Index: net/http/transport_security_persister.cc |
diff --git a/net/http/transport_security_persister.cc b/net/http/transport_security_persister.cc |
index 04de296c82f002b85c00c0b96e8aee99f850ea7b..7310b590f7e2d100b10a7678731f733ed1315e6c 100644 |
--- a/net/http/transport_security_persister.cc |
+++ b/net/http/transport_security_persister.cc |
@@ -146,16 +146,18 @@ bool TransportSecurityPersister::SerializeData(std::string* output) { |
base::DictionaryValue* serialized = new base::DictionaryValue; |
serialized->SetBoolean(kStsIncludeSubdomains, |
- domain_state.sts_include_subdomains); |
+ domain_state.sts.include_subdomains); |
serialized->SetBoolean(kPkpIncludeSubdomains, |
- domain_state.pkp_include_subdomains); |
- serialized->SetDouble(kStsObserved, domain_state.sts_observed.ToDoubleT()); |
- serialized->SetDouble(kPkpObserved, domain_state.pkp_observed.ToDoubleT()); |
- serialized->SetDouble(kExpiry, domain_state.upgrade_expiry.ToDoubleT()); |
+ domain_state.pkp.include_subdomains); |
+ serialized->SetDouble(kStsObserved, |
+ domain_state.sts.last_observed.ToDoubleT()); |
+ serialized->SetDouble(kPkpObserved, |
+ domain_state.pkp.last_observed.ToDoubleT()); |
+ serialized->SetDouble(kExpiry, domain_state.sts.expiry.ToDoubleT()); |
serialized->SetDouble(kDynamicSPKIHashesExpiry, |
- domain_state.dynamic_spki_hashes_expiry.ToDoubleT()); |
+ domain_state.pkp.expiry.ToDoubleT()); |
- switch (domain_state.upgrade_mode) { |
+ switch (domain_state.sts.upgrade_mode) { |
case TransportSecurityState::DomainState::MODE_FORCE_HTTPS: |
serialized->SetString(kMode, kForceHTTPS); |
break; |
@@ -168,9 +170,9 @@ bool TransportSecurityPersister::SerializeData(std::string* output) { |
continue; |
} |
- if (now < domain_state.dynamic_spki_hashes_expiry) { |
+ if (now < domain_state.pkp.expiry) { |
serialized->Set(kDynamicSPKIHashes, |
- SPKIHashesToListValue(domain_state.dynamic_spki_hashes)); |
+ SPKIHashesToListValue(domain_state.pkp.spki_hashes)); |
} |
toplevel.Set(HashedDomainToExternalString(hostname), serialized); |
@@ -221,14 +223,14 @@ bool TransportSecurityPersister::Deserialize(const std::string& serialized, |
bool include_subdomains = false; |
bool parsed_include_subdomains = parsed->GetBoolean(kIncludeSubdomains, |
&include_subdomains); |
- domain_state.sts_include_subdomains = include_subdomains; |
- domain_state.pkp_include_subdomains = include_subdomains; |
+ domain_state.sts.include_subdomains = include_subdomains; |
+ domain_state.pkp.include_subdomains = include_subdomains; |
if (parsed->GetBoolean(kStsIncludeSubdomains, &include_subdomains)) { |
- domain_state.sts_include_subdomains = include_subdomains; |
+ domain_state.sts.include_subdomains = include_subdomains; |
parsed_include_subdomains = true; |
} |
if (parsed->GetBoolean(kPkpIncludeSubdomains, &include_subdomains)) { |
- domain_state.pkp_include_subdomains = include_subdomains; |
+ domain_state.pkp.include_subdomains = include_subdomains; |
parsed_include_subdomains = true; |
} |
@@ -245,14 +247,15 @@ bool TransportSecurityPersister::Deserialize(const std::string& serialized, |
&dynamic_spki_hashes_expiry); |
const base::ListValue* pins_list = NULL; |
- if (parsed->GetList(kDynamicSPKIHashes, &pins_list)) |
- SPKIHashesFromListValue(*pins_list, &domain_state.dynamic_spki_hashes); |
+ if (parsed->GetList(kDynamicSPKIHashes, &pins_list)) { |
+ SPKIHashesFromListValue(*pins_list, &domain_state.pkp.spki_hashes); |
+ } |
if (mode_string == kForceHTTPS || mode_string == kStrict) { |
- domain_state.upgrade_mode = |
+ domain_state.sts.upgrade_mode = |
TransportSecurityState::DomainState::MODE_FORCE_HTTPS; |
} else if (mode_string == kDefault || mode_string == kPinningOnly) { |
- domain_state.upgrade_mode = |
+ domain_state.sts.upgrade_mode = |
TransportSecurityState::DomainState::MODE_DEFAULT; |
} else { |
LOG(WARNING) << "Unknown TransportSecurityState mode string " |
@@ -261,34 +264,34 @@ bool TransportSecurityPersister::Deserialize(const std::string& serialized, |
continue; |
} |
- domain_state.upgrade_expiry = base::Time::FromDoubleT(expiry); |
- domain_state.dynamic_spki_hashes_expiry = |
+ domain_state.sts.expiry = base::Time::FromDoubleT(expiry); |
+ domain_state.pkp.expiry = |
base::Time::FromDoubleT(dynamic_spki_hashes_expiry); |
double sts_observed; |
double pkp_observed; |
if (parsed->GetDouble(kStsObserved, &sts_observed)) { |
- domain_state.sts_observed = base::Time::FromDoubleT(sts_observed); |
+ domain_state.sts.last_observed = base::Time::FromDoubleT(sts_observed); |
} else if (parsed->GetDouble(kCreated, &sts_observed)) { |
// kCreated is a legacy synonym for both kStsObserved and kPkpObserved. |
- domain_state.sts_observed = base::Time::FromDoubleT(sts_observed); |
+ domain_state.sts.last_observed = base::Time::FromDoubleT(sts_observed); |
} else { |
// We're migrating an old entry with no observation date. Make sure we |
// write the new date back in a reasonable time frame. |
dirtied = true; |
- domain_state.sts_observed = base::Time::Now(); |
+ domain_state.sts.last_observed = base::Time::Now(); |
} |
if (parsed->GetDouble(kPkpObserved, &pkp_observed)) { |
- domain_state.pkp_observed = base::Time::FromDoubleT(pkp_observed); |
+ domain_state.pkp.last_observed = base::Time::FromDoubleT(pkp_observed); |
} else if (parsed->GetDouble(kCreated, &pkp_observed)) { |
- domain_state.pkp_observed = base::Time::FromDoubleT(pkp_observed); |
+ domain_state.pkp.last_observed = base::Time::FromDoubleT(pkp_observed); |
} else { |
dirtied = true; |
- domain_state.pkp_observed = base::Time::Now(); |
+ domain_state.pkp.last_observed = base::Time::Now(); |
} |
- if (domain_state.upgrade_expiry <= current_time && |
- domain_state.dynamic_spki_hashes_expiry <= current_time) { |
+ if (domain_state.sts.expiry <= current_time && |
+ domain_state.pkp.expiry <= current_time) { |
// Make sure we dirty the state if we drop an entry. |
dirtied = true; |
continue; |