| Index: net/base/ssl_config_service.cc
|
| diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc
|
| index 9a448959f1fe3238120e0c3cd2fe5bc937714c95..80a8aa1c513e7abd4433e7b6956322de35f73d56 100644
|
| --- a/net/base/ssl_config_service.cc
|
| +++ b/net/base/ssl_config_service.cc
|
| @@ -23,7 +23,7 @@ SSLConfig::SSLConfig()
|
| : rev_checking_enabled(true), ssl3_enabled(true),
|
| tls1_enabled(true), dnssec_enabled(false), snap_start_enabled(false),
|
| dns_cert_provenance_checking_enabled(false),
|
| - mitm_proxies_allowed(false), false_start_enabled(true),
|
| + false_start_enabled(true),
|
| send_client_cert(false), verify_ev_cert(false), ssl3_fallback(false) {
|
| }
|
|
|
| @@ -54,36 +54,6 @@ SSLConfigService* SSLConfigService::CreateSystemSSLConfigService() {
|
| }
|
|
|
| // static
|
| -bool SSLConfigService::IsKnownStrictTLSServer(const std::string& hostname) {
|
| - // If you wish to add an entry to this list, please contact agl AT chromium
|
| - // DOT org.
|
| - //
|
| - // If this list starts growing, it'll need to be something more efficient
|
| - // than a linear list.
|
| - static const char kStrictServers[][22] = {
|
| - "www.google.com",
|
| - "mail.google.com",
|
| - "www.gmail.com",
|
| - "docs.google.com",
|
| - "clients1.google.com",
|
| - "sunshinepress.org",
|
| - "www.sunshinepress.org",
|
| -
|
| - // Removed until we update the XMPP servers with the renegotiation
|
| - // extension.
|
| - // "gmail.com",
|
| - };
|
| -
|
| - for (size_t i = 0; i < arraysize(kStrictServers); i++) {
|
| - // Note that the hostname is normalised to lower-case by this point.
|
| - if (strcmp(hostname.c_str(), kStrictServers[i]) == 0)
|
| - return true;
|
| - }
|
| -
|
| - return false;
|
| -}
|
| -
|
| -// static
|
| bool SSLConfigService::IsKnownFalseStartIncompatibleServer(
|
| const std::string& hostname) {
|
| return SSLFalseStartBlacklist::IsMember(hostname.c_str());
|
| @@ -91,7 +61,6 @@ bool SSLConfigService::IsKnownFalseStartIncompatibleServer(
|
|
|
| static bool g_dnssec_enabled = false;
|
| static bool g_false_start_enabled = true;
|
| -static bool g_mitm_proxies_allowed = false;
|
| static bool g_snap_start_enabled = false;
|
| static bool g_dns_cert_provenance_checking = false;
|
|
|
| @@ -116,16 +85,6 @@ bool SSLConfigService::snap_start_enabled() {
|
| }
|
|
|
| // static
|
| -void SSLConfigService::AllowMITMProxies() {
|
| - g_mitm_proxies_allowed = true;
|
| -}
|
| -
|
| -// static
|
| -bool SSLConfigService::mitm_proxies_allowed() {
|
| - return g_mitm_proxies_allowed;
|
| -}
|
| -
|
| -// static
|
| void SSLConfigService::DisableFalseStart() {
|
| g_false_start_enabled = false;
|
| }
|
| @@ -160,7 +119,6 @@ SSLConfigService::~SSLConfigService() {
|
| void SSLConfigService::SetSSLConfigFlags(SSLConfig* ssl_config) {
|
| ssl_config->dnssec_enabled = g_dnssec_enabled;
|
| ssl_config->false_start_enabled = g_false_start_enabled;
|
| - ssl_config->mitm_proxies_allowed = g_mitm_proxies_allowed;
|
| ssl_config->snap_start_enabled = g_snap_start_enabled;
|
| ssl_config->dns_cert_provenance_checking_enabled =
|
| g_dns_cert_provenance_checking;
|
|
|