diff options
author | Martin Stransky <stransky@redhat.com> | 2017-01-18 12:42:27 +0100 |
---|---|---|
committer | Martin Stransky <stransky@redhat.com> | 2017-01-18 12:42:27 +0100 |
commit | a25c5d4d7c756218220ca3052e42a4d007b31b26 (patch) | |
tree | 4ebb43c9f1d00920ae5b352ec54bdfdd68d7ee86 /mozilla-1290037.patch | |
parent | Enable telemetry (diff) | |
download | librewolf-fedora-ff-a25c5d4d7c756218220ca3052e42a4d007b31b26.tar.gz librewolf-fedora-ff-a25c5d4d7c756218220ca3052e42a4d007b31b26.tar.bz2 librewolf-fedora-ff-a25c5d4d7c756218220ca3052e42a4d007b31b26.zip |
Update to 51.0 (B1)
Diffstat (limited to 'mozilla-1290037.patch')
-rw-r--r-- | mozilla-1290037.patch | 34 |
1 files changed, 0 insertions, 34 deletions
diff --git a/mozilla-1290037.patch b/mozilla-1290037.patch deleted file mode 100644 index 508d580..0000000 --- a/mozilla-1290037.patch +++ /dev/null @@ -1,34 +0,0 @@ -# HG changeset patch -# User Franziskus Kiefer <franziskuskiefer@gmail.com> -# Date 1469717280 -7200 -# Thu Jul 28 16:48:00 2016 +0200 -# Node ID 95aa61f1e3562e526bf88179d9d078fd90ad1bda -# Parent d42aacfe34af25e2f5110e2ca3d24a210eabeb33 -Update keybits in H2, r=mt - -MozReview-Commit-ID: 35oWoDMqe1Y - -diff --git a/netwerk/protocol/http/Http2Session.cpp b/netwerk/protocol/http/Http2Session.cpp ---- a/netwerk/protocol/http/Http2Session.cpp -+++ b/netwerk/protocol/http/Http2Session.cpp -@@ -3544,18 +3544,18 @@ Http2Session::ConfirmTLSProfile() - RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY); - } - - uint32_t keybits = ssl->GetKEAKeyBits(); - if (kea == ssl_kea_dh && keybits < 2048) { - LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to DH %d < 2048\n", - this, keybits)); - RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY); -- } else if (kea == ssl_kea_ecdh && keybits < 256) { // 256 bits is "security level" of 128 -- LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 256\n", -+ } else if (kea == ssl_kea_ecdh && keybits < 224) { // see rfc7540 9.2.1. -+ LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 224\n", - this, keybits)); - RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY); - } - - int16_t macAlgorithm = ssl->GetMACAlgorithmUsed(); - LOG3(("Http2Session::ConfirmTLSProfile %p MAC Algortihm (aead==6) %d\n", - this, macAlgorithm)); - if (macAlgorithm != nsISSLSocketControl::SSL_MAC_AEAD) { |