diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-12-11 21:04:42 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-12-11 21:04:42 +0000 |
commit | 326e67907033c1e8db115327d59482b1ae6db3ec (patch) | |
tree | 2940d88e6de6ce6ba528c4671b6574b4ff6bd1bd /chrome/browser/profile.cc | |
parent | 5973945e4c3d2baf2b92d11be55c1692a09b12e3 (diff) | |
download | chromium_src-326e67907033c1e8db115327d59482b1ae6db3ec.zip chromium_src-326e67907033c1e8db115327d59482b1ae6db3ec.tar.gz chromium_src-326e67907033c1e8db115327d59482b1ae6db3ec.tar.bz2 |
SPDY: augment Strict Transport Security with the beginnings of SPDY upgrade.
This adds an opportunistic flag to the information that we store in
the Strict Transport Security State. Given this, STSS might be
misnamed now, but renaming it in this patch would add huge amounts of
noise.
We process the 'X-Bodge-Transport-Security' header which has the same
format as the STS header. When we see this on an HTTP connection,
we'll probe for a clean HTTPS path to the host and then remember it.
This header should be considered mutually exclusive with STS, although
this isn't enforced in the code.
The remembered flag is currently ignored by the rest of the code. This
will be addressed in a future patch.
The header should be called 'Opportunistic-Transport-Security' in the
future, but we have some issues to work out before we take that name.
http://codereview.chromium.org/456011
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@34380 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/profile.cc')
-rw-r--r-- | chrome/browser/profile.cc | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/chrome/browser/profile.cc b/chrome/browser/profile.cc index fa245e0..3f5deee 100644 --- a/chrome/browser/profile.cc +++ b/chrome/browser/profile.cc @@ -27,7 +27,7 @@ #include "chrome/browser/extensions/user_script_master.h" #include "chrome/browser/favicon_service.h" #include "chrome/browser/spellcheck_host.h" -#include "chrome/browser/strict_transport_security_persister.h" +#include "chrome/browser/transport_security_persister.h" #include "chrome/browser/history/history.h" #include "chrome/browser/host_zoom_map.h" #include "chrome/browser/in_process_webkit/webkit_context.h" @@ -59,7 +59,7 @@ #include "chrome/common/pref_names.h" #include "chrome/common/render_messages.h" #include "grit/locale_settings.h" -#include "net/base/strict_transport_security_state.h" +#include "net/base/transport_security_state.h" #include "webkit/database/database_tracker.h" #if defined(OS_LINUX) @@ -273,13 +273,13 @@ class OffTheRecordProfileImpl : public Profile, return ssl_host_state_.get(); } - virtual net::StrictTransportSecurityState* GetStrictTransportSecurityState() { - if (!strict_transport_security_state_.get()) { - strict_transport_security_state_ = - new net::StrictTransportSecurityState(); + virtual net::TransportSecurityState* GetTransportSecurityState() { + if (!transport_security_state_.get()) { + transport_security_state_ = + new net::TransportSecurityState(); } - return strict_transport_security_state_.get(); + return transport_security_state_.get(); } virtual HistoryService* GetHistoryService(ServiceAccessType sat) { @@ -551,9 +551,9 @@ class OffTheRecordProfileImpl : public Profile, // the user visited while OTR. scoped_ptr<SSLHostState> ssl_host_state_; - // The StrictTransportSecurityState that only stores enabled sites in memory. - scoped_refptr<net::StrictTransportSecurityState> - strict_transport_security_state_; + // The TransportSecurityState that only stores enabled sites in memory. + scoped_refptr<net::TransportSecurityState> + transport_security_state_; // Time we were started. Time start_time_; @@ -855,17 +855,17 @@ SSLHostState* ProfileImpl::GetSSLHostState() { return ssl_host_state_.get(); } -net::StrictTransportSecurityState* - ProfileImpl::GetStrictTransportSecurityState() { - if (!strict_transport_security_state_.get()) { - strict_transport_security_state_ = new net::StrictTransportSecurityState(); - strict_transport_security_persister_ = - new StrictTransportSecurityPersister(); - strict_transport_security_persister_->Initialize( - strict_transport_security_state_.get(), path_); +net::TransportSecurityState* + ProfileImpl::GetTransportSecurityState() { + if (!transport_security_state_.get()) { + transport_security_state_ = new net::TransportSecurityState(); + transport_security_persister_ = + new TransportSecurityPersister(); + transport_security_persister_->Initialize( + transport_security_state_.get(), path_); } - return strict_transport_security_state_.get(); + return transport_security_state_.get(); } PrefService* ProfileImpl::GetPrefs() { |