Chromium Code Reviews| Index: net/ssl/ssl_config.h |
| diff --git a/net/ssl/ssl_config.h b/net/ssl/ssl_config.h |
| index 0a5a83d803357ef7bf7ad681257182e42793df0e..21f4cccbdf831b50f53ddf7a05a0d88804678714 100644 |
| --- a/net/ssl/ssl_config.h |
| +++ b/net/ssl/ssl_config.h |
| @@ -97,19 +97,6 @@ struct NET_EXPORT SSLConfig { |
| // Presorted list of cipher suites which should be explicitly prevented from |
| // being used in addition to those disabled by the net built-in policy. |
| // |
| - // By default, all cipher suites supported by the underlying SSL |
| - // implementation will be enabled except for: |
|
davidben
2016/03/08 01:42:16
This comment isn't terribly meaningful anymore sin
|
| - // - Null encryption cipher suites. |
| - // - Weak cipher suites: < 80 bits of security strength. |
| - // - FORTEZZA cipher suites (obsolete). |
| - // - IDEA cipher suites (RFC 5469 explains why). |
| - // - Anonymous cipher suites. |
| - // - ECDSA cipher suites on platforms that do not support ECDSA signed |
| - // certificates, as servers may use the presence of such ciphersuites as a |
| - // hint to send an ECDSA certificate. |
| - // The ciphers listed in |disabled_cipher_suites| will be removed in addition |
| - // to the above list. |
| - // |
| // Though cipher suites are sent in TLS as "uint8_t CipherSuite[2]", in |
| // big-endian form, they should be declared in host byte order, with the |
| // first uint8_t occupying the most significant byte. |