| Index: net/base/ssl_config_service.cc | 
| diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc | 
| index 9a448959f1fe3238120e0c3cd2fe5bc937714c95..e09e8110ec46d3daac99aaece7b9d358f87b0f82 100644 | 
| --- a/net/base/ssl_config_service.cc | 
| +++ b/net/base/ssl_config_service.cc | 
| @@ -24,7 +24,8 @@ SSLConfig::SSLConfig() | 
| tls1_enabled(true), dnssec_enabled(false), snap_start_enabled(false), | 
| dns_cert_provenance_checking_enabled(false), | 
| mitm_proxies_allowed(false), false_start_enabled(true), | 
| -      send_client_cert(false), verify_ev_cert(false), ssl3_fallback(false) { | 
| +      send_client_cert(false), verify_ev_cert(false), ssl3_fallback(false), | 
| +      use_tls_auth(true), require_tls_auth(false) { | 
| } | 
|  | 
| SSLConfig::~SSLConfig() { | 
| @@ -94,6 +95,7 @@ static bool g_false_start_enabled = true; | 
| static bool g_mitm_proxies_allowed = false; | 
| static bool g_snap_start_enabled = false; | 
| static bool g_dns_cert_provenance_checking = false; | 
| +static bool g_use_tls_auth = true; | 
|  | 
| // static | 
| void SSLConfigService::EnableDNSSEC() { | 
| @@ -164,13 +166,15 @@ void SSLConfigService::SetSSLConfigFlags(SSLConfig* ssl_config) { | 
| ssl_config->snap_start_enabled = g_snap_start_enabled; | 
| ssl_config->dns_cert_provenance_checking_enabled = | 
| g_dns_cert_provenance_checking; | 
| +  ssl_config->use_tls_auth = g_use_tls_auth; | 
| } | 
|  | 
| void SSLConfigService::ProcessConfigUpdate(const SSLConfig& orig_config, | 
| const SSLConfig& new_config) { | 
| if (orig_config.rev_checking_enabled != new_config.rev_checking_enabled || | 
| orig_config.ssl3_enabled != new_config.ssl3_enabled || | 
| -      orig_config.tls1_enabled != new_config.tls1_enabled) { | 
| +      orig_config.tls1_enabled != new_config.tls1_enabled || | 
| +      orig_config.use_tls_auth != new_config.use_tls_auth) { | 
| FOR_EACH_OBSERVER(Observer, observer_list_, OnSSLConfigChanged()); | 
| } | 
| } | 
|  |