Index: trunk/src/net/url_request/url_request_http_job.cc |
=================================================================== |
--- trunk/src/net/url_request/url_request_http_job.cc (revision 224274) |
+++ trunk/src/net/url_request/url_request_http_job.cc (working copy) |
@@ -795,13 +795,6 @@ |
!security_state) |
return; |
- CookieOptions options; |
- options.set_include_httponly(); |
- options.set_server_time(response_date_); |
- // Don't persist HSTS if cookies are not saved to avoid tracking. |
- if ((request_info_.load_flags & LOAD_DO_NOT_SAVE_COOKIES) || |
- !CanSetCookie("", &options)) |
- return; |
// http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec: |
// |
// If a UA receives more than one STS header field in a HTTP response |
@@ -825,14 +818,6 @@ |
!security_state) |
return; |
- CookieOptions options; |
- options.set_include_httponly(); |
- options.set_server_time(response_date_); |
- // Don't persist HPKP if cookies are not saved to avoid tracking. |
- if ((request_info_.load_flags & LOAD_DO_NOT_SAVE_COOKIES) || |
- !CanSetCookie("", &options)) |
- return; |
- |
// http://tools.ietf.org/html/draft-ietf-websec-key-pinning: |
// |
// If a UA receives more than one PKP header field in an HTTP |
@@ -909,16 +894,11 @@ |
// what we should do. |
TransportSecurityState::DomainState domain_state; |
- bool allow_dynamic_state = |
- !(request_info_.load_flags & LOAD_DO_NOT_SEND_COOKIES) && |
- CanGetCookies(CookieList()); |
const URLRequestContext* context = request_->context(); |
- const bool fatal = |
- context->transport_security_state() && |
+ const bool fatal = context->transport_security_state() && |
context->transport_security_state()->GetDomainState( |
request_info_.url.host(), |
SSLConfigService::IsSNIAvailable(context->ssl_config_service()), |
- allow_dynamic_state, |
&domain_state) && |
domain_state.ShouldSSLErrorsBeFatal(); |
NotifySSLCertificateError(transaction_->GetResponseInfo()->ssl_info, fatal); |