summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc3
-rw-r--r--net/base/transport_security_state.cc10
-rw-r--r--net/base/transport_security_state.h10
-rw-r--r--net/url_request/url_request_http_job.cc3
4 files changed, 2 insertions, 24 deletions
diff --git a/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc b/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc
index ab72c1b..b7426c4 100644
--- a/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc
+++ b/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc
@@ -330,8 +330,7 @@ void ChromeResourceDispatcherHostDelegate::OnResponseStarted(
bool has_sni = net::SSLConfigService::IsSNIAvailable(
context->ssl_config_service());
if (state->GetDomainState(
- &domain_state, request->url().host(), has_sni) &&
- domain_state.ShouldMixedScriptingBeBlocked()) {
+ &domain_state, request->url().host(), has_sni)) {
filter->Send(new ChromeViewMsg_AddStrictSecurityHost(
info->route_id(), request->url().host()));
}
diff --git a/net/base/transport_security_state.cc b/net/base/transport_security_state.cc
index dc72239..23ecd98 100644
--- a/net/base/transport_security_state.cc
+++ b/net/base/transport_security_state.cc
@@ -1389,19 +1389,9 @@ bool TransportSecurityState::DomainState::IsChainOfPublicKeysPermitted(
return false;
}
-bool TransportSecurityState::DomainState::ShouldCertificateErrorsBeFatal()
- const {
- return true;
-}
-
bool TransportSecurityState::DomainState::ShouldRedirectHTTPToHTTPS()
const {
return mode == MODE_STRICT;
}
-bool TransportSecurityState::DomainState::ShouldMixedScriptingBeBlocked()
- const {
- return true;
-}
-
} // namespace
diff --git a/net/base/transport_security_state.h b/net/base/transport_security_state.h
index 01c095b..7ff4a2f 100644
--- a/net/base/transport_security_state.h
+++ b/net/base/transport_security_state.h
@@ -76,20 +76,10 @@ class NET_EXPORT TransportSecurityState
bool IsChainOfPublicKeysPermitted(
const std::vector<SHA1Fingerprint>& hashes);
- // ShouldCertificateErrorsBeFatal returns true iff, given the |mode| of this
- // DomainState, certificate errors on this domain should be fatal (i.e. no
- // user bypass).
- bool ShouldCertificateErrorsBeFatal() const;
-
// ShouldRedirectHTTPToHTTPS returns true iff, given the |mode| of this
// DomainState, HTTP requests should be internally redirected to HTTPS.
bool ShouldRedirectHTTPToHTTPS() const;
- // ShouldMixedScriptingBeBlocked returns true iff, given the |mode| of this
- // DomainState, mixed scripting (the loading of Javascript, CSS or plugins
- // over HTTP for an HTTPS page) should be blocked.
- bool ShouldMixedScriptingBeBlocked() const;
-
Mode mode;
base::Time created; // when this host entry was first created
base::Time expiry; // the absolute time (UTC) when this record expires
diff --git a/net/url_request/url_request_http_job.cc b/net/url_request/url_request_http_job.cc
index de9a044..5b6b986f 100644
--- a/net/url_request/url_request_http_job.cc
+++ b/net/url_request/url_request_http_job.cc
@@ -701,8 +701,7 @@ void URLRequestHttpJob::OnStartCompleted(int result) {
context_->transport_security_state() &&
context_->transport_security_state()->GetDomainState(
&domain_state, request_info_.url.host(),
- SSLConfigService::IsSNIAvailable(context_->ssl_config_service())) &&
- domain_state.ShouldCertificateErrorsBeFatal();
+ SSLConfigService::IsSNIAvailable(context_->ssl_config_service()));
NotifySSLCertificateError(transaction_->GetResponseInfo()->ssl_info,
is_hsts_host);
} else if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) {