Remove GCM cipher mode requirements for fallback ciphersuites SecureTransport of MacOS/iOS does not support GCM cipher mode with ECDHE-ECDSA/ECDHE-RSA key-exchange algorithms even though they seem to claim that they do. This is supposedly fixed in MacOS 10.11 but that one is not out yet. Using "meta" suite from BoringSSL to support strong encryption algorithms with a bit more leeway, not just 4 we used to hardcode. BUG: 24468826 Change-Id: Ie62a9b11584b6745848090888b7d9e1fe50e90ee
diff --git a/src/microhttpd/daemon.c b/src/microhttpd/daemon.c index 40059cf..9247fba 100644 --- a/src/microhttpd/daemon.c +++ b/src/microhttpd/daemon.c
@@ -704,10 +704,7 @@ else { ret = SSL_CTX_set_cipher_list (daemon->tls_context, - "ECDHE-ECDSA-AES128-GCM-SHA256:" - "ECDHE-ECDSA-AES256-GCM-SHA384:" - "ECDHE-RSA-AES128-GCM-SHA256:" - "ECDHE-RSA-AES256-GCM-SHA384"); + "HIGH!SHA1!DH@STRENGTH"); if (ret == 0) { #if HAVE_MESSAGES