@@ -216,6 +216,14 @@ const struct s2n_security_policy security_policy_cloudfront_tls_1_2_2018 = {
216
216
.ecc_preferences = & s2n_ecc_preferences_20200310 ,
217
217
};
218
218
219
+ const struct s2n_security_policy security_policy_cloudfront_tls_1_2_2019 = {
220
+ .minimum_protocol_version = S2N_TLS12 ,
221
+ .cipher_preferences = & cipher_preferences_cloudfront_tls_1_2_2019 ,
222
+ .kem_preferences = & kem_preferences_null ,
223
+ .signature_preferences = & s2n_signature_preferences_20200207 ,
224
+ .ecc_preferences = & s2n_ecc_preferences_20200310 ,
225
+ };
226
+
219
227
/* CloudFront viewer facing legacy TLS 1.2 policies */
220
228
const struct s2n_security_policy security_policy_cloudfront_ssl_v_3_legacy = {
221
229
.minimum_protocol_version = S2N_SSLv3 ,
@@ -264,22 +272,6 @@ const struct s2n_security_policy security_policy_cloudfront_tls_1_2_2019_legacy
264
272
.signature_preferences = & s2n_signature_preferences_20140601 ,
265
273
.ecc_preferences = & s2n_ecc_preferences_20140601 ,
266
274
};
267
- /* CloudFront undocumented policies for testing */
268
- const struct s2n_security_policy security_policy_cloudfront_tls_1_2_2019 = {
269
- .minimum_protocol_version = S2N_TLS12 ,
270
- .cipher_preferences = & cipher_preferences_cloudfront_tls_1_2_2019 ,
271
- .kem_preferences = & kem_preferences_null ,
272
- .signature_preferences = & s2n_signature_preferences_20200207 ,
273
- .ecc_preferences = & s2n_ecc_preferences_20200310 ,
274
- };
275
-
276
- const struct s2n_security_policy security_policy_cloudfront_tls_1_2_2020 = {
277
- .minimum_protocol_version = S2N_TLS12 ,
278
- .cipher_preferences = & cipher_preferences_cloudfront_tls_1_2_2020 ,
279
- .kem_preferences = & kem_preferences_null ,
280
- .signature_preferences = & s2n_signature_preferences_20200207 ,
281
- .ecc_preferences = & s2n_ecc_preferences_20200310 ,
282
- };
283
275
284
276
const struct s2n_security_policy security_policy_kms_tls_1_0_2018_10 = {
285
277
.minimum_protocol_version = S2N_TLS10 ,
@@ -573,8 +565,6 @@ struct s2n_security_policy_selection security_policy_selection[] = {
573
565
{ .version = "CloudFront-TLS-1-1-2016-Legacy" , .security_policy = & security_policy_cloudfront_tls_1_1_2016_legacy , .ecc_extension_required = 0 , .pq_kem_extension_required = 0 },
574
566
{ .version = "CloudFront-TLS-1-2-2018-Legacy" , .security_policy = & security_policy_cloudfront_tls_1_2_2018_legacy , .ecc_extension_required = 0 , .pq_kem_extension_required = 0 },
575
567
{ .version = "CloudFront-TLS-1-2-2019-Legacy" , .security_policy = & security_policy_cloudfront_tls_1_2_2019_legacy , .ecc_extension_required = 0 , .pq_kem_extension_required = 0 },
576
- /* CloudFront undocumented */
577
- { .version = "CloudFront-TLS-1-2-2020" , .security_policy = & security_policy_cloudfront_tls_1_2_2020 , .ecc_extension_required = 0 , .pq_kem_extension_required = 0 },
578
568
{ .version = "KMS-TLS-1-0-2018-10" , .security_policy = & security_policy_kms_tls_1_0_2018_10 , .ecc_extension_required = 0 , .pq_kem_extension_required = 0 },
579
569
#if !defined (S2N_NO_PQ )
580
570
{ .version = "KMS-PQ-TLS-1-0-2019-06" , .security_policy = & security_policy_kms_pq_tls_1_0_2019_06 , .ecc_extension_required = 0 , .pq_kem_extension_required = 0 },
0 commit comments