summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-12-03 02:02:22 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-12-03 02:02:22 +0000
commit4554e58c8fbd99bc72eadf53ba73bdd1a9df3c3e (patch)
treebf36fac938ac40db4bcc7335b450fc55d04a690d /net
parent4ad5d77d96dfc6f08a845b6871ecbffa64d6f6e2 (diff)
downloadchromium_src-4554e58c8fbd99bc72eadf53ba73bdd1a9df3c3e.zip
chromium_src-4554e58c8fbd99bc72eadf53ba73bdd1a9df3c3e.tar.gz
chromium_src-4554e58c8fbd99bc72eadf53ba73bdd1a9df3c3e.tar.bz2
Add a preference for enabling the TLS origin-bound certificates extension.
The preference is controlled by the command line and enterprise policy. R=mattm@chromium.org,mnissler@chromium.org BUG=106077 TEST=Existing policy unit tests are updated. Review URL: http://codereview.chromium.org/8772014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@112848 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r--net/base/ssl_config_service.cc16
-rw-r--r--net/base/ssl_config_service.h4
2 files changed, 3 insertions, 17 deletions
diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc
index 7f9de16..6319407 100644
--- a/net/base/ssl_config_service.cc
+++ b/net/base/ssl_config_service.cc
@@ -59,7 +59,6 @@ bool SSLConfigService::IsKnownFalseStartIncompatibleServer(
}
static bool g_cached_info_enabled = false;
-static bool g_origin_bound_certs_enabled = false;
static bool g_false_start_enabled = true;
static bool g_dns_cert_provenance_checking = false;
base::LazyInstance<scoped_refptr<CRLSet>,
@@ -105,16 +104,6 @@ bool SSLConfigService::cached_info_enabled() {
return g_cached_info_enabled;
}
-// static
-void SSLConfigService::EnableOriginBoundCerts() {
- g_origin_bound_certs_enabled = true;
-}
-
-// static
-bool SSLConfigService::origin_bound_certs_enabled() {
- return g_origin_bound_certs_enabled;
-}
-
void SSLConfigService::AddObserver(Observer* observer) {
observer_list_.AddObserver(observer);
}
@@ -132,7 +121,6 @@ void SSLConfigService::SetSSLConfigFlags(SSLConfig* ssl_config) {
ssl_config->dns_cert_provenance_checking_enabled =
g_dns_cert_provenance_checking;
ssl_config->cached_info_enabled = g_cached_info_enabled;
- ssl_config->origin_bound_certs_enabled = g_origin_bound_certs_enabled;
}
void SSLConfigService::ProcessConfigUpdate(const SSLConfig& orig_config,
@@ -142,7 +130,9 @@ void SSLConfigService::ProcessConfigUpdate(const SSLConfig& orig_config,
(orig_config.ssl3_enabled != new_config.ssl3_enabled) ||
(orig_config.tls1_enabled != new_config.tls1_enabled) ||
(orig_config.disabled_cipher_suites !=
- new_config.disabled_cipher_suites);
+ new_config.disabled_cipher_suites) ||
+ (orig_config.origin_bound_certs_enabled !=
+ new_config.origin_bound_certs_enabled);
if (config_changed)
FOR_EACH_OBSERVER(Observer, observer_list_, OnSSLConfigChanged());
diff --git a/net/base/ssl_config_service.h b/net/base/ssl_config_service.h
index cb317c7..02b74ad 100644
--- a/net/base/ssl_config_service.h
+++ b/net/base/ssl_config_service.h
@@ -159,10 +159,6 @@ class NET_EXPORT SSLConfigService
static void EnableCachedInfo();
static bool cached_info_enabled();
- // Enables the TLS origin bound cert extension.
- static void EnableOriginBoundCerts();
- static bool origin_bound_certs_enabled();
-
// Is SNI available in this configuration?
static bool IsSNIAvailable(SSLConfigService* service);