2e839244b0
Before RFC 7539 we had a ChaCha20-Poly1305 cipher suite that had a 64/64 nonce/counter split (as DJB's original ChaCha20 did). RFC 7539 changed that to 96/32 and we've supported both for some time. This change removes the old version and the TLS cipher suites that used it. BUG=chromium:682816 Change-Id: I2345d6db83441691fe0c1ab6d7c6da4d24777849 Reviewed-on: https://boringssl-review.googlesource.com/13203 Reviewed-by: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
args.cc | ||
ciphers.cc | ||
client.cc | ||
CMakeLists.txt | ||
const.cc | ||
digest.cc | ||
generate_ed25519.cc | ||
genrsa.cc | ||
internal.h | ||
pkcs12.cc | ||
rand.cc | ||
server.cc | ||
speed.cc | ||
tool.cc | ||
transport_common.cc | ||
transport_common.h |