diff options
author | cevans@chromium.org <cevans@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-06-19 20:06:10 +0000 |
---|---|---|
committer | cevans@chromium.org <cevans@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-06-19 20:06:10 +0000 |
commit | af72fdcb104ef51e9beb0e82db009dc8280e9a99 (patch) | |
tree | 50fc687f6d64c98cd7f09133057a480f125f8db6 /net/base/load_flags_list.h | |
parent | 925d400db588d8650d5c3e085a581a7be4326fbd (diff) | |
download | chromium_src-af72fdcb104ef51e9beb0e82db009dc8280e9a99.zip chromium_src-af72fdcb104ef51e9beb0e82db009dc8280e9a99.tar.gz chromium_src-af72fdcb104ef51e9beb0e82db009dc8280e9a99.tar.bz2 |
Revert 89489 - net: don't check revocation when fetching PAC files.
If a PAC file is configured on an HTTPS URL we get into trouble. In order to
check revocation we need to make an HTTP request to the OCSP/CRL server, which
needs the PAC script to load and so we deadlock.
With this change we don't check revocation for PAC fetches.
BUG=86219
TEST=Configure a PAC script on HTTPS.
Review URL: http://codereview.chromium.org/7170026
TBR=agl@chromium.org
NOTE: I'll roll this back in if it turns out unrelated to the ProxyEvents failure.
Review URL: http://codereview.chromium.org/7204023
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@89628 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/load_flags_list.h')
-rw-r--r-- | net/base/load_flags_list.h | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/net/base/load_flags_list.h b/net/base/load_flags_list.h index 242a3de..364ef94 100644 --- a/net/base/load_flags_list.h +++ b/net/base/load_flags_list.h @@ -51,9 +51,9 @@ LOAD_FLAG(IGNORE_CERT_DATE_INVALID, 1 << 9) // (The default behavior is to trigger an OnSSLCertificateError callback). LOAD_FLAG(IGNORE_CERT_AUTHORITY_INVALID, 1 << 10) -// If present, causes certificate revocation checks to be skipped on secure -// connections. -LOAD_FLAG(DISABLE_CERT_REVOCATION_CHECKING, 1 << 11) +// If present, ignores certificate revocation +// (The default behavior is to trigger an OnSSLCertificateError callback). +LOAD_FLAG(IGNORE_CERT_REVOCATION, 1 << 11) // If present, ignores wrong key usage of the certificate // (The default behavior is to trigger an OnSSLCertificateError callback). |