Remove remnants of non-standard ECDHE_PSK GCM ciphers.
Change-Id: I471880d785c38123e038279f67348bf02b47d091 Reviewed-on: https://boringssl-review.googlesource.com/13662 Reviewed-by: Steven Valdez <svaldez@google.com> Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
parent
6b0edfb9e6
commit
3bd57e3a6f
@ -2514,11 +2514,6 @@ func addTestForCipherSuite(suite testCipherSuite, ver tlsVersion, protocol proto
|
||||
// NULL ciphers must be explicitly enabled.
|
||||
flags = append(flags, "-cipher", "DEFAULT:NULL-SHA")
|
||||
}
|
||||
if hasComponent(suite.name, "ECDHE-PSK") && hasComponent(suite.name, "GCM") {
|
||||
// ECDHE_PSK AES_GCM ciphers must be explicitly enabled
|
||||
// for now.
|
||||
flags = append(flags, "-cipher", suite.name)
|
||||
}
|
||||
|
||||
var shouldServerFail, shouldClientFail bool
|
||||
if hasComponent(suite.name, "ECDHE") && ver.version == VersionSSL30 {
|
||||
|
Loading…
Reference in New Issue
Block a user