diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-01-24 13:52:37 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-01-24 13:52:37 +0000 |
commit | ebb9c3367f66a00799131f42baff75dce6e23530 (patch) | |
tree | 86b72efeb13ecd644cd0f505e7364c7def38d968 /net/socket | |
parent | 25f4fbfeb8be8aeb07f39e542f40028908b63a5d (diff) | |
download | chromium_src-ebb9c3367f66a00799131f42baff75dce6e23530.zip chromium_src-ebb9c3367f66a00799131f42baff75dce6e23530.tar.gz chromium_src-ebb9c3367f66a00799131f42baff75dce6e23530.tar.bz2 |
net: add a policy option: DisableSSLRecordSplitting
Microsoft are providing a similar policy option and it looks like some
groups
may need it while their proxies are updated.
It's rather unfortunate that the underlying SSLConfigService member is
called
enable_false_start, but I don't want to conflate a clean up of that with
this
CL.
BUG=107728
TEST=none
http://codereview.chromium.org/9131012
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@118833 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket')
-rw-r--r-- | net/socket/ssl_client_socket_nss.cc | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc index 50b7514..7989cdb 100644 --- a/net/socket/ssl_client_socket_nss.cc +++ b/net/socket/ssl_client_socket_nss.cc @@ -915,6 +915,7 @@ int SSLClientSocketNSS::InitializeSSLOptions() { #endif #ifdef SSL_ENABLE_FALSE_START + LOG(ERROR) << "FALSE START " << ssl_config_.false_start_enabled; rv = SSL_OptionSet( nss_fd_, SSL_ENABLE_FALSE_START, ssl_config_.false_start_enabled && |