| Index: net/http/transport_security_state.h
|
| diff --git a/net/http/transport_security_state.h b/net/http/transport_security_state.h
|
| index 55d8aeb9d6173db7ff7fe59cbd76246296d9fa1c..a76f235e43be6e8c5a08b821752cfa06b42cf04c 100644
|
| --- a/net/http/transport_security_state.h
|
| +++ b/net/http/transport_security_state.h
|
| @@ -421,14 +421,6 @@
|
| const HashValueVector& hashes,
|
| const GURL& report_uri);
|
|
|
| - // Enables or disables public key pinning bypass for local trust anchors.
|
| - // Disabling the bypass for local trust anchors is highly discouraged.
|
| - // This method is used by Cronet only and *** MUST NOT *** be used by any
|
| - // other consumer. For more information see "How does key pinning interact
|
| - // with local proxies and filters?" at
|
| - // https://www.chromium.org/Home/chromium-security/security-faq
|
| - void SetEnablePublicKeyPinningBypassForLocalTrustAnchors(bool value);
|
| -
|
| // Parses |value| as a Public-Key-Pins-Report-Only header value and
|
| // sends a HPKP report for |host_port_pair| if |ssl_info| violates the
|
| // pin. Returns true if |value| parses and includes a valid
|
| @@ -560,9 +552,6 @@
|
| // True if static expect-staple state should be used.
|
| bool enable_static_expect_staple_;
|
|
|
| - // True if public key pinning bypass is enabled for local trust anchors.
|
| - bool enable_pkp_bypass_for_local_trust_anchors_;
|
| -
|
| ExpectCTReporter* expect_ct_reporter_ = nullptr;
|
|
|
| RequireCTDelegate* require_ct_delegate_ = nullptr;
|
|
|