def9b46801
Before RFC 7539 we had a ChaCha20-Poly1305 cipher suite that had a 64/64 nonce/counter split (as DJB's original ChaCha20 did). RFC 7539 changed that to 96/32 and we've supported both for some time. This change removes the old version and the TLS cipher suites that used it. Change-Id: Icd9c2117c657f3aa6df55990c618d562194ef0e8 Reviewed-on: https://boringssl-review.googlesource.com/13201 CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> Reviewed-by: David Benjamin <davidben@google.com> Reviewed-by: Adam Langley <agl@google.com> Commit-Queue: Adam Langley <agl@google.com> |
||
---|---|---|
.. | ||
test | ||
aead_test.cc | ||
aead.c | ||
cipher_test.cc | ||
cipher.c | ||
CMakeLists.txt | ||
derive_key.c | ||
e_aes.c | ||
e_chacha20poly1305.c | ||
e_des.c | ||
e_null.c | ||
e_rc2.c | ||
e_rc4.c | ||
e_ssl3.c | ||
e_tls.c | ||
internal.h | ||
tls_cbc.c |