summaryrefslogtreecommitdiffstats
path: root/net/base/load_flags_list.h
diff options
context:
space:
mode:
authorcevans@chromium.org <cevans@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-06-19 20:06:10 +0000
committercevans@chromium.org <cevans@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-06-19 20:06:10 +0000
commitaf72fdcb104ef51e9beb0e82db009dc8280e9a99 (patch)
tree50fc687f6d64c98cd7f09133057a480f125f8db6 /net/base/load_flags_list.h
parent925d400db588d8650d5c3e085a581a7be4326fbd (diff)
downloadchromium_src-af72fdcb104ef51e9beb0e82db009dc8280e9a99.zip
chromium_src-af72fdcb104ef51e9beb0e82db009dc8280e9a99.tar.gz
chromium_src-af72fdcb104ef51e9beb0e82db009dc8280e9a99.tar.bz2
Revert 89489 - net: don't check revocation when fetching PAC files.
If a PAC file is configured on an HTTPS URL we get into trouble. In order to check revocation we need to make an HTTP request to the OCSP/CRL server, which needs the PAC script to load and so we deadlock. With this change we don't check revocation for PAC fetches. BUG=86219 TEST=Configure a PAC script on HTTPS. Review URL: http://codereview.chromium.org/7170026 TBR=agl@chromium.org NOTE: I'll roll this back in if it turns out unrelated to the ProxyEvents failure. Review URL: http://codereview.chromium.org/7204023 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@89628 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/load_flags_list.h')
-rw-r--r--net/base/load_flags_list.h6
1 files changed, 3 insertions, 3 deletions
diff --git a/net/base/load_flags_list.h b/net/base/load_flags_list.h
index 242a3de..364ef94 100644
--- a/net/base/load_flags_list.h
+++ b/net/base/load_flags_list.h
@@ -51,9 +51,9 @@ LOAD_FLAG(IGNORE_CERT_DATE_INVALID, 1 << 9)
// (The default behavior is to trigger an OnSSLCertificateError callback).
LOAD_FLAG(IGNORE_CERT_AUTHORITY_INVALID, 1 << 10)
-// If present, causes certificate revocation checks to be skipped on secure
-// connections.
-LOAD_FLAG(DISABLE_CERT_REVOCATION_CHECKING, 1 << 11)
+// If present, ignores certificate revocation
+// (The default behavior is to trigger an OnSSLCertificateError callback).
+LOAD_FLAG(IGNORE_CERT_REVOCATION, 1 << 11)
// If present, ignores wrong key usage of the certificate
// (The default behavior is to trigger an OnSSLCertificateError callback).