Skip to content

Commit

Permalink
Bug 1409587 - Remove TLS compression, r=ekr
Browse files Browse the repository at this point in the history
--HG--
branch : NSS_TLS13_DRAFT19_BRANCH
extra : rebase_source : b747cb0abbd3b86de6e68d30eecb63ccbf0bfc54
extra : amend_source : 97590f2d0dea55ce96650ac4104e02a63717b4d0
  • Loading branch information
martinthomson committed Oct 18, 2017
1 parent 08db6cf commit 75233c5
Show file tree
Hide file tree
Showing 13 changed files with 54 additions and 522 deletions.
1 change: 0 additions & 1 deletion coreconf/config.gypi
Expand Up @@ -96,7 +96,6 @@
'mozilla_client%': 0,
'moz_fold_libs%': 0,
'moz_folded_library_name%': '',
'ssl_enable_zlib%': 1,
'sanitizer_flags%': 0,
'test_build%': 0,
'no_zdefs%': 0,
Expand Down
7 changes: 1 addition & 6 deletions coreconf/config.mk
Expand Up @@ -172,7 +172,7 @@ endif

# FIPS support requires startup tests to be executed at load time of shared modules.
# For performance reasons, these tests are disabled by default.
# When compiling binaries that must support FIPS mode,
# When compiling binaries that must support FIPS mode,
# you should define NSS_FORCE_FIPS
#
# NSS_NO_INIT_SUPPORT is always defined on platforms that don't support
Expand All @@ -199,8 +199,3 @@ DEFINES += -DNO_NSPR_10_SUPPORT

# Hide old, deprecated, TLS cipher suite names when building NSS
DEFINES += -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES

# Mozilla's mozilla/modules/zlib/src/zconf.h adds the MOZ_Z_ prefix to zlib
# exported symbols, which causes problem when NSS is built as part of Mozilla.
# So we add a NSS_SSL_ENABLE_ZLIB variable to allow Mozilla to turn this off.
NSS_SSL_ENABLE_ZLIB = 1
6 changes: 0 additions & 6 deletions gtests/nss_bogo_shim/Makefile
Expand Up @@ -30,10 +30,6 @@ include ../common/gtest.mk

CFLAGS += -I$(CORE_DEPTH)/lib/ssl

ifdef NSS_SSL_ENABLE_ZLIB
include $(CORE_DEPTH)/coreconf/zlib.mk
endif

#######################################################################
# (5) Execute "global" rules. (OPTIONAL) #
#######################################################################
Expand All @@ -48,5 +44,3 @@ include $(CORE_DEPTH)/coreconf/rules.mk
#######################################################################
# (7) Execute "local" rules. (OPTIONAL). #
#######################################################################


4 changes: 0 additions & 4 deletions gtests/ssl_gtest/Makefile
Expand Up @@ -29,10 +29,6 @@ include ../common/gtest.mk

CFLAGS += -I$(CORE_DEPTH)/lib/ssl

ifdef NSS_SSL_ENABLE_ZLIB
include $(CORE_DEPTH)/coreconf/zlib.mk
endif

ifdef NSS_DISABLE_TLS_1_3
NSS_DISABLE_TLS_1_3=1
# Run parameterized tests only, for which we can easily exclude TLS 1.3
Expand Down
5 changes: 0 additions & 5 deletions lib/ssl/config.mk
Expand Up @@ -57,11 +57,6 @@ endif

endif

ifdef NSS_SSL_ENABLE_ZLIB
DEFINES += -DNSS_SSL_ENABLE_ZLIB
include $(CORE_DEPTH)/coreconf/zlib.mk
endif

ifdef NSS_DISABLE_TLS_1_3
DEFINES += -DNSS_DISABLE_TLS_1_3
endif
8 changes: 0 additions & 8 deletions lib/ssl/ssl.gyp
Expand Up @@ -61,14 +61,6 @@
'unix_err.c'
],
}],
[ 'ssl_enable_zlib==1', {
'dependencies': [
'<(DEPTH)/lib/zlib/zlib.gyp:nss_zlib'
],
'defines': [
'NSS_SSL_ENABLE_ZLIB',
],
}],
[ 'fuzz_tls==1', {
'defines': [
'UNSAFE_FUZZER_MODE',
Expand Down
3 changes: 1 addition & 2 deletions lib/ssl/ssl.h
Expand Up @@ -107,8 +107,7 @@ SSL_IMPORT PRFileDesc *DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd);
#define SSL_NO_LOCKS 17 /* Don't use locks for protection */
#define SSL_ENABLE_SESSION_TICKETS 18 /* Enable TLS SessionTicket */
/* extension (off by default) */
#define SSL_ENABLE_DEFLATE 19 /* Enable TLS compression with */
/* DEFLATE (off by default) */
#define SSL_ENABLE_DEFLATE 19 /* (unsupported, deprecated, off) */
#define SSL_ENABLE_RENEGOTIATION 20 /* Values below (default: never) */
#define SSL_REQUIRE_SAFE_NEGOTIATION 21 /* Peer must send Signaling */
/* Cipher Suite Value (SCSV) or */
Expand Down

0 comments on commit 75233c5

Please sign in to comment.