Remove deprecated TLS 1.3 variants.
Upgrade-Note: SSL_CTX_set_tls13_variant(tls13_experiment) on the server
should switch to SSL_CTX_set_tls13_variant(tls13_experiment2).
(Configuring any TLS 1.3 variants on the server enables all variants,
so this is a no-op. We're just retiring some old experiments.)
Change-Id: I60f0ca3f96ff84bdf59e1a282a46e51d99047462
Reviewed-on: https://boringssl-review.googlesource.com/23784
Commit-Queue: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: David Benjamin <davidben@google.com>
diff --git a/tool/server.cc b/tool/server.cc
index 9963885..37235a7 100644
--- a/tool/server.cc
+++ b/tool/server.cc
@@ -68,10 +68,7 @@
"-early-data", kBooleanArgument, "Allow early data",
},
{
- "-tls13-variant", kBooleanArgument, "Enable TLS 1.3 variants",
- },
- {
- "-tls13-draft22-variant", kBooleanArgument, "Enable TLS 1.3 Draft 22.",
+ "-tls13-variant", kBooleanArgument, "Enables all TLS 1.3 variants",
},
{
"-www", kBooleanArgument,
@@ -310,11 +307,8 @@
SSL_CTX_set_early_data_enabled(ctx.get(), 1);
}
- // Draft 22 variants need to be explicitly enabled.
- if (args_map.count("-tls13-draft22-variant") != 0) {
- SSL_CTX_set_tls13_variant(ctx.get(), tls13_draft22);
- } else if (args_map.count("-tls13-variant") != 0) {
- SSL_CTX_set_tls13_variant(ctx.get(), tls13_experiment);
+ if (args_map.count("-tls13-variant") != 0) {
+ SSL_CTX_set_tls13_variant(ctx.get(), tls13_experiment2);
}
if (args_map.count("-debug") != 0) {