Index: net/ssl/ssl_config.h |
diff --git a/net/ssl/ssl_config.h b/net/ssl/ssl_config.h |
index eee5622744c9c204950d96783f167b8280939d74..cb3a233394e8babf361a15002f968d7fed7c7059 100644 |
--- a/net/ssl/ssl_config.h |
+++ b/net/ssl/ssl_config.h |
@@ -101,19 +101,6 @@ struct NET_EXPORT SSLConfig { |
// disable TLS_ECDH_ECDSA_WITH_RC4_128_SHA, specify 0xC002. |
std::vector<uint16_t> disabled_cipher_suites; |
- // Enables deprecated cipher suites. These cipher suites are selected under a |
- // fallback to distinguish servers which require them from servers which |
- // merely prefer them. |
- // |
- // NOTE: because they are under a fallback, connections are still vulnerable |
- // to them as far as downgrades are concerned, so this should only be used for |
- // measurement of ciphers not to be carried long-term. It is no fix for |
- // servers with bad configurations without full removal. |
- // |
- // TODO(davidben): This is no longer used. Remove |
- // it. https://crbug.com/684730. |
- bool deprecated_cipher_suites_enabled; |
- |
// Enables the version interference probing mode. While TLS 1.3 has avoided |
// most endpoint intolerance, middlebox interference with TLS 1.3 is |
// rampant. This causes the connection to be discarded on success with |