| Index: chrome/browser/ui/webui/net_internals/net_internals_ui.cc
|
| diff --git a/chrome/browser/ui/webui/net_internals/net_internals_ui.cc b/chrome/browser/ui/webui/net_internals/net_internals_ui.cc
|
| index d0379094849eed40c00c3bdea8c8892504d1e5ca..93022ab164d1b9c95e7c114f2f03fbf74bf6b42c 100644
|
| --- a/chrome/browser/ui/webui/net_internals/net_internals_ui.cc
|
| +++ b/chrome/browser/ui/webui/net_internals/net_internals_ui.cc
|
| @@ -818,6 +818,8 @@ void NetInternalsMessageHandler::IOThreadImpl::OnHSTSQuery(
|
| static_state.pkp.expiry.ToDoubleT());
|
| result->SetString("static_spki_hashes",
|
| HashesToBase64String(static_state.pkp.spki_hashes));
|
| + result->SetString("static_sts_domain", static_state.sts.domain);
|
| + result->SetString("static_pkp_domain", static_state.pkp.domain);
|
| }
|
|
|
| net::TransportSecurityState::DomainState dynamic_state;
|
| @@ -841,16 +843,11 @@ void NetInternalsMessageHandler::IOThreadImpl::OnHSTSQuery(
|
| dynamic_state.pkp.expiry.ToDoubleT());
|
| result->SetString("dynamic_spki_hashes",
|
| HashesToBase64String(dynamic_state.pkp.spki_hashes));
|
| + result->SetString("dynamic_sts_domain", dynamic_state.sts.domain);
|
| + result->SetString("dynamic_pkp_domain", dynamic_state.pkp.domain);
|
| }
|
|
|
| result->SetBoolean("result", found_static || found_dynamic);
|
| - if (found_static) {
|
| - result->SetString("domain", static_state.domain);
|
| - } else if (found_dynamic) {
|
| - result->SetString("domain", dynamic_state.domain);
|
| - } else {
|
| - result->SetString("domain", domain);
|
| - }
|
| }
|
| }
|
|
|
|
|