Chromium Code Reviews| Index: net/base/ssl_config_service.h |
| diff --git a/net/base/ssl_config_service.h b/net/base/ssl_config_service.h |
| index a4d3cb476bdf55cc9bfd92135cbf8c5a744a6b65..45c1fc6f3368f26f1197510d57cf6726b8317ef5 100644 |
| --- a/net/base/ssl_config_service.h |
| +++ b/net/base/ssl_config_service.h |
| @@ -18,7 +18,8 @@ struct SSLConfig { |
| // Default to SSL 2.0 off, SSL 3.0 on, and TLS 1.0 on. |
| SSLConfig() |
|
willchan no longer on Chromium
2009/11/25 19:48:13
I think might be getting to the point where making
|
| : rev_checking_enabled(true), ssl2_enabled(false), ssl3_enabled(true), |
| - tls1_enabled(true), send_client_cert(false), verify_ev_cert(false) { |
| + tls1_enabled(true), send_client_cert(false), verify_ev_cert(false), |
| + next_protos("\007http1.1") { |
| } |
| bool rev_checking_enabled; // True if server certificate revocation |
| @@ -57,6 +58,14 @@ struct SSLConfig { |
| bool verify_ev_cert; // True if we should verify the certificate for EV. |
| + // The list of application level protocols supported. If set, this will |
| + // enable Next Protocol Negotiation (if supported). This is a list of 8-bit |
| + // length prefixed strings. The order of the protocols doesn't matter expect |
| + // for one case: if the server supports Next Protocol Negotiation, but there |
| + // is no overlap between the server's and client's protocol sets, then the |
| + // first protocol in this list will be requested by the client. |
| + std::string next_protos; |
| + |
| scoped_refptr<X509Certificate> client_cert; |
| }; |