Chromium Code Reviews| Index: net/socket/ssl_client_socket_nss.cc |
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc |
| index 9923025f1cec592a1601689f1f77608da8246977..173fe3699142fbaa0f4b2d1727d913198416b353 100644 |
| --- a/net/socket/ssl_client_socket_nss.cc |
| +++ b/net/socket/ssl_client_socket_nss.cc |
| @@ -983,26 +983,13 @@ int SSLClientSocketNSS::InitializeSSLOptions() { |
| #endif |
| #ifdef SSL_ENABLE_RENEGOTIATION |
| - // Deliberately disable this check for now: http://crbug.com/55410 |
| - if (false && |
| - SSLConfigService::IsKnownStrictTLSServer(host_and_port_.host()) && |
| - !ssl_config_.mitm_proxies_allowed) { |
|
wtc
2011/04/05 17:20:03
Hmm... so this code has been disabled (by the 'fal
|
| - rv = SSL_OptionSet(nss_fd_, SSL_REQUIRE_SAFE_NEGOTIATION, PR_TRUE); |
| - if (rv != SECSuccess) { |
| - LogFailedNSSFunction( |
| - net_log_, "SSL_OptionSet", "SSL_REQUIRE_SAFE_NEGOTIATION"); |
| - } |
| - rv = SSL_OptionSet(nss_fd_, SSL_ENABLE_RENEGOTIATION, |
| - SSL_RENEGOTIATE_REQUIRES_XTN); |
| - } else { |
| - // We allow servers to request renegotiation. Since we're a client, |
| - // prohibiting this is rather a waste of time. Only servers are in a |
| - // position to prevent renegotiation attacks. |
| - // http://extendedsubset.com/?p=8 |
| + // We allow servers to request renegotiation. Since we're a client, |
| + // prohibiting this is rather a waste of time. Only servers are in a |
| + // position to prevent renegotiation attacks. |
| + // http://extendedsubset.com/?p=8 |
| - rv = SSL_OptionSet(nss_fd_, SSL_ENABLE_RENEGOTIATION, |
| - SSL_RENEGOTIATE_TRANSITIONAL); |
| - } |
| + rv = SSL_OptionSet(nss_fd_, SSL_ENABLE_RENEGOTIATION, |
| + SSL_RENEGOTIATE_TRANSITIONAL); |
| if (rv != SECSuccess) { |
| LogFailedNSSFunction( |
| net_log_, "SSL_OptionSet", "SSL_ENABLE_RENEGOTIATION"); |