diff --git a/boring/src/ssl/connector.rs b/boring/src/ssl/connector.rs index 22a001a1..510a67c1 100644 --- a/boring/src/ssl/connector.rs +++ b/boring/src/ssl/connector.rs @@ -288,6 +288,10 @@ impl ConnectConfiguration { } /// Sets whether the aes chacha20 preference should be enabled. + /// + /// Controls the priority of TLS 1.3 cipher suites. When set to `true`, the client prefers: + /// AES_128_GCM, CHACHA20_POLY1305, then AES_256_GCM. Useful in environments with specific + /// encryption requirements. #[cfg(not(feature = "fips"))] #[corresponds(SSL_set_prefer_chacha20)] pub fn set_prefer_chacha20(&mut self, enable: bool) { diff --git a/boring/src/ssl/mod.rs b/boring/src/ssl/mod.rs index 6f31e56f..5073dc46 100644 --- a/boring/src/ssl/mod.rs +++ b/boring/src/ssl/mod.rs @@ -1910,7 +1910,11 @@ impl SslContextBuilder { unsafe { ffi::SSL_CTX_set_aes_hw_override(self.as_ptr(), enable as _) } } - /// Sets whether the aes chacha20 preference should be enabled. + /// Sets whether the AES-ChaCha20 preference should be enabled. + /// + /// Controls the priority of TLS 1.3 cipher suites. When set to `true`, the client prefers: + /// AES_128_GCM, CHACHA20_POLY1305, then AES_256_GCM. Useful in environments with specific + /// encryption requirements. #[cfg(not(feature = "fips"))] #[corresponds(SSL_CTX_set_prefer_chacha20)] pub fn set_prefer_chacha20(&mut self, enable: bool) {