summaryrefslogtreecommitdiffstats
path: root/net/base
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-02-08 16:11:12 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-02-08 16:11:12 +0000
commit80593d0596727885942d682da20ad18ae1de2390 (patch)
tree7d44fcc387d853f761ccbf74e37056aac401166f /net/base
parent3fac47c96ac4d3046e0ce4b58eafecffb5b65f08 (diff)
downloadchromium_src-80593d0596727885942d682da20ad18ae1de2390.zip
chromium_src-80593d0596727885942d682da20ad18ae1de2390.tar.gz
chromium_src-80593d0596727885942d682da20ad18ae1de2390.tar.bz2
Remove last traces of DNS certificate provenance checking.
BUG=none TEST=compiles https://chromiumcodereview.appspot.com/9353018/ git-svn-id: svn://svn.chromium.org/chrome/trunk/src@120985 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base')
-rw-r--r--net/base/ssl_config_service.cc22
-rw-r--r--net/base/ssl_config_service.h6
2 files changed, 6 insertions, 22 deletions
diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc
index 7928a50..1d07f07 100644
--- a/net/base/ssl_config_service.cc
+++ b/net/base/ssl_config_service.cc
@@ -18,12 +18,15 @@ SSLConfig::CertAndStatus::CertAndStatus() : cert_status(0) {}
SSLConfig::CertAndStatus::~CertAndStatus() {}
SSLConfig::SSLConfig()
- : rev_checking_enabled(true), ssl3_enabled(true),
+ : rev_checking_enabled(true),
+ ssl3_enabled(true),
tls1_enabled(true),
- dns_cert_provenance_checking_enabled(false), cached_info_enabled(false),
+ cached_info_enabled(false),
origin_bound_certs_enabled(false),
false_start_enabled(true),
- send_client_cert(false), verify_ev_cert(false), ssl3_fallback(false) {
+ send_client_cert(false),
+ verify_ev_cert(false),
+ ssl3_fallback(false) {
}
SSLConfig::~SSLConfig() {
@@ -60,7 +63,6 @@ bool SSLConfigService::IsKnownFalseStartIncompatibleServer(
}
static bool g_cached_info_enabled = false;
-static bool g_dns_cert_provenance_checking = false;
// GlobalCRLSet holds a reference to the global CRLSet. It simply wraps a lock
// around a scoped_refptr so that getting a reference doesn't race with
@@ -85,16 +87,6 @@ class GlobalCRLSet {
base::LazyInstance<GlobalCRLSet>::Leaky g_crl_set = LAZY_INSTANCE_INITIALIZER;
// static
-void SSLConfigService::EnableDNSCertProvenanceChecking() {
- g_dns_cert_provenance_checking = true;
-}
-
-// static
-bool SSLConfigService::dns_cert_provenance_checking_enabled() {
- return g_dns_cert_provenance_checking;
-}
-
-// static
void SSLConfigService::SetCRLSet(scoped_refptr<CRLSet> crl_set) {
// Note: this can be called concurently with GetCRLSet().
g_crl_set.Get().Set(crl_set);
@@ -127,8 +119,6 @@ SSLConfigService::~SSLConfigService() {
// static
void SSLConfigService::SetSSLConfigFlags(SSLConfig* ssl_config) {
- ssl_config->dns_cert_provenance_checking_enabled =
- g_dns_cert_provenance_checking;
ssl_config->cached_info_enabled = g_cached_info_enabled;
}
diff --git a/net/base/ssl_config_service.h b/net/base/ssl_config_service.h
index e897db2..4255470 100644
--- a/net/base/ssl_config_service.h
+++ b/net/base/ssl_config_service.h
@@ -41,8 +41,6 @@ struct NET_EXPORT SSLConfig {
// SSL 2.0 is not supported.
bool ssl3_enabled; // True if SSL 3.0 is enabled.
bool tls1_enabled; // True if TLS 1.0 is enabled.
- // True if we'll do async checks for certificate provenance using DNS.
- bool dns_cert_provenance_checking_enabled;
// Presorted list of cipher suites which should be explicitly prevented from
// being used in addition to those disabled by the net built-in policy.
@@ -139,10 +137,6 @@ class NET_EXPORT SSLConfigService
// False Start.
static bool IsKnownFalseStartIncompatibleServer(const std::string& hostname);
- // Enables DNS side checks for certificates.
- static void EnableDNSCertProvenanceChecking();
- static bool dns_cert_provenance_checking_enabled();
-
// Sets and gets the current, global CRL set.
static void SetCRLSet(scoped_refptr<CRLSet> crl_set);
static scoped_refptr<CRLSet> GetCRLSet();