Index: chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc |
diff --git a/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc b/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc |
index 266d8e1b9ed2def0d49ea851cea7b0bc2193f9df..4d9972e394b300a4c3cba12e315887e9fe6462c8 100644 |
--- a/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc |
+++ b/chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.cc |
@@ -560,18 +560,9 @@ void ChromeResourceDispatcherHostDelegate::OnResponseStarted( |
const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request); |
if (request->url().SchemeIsSecure()) { |
- const net::URLRequestContext* context = request->context(); |
- net::TransportSecurityState* state = context->transport_security_state(); |
- if (state) { |
- net::TransportSecurityState::DomainState domain_state; |
- bool has_sni = net::SSLConfigService::IsSNIAvailable( |
- context->ssl_config_service()); |
- if (state->GetDomainState(request->url().host(), has_sni, |
- &domain_state) && |
- domain_state.ShouldUpgradeToSSL()) { |
+ if (request->GetHSTSRedirect(NULL)) { |
sender->Send(new ChromeViewMsg_AddStrictSecurityHost( |
info->GetRouteID(), request->url().host())); |
- } |
} |
} |