summaryrefslogtreecommitdiffstats
path: root/net/base/ssl_config_service.h
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-08-23 15:49:40 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-08-23 15:49:40 +0000
commitac3b2592ae2fa2ec77e4ac82f644220499dd13e9 (patch)
treea2a4be682a920de7dc061531a6efe96756b5c321 /net/base/ssl_config_service.h
parentc4063b8d54260a20e8a25daa58ddeb0abbb692d7 (diff)
downloadchromium_src-ac3b2592ae2fa2ec77e4ac82f644220499dd13e9.zip
chromium_src-ac3b2592ae2fa2ec77e4ac82f644220499dd13e9.tar.gz
chromium_src-ac3b2592ae2fa2ec77e4ac82f644220499dd13e9.tar.bz2
Address post-review comments on r56727.
BUG=none TEST=none http://codereview.chromium.org/3107030 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57059 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/ssl_config_service.h')
-rw-r--r--net/base/ssl_config_service.h23
1 files changed, 11 insertions, 12 deletions
diff --git a/net/base/ssl_config_service.h b/net/base/ssl_config_service.h
index 748d8e4..bcfb2f9 100644
--- a/net/base/ssl_config_service.h
+++ b/net/base/ssl_config_service.h
@@ -33,13 +33,12 @@ struct SSLConfig {
// needs to clear tls1_enabled).
bool dnssec_enabled; // True if we'll accept DNSSEC chains in certificates.
- // True if we believe that this connection might be MITM attacked. This
- // sounds a little worse than it is: large networks sometimes MITM attack all
- // SSL connections on egress. We want to know this because we might not have
- // the end-to-end connection that we believe that we have based on the
- // hostname. Therefore, certain certificate checks can't be performed and we
- // can't use outside knowledge about whether the server has the renegotiation
- // extension.
+ // True if we allow this connection to be MITM attacked. This sounds a little
+ // worse than it is: large networks sometimes MITM attack all SSL connections
+ // on egress. We want to know this because we might not have the end-to-end
+ // connection that we believe that we have based on the hostname. Therefore,
+ // certain certificate checks can't be performed and we can't use outside
+ // knowledge about whether the server has the renegotiation extension.
bool mitm_proxies_allowed;
bool false_start_enabled; // True if we'll use TLS False Start.
@@ -118,8 +117,8 @@ class SSLConfigService : public base::RefCountedThreadSafe<SSLConfigService> {
static void EnableDNSSEC();
static bool dnssec_enabled();
- // Enables the |may_be_manipulated| flag in SSLConfig objects. See the
- // comment about this flag in |SSLConfig|.
+ // Sets a global flag which allows SSL connections to be MITM attacked. See
+ // the comment about this flag in |SSLConfig|.
static void AllowMITMProxies();
static bool mitm_proxies_allowed();
@@ -129,12 +128,12 @@ class SSLConfigService : public base::RefCountedThreadSafe<SSLConfigService> {
static bool false_start_enabled();
protected:
- // SetFlags sets the values of several flags based on global configuration.
- static void SetSSLConfigFlags(SSLConfig*);
-
friend class base::RefCountedThreadSafe<SSLConfigService>;
virtual ~SSLConfigService() {}
+
+ // SetFlags sets the values of several flags based on global configuration.
+ static void SetSSLConfigFlags(SSLConfig*);
};
} // namespace net