Index: net/base/ssl_config_service.cc |
diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc |
index 9a448959f1fe3238120e0c3cd2fe5bc937714c95..e09e8110ec46d3daac99aaece7b9d358f87b0f82 100644 |
--- a/net/base/ssl_config_service.cc |
+++ b/net/base/ssl_config_service.cc |
@@ -24,7 +24,8 @@ SSLConfig::SSLConfig() |
tls1_enabled(true), dnssec_enabled(false), snap_start_enabled(false), |
dns_cert_provenance_checking_enabled(false), |
mitm_proxies_allowed(false), false_start_enabled(true), |
- send_client_cert(false), verify_ev_cert(false), ssl3_fallback(false) { |
+ send_client_cert(false), verify_ev_cert(false), ssl3_fallback(false), |
+ use_tls_auth(true), require_tls_auth(false) { |
} |
SSLConfig::~SSLConfig() { |
@@ -94,6 +95,7 @@ static bool g_false_start_enabled = true; |
static bool g_mitm_proxies_allowed = false; |
static bool g_snap_start_enabled = false; |
static bool g_dns_cert_provenance_checking = false; |
+static bool g_use_tls_auth = true; |
// static |
void SSLConfigService::EnableDNSSEC() { |
@@ -164,13 +166,15 @@ void SSLConfigService::SetSSLConfigFlags(SSLConfig* ssl_config) { |
ssl_config->snap_start_enabled = g_snap_start_enabled; |
ssl_config->dns_cert_provenance_checking_enabled = |
g_dns_cert_provenance_checking; |
+ ssl_config->use_tls_auth = g_use_tls_auth; |
} |
void SSLConfigService::ProcessConfigUpdate(const SSLConfig& orig_config, |
const SSLConfig& new_config) { |
if (orig_config.rev_checking_enabled != new_config.rev_checking_enabled || |
orig_config.ssl3_enabled != new_config.ssl3_enabled || |
- orig_config.tls1_enabled != new_config.tls1_enabled) { |
+ orig_config.tls1_enabled != new_config.tls1_enabled || |
+ orig_config.use_tls_auth != new_config.use_tls_auth) { |
FOR_EACH_OBSERVER(Observer, observer_list_, OnSSLConfigChanged()); |
} |
} |