Index: net/base/ssl_config_service.h |
diff --git a/net/base/ssl_config_service.h b/net/base/ssl_config_service.h |
index e0879ed55525ee73041d15cbf20926daacdca217..1fad97a99fe1c7cba6c7a8b10bbb7167f57d323f 100644 |
--- a/net/base/ssl_config_service.h |
+++ b/net/base/ssl_config_service.h |
@@ -56,14 +56,6 @@ struct SSLConfig { |
// TODO(rsleevi): Not implemented when using Schannel. |
std::vector<uint16> disabled_cipher_suites; |
- // True if we allow this connection to be MITM attacked. This sounds a little |
- // worse than it is: large networks sometimes MITM attack all SSL connections |
- // on egress. We want to know this because we might not have the end-to-end |
- // connection that we believe that we have based on the hostname. Therefore, |
- // certain certificate checks can't be performed and we can't use outside |
- // knowledge about whether the server has the renegotiation extension. |
- bool mitm_proxies_allowed; |
- |
bool false_start_enabled; // True if we'll use TLS False Start. |
// TODO(wtc): move the following members to a new SSLParams structure. They |
@@ -135,14 +127,6 @@ class SSLConfigService : public base::RefCountedThreadSafe<SSLConfigService> { |
// May not be thread-safe, should only be called on the IO thread. |
virtual void GetSSLConfig(SSLConfig* config) = 0; |
- // Returns true if the given hostname is known to be 'strict'. This means |
- // that we will require the renegotiation extension and will always use TLS |
- // (no SSLv3 fallback). |
- // |
- // If you wish to add an element to this list, file a bug at |
- // http://crbug.com and email the link to agl AT chromium DOT org. |
- static bool IsKnownStrictTLSServer(const std::string& hostname); |
- |
// Returns true if the given hostname is known to be incompatible with TLS |
// False Start. |
static bool IsKnownFalseStartIncompatibleServer(const std::string& hostname); |
@@ -157,11 +141,6 @@ class SSLConfigService : public base::RefCountedThreadSafe<SSLConfigService> { |
static void EnableSnapStart(); |
static bool snap_start_enabled(); |
- // Sets a global flag which allows SSL connections to be MITM attacked. See |
- // the comment about this flag in |SSLConfig|. |
- static void AllowMITMProxies(); |
- static bool mitm_proxies_allowed(); |
- |
// Disables False Start in SSL connections. |
static void DisableFalseStart(); |
// True if we use False Start for SSL and TLS. |