhe_rsa_aes_128_gcm_sha256", true);
pref("security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256", true);
pref("security.ssl3.ecdhe_rsa_aes_256_gcm_sha384", true);
pref("security.ssl3.ecdhe_rsa_aes_128_sha", true);
pref("security.ssl3.ecdhe_rsa_aes_128_sha256", true);
pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", true);
Expand Down
1 change: 1 addition & 0 deletions security/manager/ssl/nsNSSCallbacks.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -1080,6 +1080,7 @@ AccumulateCipherSuite(Telemetry::ID probe, const SSLChannelInfo& channelInfo)
case TLS_ECDHE_ECDSA_WITH_RC4_128_SHA: value = 9; break;
case TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA: value = 10; break;
case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: value = 11; break; // just in case, issue 489
case TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: value = 14; break; // just in case, issue 480
// DHE key exchange
case TLS_DHE_RSA_WITH_AES_128_CBC_SHA: value = 21; break;
case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA: value = 22; break;
Expand Down
4 changes: 4 additions & 0 deletions security/manager/ssl/nsNSSComponent.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -619,6 +619,10 @@ static const CipherPref sCipherPrefs[] = {
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, true },
{ "security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256",
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, true },

{ "security.ssl3.ecdhe_rsa_aes_256_gcm_sha384",
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, true },

{ "security.ssl3.ecdhe_rsa_aes_128_sha",
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, true },
{ "security.ssl3.ecdhe_ecdsa_aes_128_sha",
Expand Down
3 changes: 3 additions & 0 deletions security/nss/lib/ssl/derive.c
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,9 @@
#include "sslerr.h"

#ifndef NO_PKCS11_BYPASS

#error not patched for SHA384, see bug 923089

/* make this a macro! */
#ifdef NOT_A_MACRO
static void
Expand Down
Loading

0 comments on commit 1f117b4

Please sign in to comment.