| Index: net/ssl/ssl_config.h
|
| diff --git a/net/ssl/ssl_config.h b/net/ssl/ssl_config.h
|
| index eee5622744c9c204950d96783f167b8280939d74..cb3a233394e8babf361a15002f968d7fed7c7059 100644
|
| --- a/net/ssl/ssl_config.h
|
| +++ b/net/ssl/ssl_config.h
|
| @@ -101,19 +101,6 @@ struct NET_EXPORT SSLConfig {
|
| // disable TLS_ECDH_ECDSA_WITH_RC4_128_SHA, specify 0xC002.
|
| std::vector<uint16_t> disabled_cipher_suites;
|
|
|
| - // Enables deprecated cipher suites. These cipher suites are selected under a
|
| - // fallback to distinguish servers which require them from servers which
|
| - // merely prefer them.
|
| - //
|
| - // NOTE: because they are under a fallback, connections are still vulnerable
|
| - // to them as far as downgrades are concerned, so this should only be used for
|
| - // measurement of ciphers not to be carried long-term. It is no fix for
|
| - // servers with bad configurations without full removal.
|
| - //
|
| - // TODO(davidben): This is no longer used. Remove
|
| - // it. https://crbug.com/684730.
|
| - bool deprecated_cipher_suites_enabled;
|
| -
|
| // Enables the version interference probing mode. While TLS 1.3 has avoided
|
| // most endpoint intolerance, middlebox interference with TLS 1.3 is
|
| // rampant. This causes the connection to be discarded on success with
|
|
|