diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-01-24 13:52:37 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-01-24 13:52:37 +0000 |
commit | ebb9c3367f66a00799131f42baff75dce6e23530 (patch) | |
tree | 86b72efeb13ecd644cd0f505e7364c7def38d968 /content/browser | |
parent | 25f4fbfeb8be8aeb07f39e542f40028908b63a5d (diff) | |
download | chromium_src-ebb9c3367f66a00799131f42baff75dce6e23530.zip chromium_src-ebb9c3367f66a00799131f42baff75dce6e23530.tar.gz chromium_src-ebb9c3367f66a00799131f42baff75dce6e23530.tar.bz2 |
net: add a policy option: DisableSSLRecordSplitting
Microsoft are providing a similar policy option and it looks like some
groups
may need it while their proxies are updated.
It's rather unfortunate that the underlying SSLConfigService member is
called
enable_false_start, but I don't want to conflate a clean up of that with
this
CL.
BUG=107728
TEST=none
http://codereview.chromium.org/9131012
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@118833 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/browser')
-rw-r--r-- | content/browser/browser_main_loop.cc | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/content/browser/browser_main_loop.cc b/content/browser/browser_main_loop.cc index 8203333..8579b78 100644 --- a/content/browser/browser_main_loop.cc +++ b/content/browser/browser_main_loop.cc @@ -256,8 +256,6 @@ void BrowserMainLoop::EarlyInitialization() { SetupSandbox(parsed_command_line_); #endif - if (parsed_command_line_.HasSwitch(switches::kDisableSSLFalseStart)) - net::SSLConfigService::DisableFalseStart(); if (parsed_command_line_.HasSwitch(switches::kEnableSSLCachedInfo)) net::SSLConfigService::EnableCachedInfo(); if (parsed_command_line_.HasSwitch( |