summaryrefslogtreecommitdiff
path: root/chromium/net/http/http_response_info.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/http/http_response_info.cc')
-rw-r--r--chromium/net/http/http_response_info.cc39
1 files changed, 34 insertions, 5 deletions
diff --git a/chromium/net/http/http_response_info.cc b/chromium/net/http/http_response_info.cc
index 0b57a4e774b..4f9e014cfb2 100644
--- a/chromium/net/http/http_response_info.cc
+++ b/chromium/net/http/http_response_info.cc
@@ -10,6 +10,7 @@
#include "net/base/auth.h"
#include "net/base/io_buffer.h"
#include "net/base/net_errors.h"
+#include "net/cert/signed_certificate_timestamp.h"
#include "net/cert/x509_certificate.h"
#include "net/http/http_response_headers.h"
#include "net/ssl/ssl_cert_request_info.h"
@@ -87,6 +88,9 @@ enum {
// This bit is set if the request has http authentication.
RESPONSE_INFO_USE_HTTP_AUTHENTICATION = 1 << 19,
+ // This bit is set if ssl_info has SCTs.
+ RESPONSE_INFO_HAS_SIGNED_CERTIFICATE_TIMESTAMPS = 1 << 20,
+
// TODO(darin): Add other bits to indicate alternate request methods.
// For now, we don't support storing those.
};
@@ -207,6 +211,22 @@ bool HttpResponseInfo::InitFromPickle(const Pickle& pickle,
ssl_info.connection_status = connection_status;
}
+ if (flags & RESPONSE_INFO_HAS_SIGNED_CERTIFICATE_TIMESTAMPS) {
+ int num_scts;
+ if (!pickle.ReadInt(&iter, &num_scts))
+ return false;
+ for (int i = 0; i < num_scts; ++i) {
+ scoped_refptr<ct::SignedCertificateTimestamp> sct(
+ ct::SignedCertificateTimestamp::CreateFromPickle(&iter));
+ uint16 status;
+ if (!sct.get() || !pickle.ReadUInt16(&iter, &status))
+ return false;
+ ssl_info.signed_certificate_timestamps.push_back(
+ SignedCertificateTimestampAndStatus(
+ sct, static_cast<ct::SCTVerifyStatus>(status)));
+ }
+ }
+
// Read vary-data
if (flags & RESPONSE_INFO_HAS_VARY_DATA) {
if (!vary_data.InitFromPickle(pickle, &iter))
@@ -286,6 +306,8 @@ void HttpResponseInfo::Persist(Pickle* pickle,
flags |= RESPONSE_INFO_HAS_CONNECTION_INFO;
if (did_use_http_auth)
flags |= RESPONSE_INFO_USE_HTTP_AUTHENTICATION;
+ if (!ssl_info.signed_certificate_timestamps.empty())
+ flags |= RESPONSE_INFO_HAS_SIGNED_CERTIFICATE_TIMESTAMPS;
pickle->WriteInt(flags);
pickle->WriteInt64(request_time.ToInternalValue());
@@ -313,6 +335,15 @@ void HttpResponseInfo::Persist(Pickle* pickle,
pickle->WriteInt(ssl_info.security_bits);
if (ssl_info.connection_status != 0)
pickle->WriteInt(ssl_info.connection_status);
+ if (!ssl_info.signed_certificate_timestamps.empty()) {
+ pickle->WriteInt(ssl_info.signed_certificate_timestamps.size());
+ for (SignedCertificateTimestampAndStatusList::const_iterator it =
+ ssl_info.signed_certificate_timestamps.begin(); it !=
+ ssl_info.signed_certificate_timestamps.end(); ++it) {
+ it->sct_->Persist(pickle);
+ pickle->WriteUInt16(it->status_);
+ }
+ }
}
if (vary_data.is_valid())
@@ -331,8 +362,8 @@ void HttpResponseInfo::Persist(Pickle* pickle,
HttpResponseInfo::ConnectionInfo HttpResponseInfo::ConnectionInfoFromNextProto(
NextProto next_proto) {
switch (next_proto) {
- case kProtoSPDY2:
- return CONNECTION_INFO_SPDY2;
+ case kProtoDeprecatedSPDY2:
+ return CONNECTION_INFO_DEPRECATED_SPDY2;
case kProtoSPDY3:
case kProtoSPDY31:
return CONNECTION_INFO_SPDY3;
@@ -345,8 +376,6 @@ HttpResponseInfo::ConnectionInfo HttpResponseInfo::ConnectionInfoFromNextProto(
case kProtoUnknown:
case kProtoHTTP11:
- case kProtoSPDY1:
- case kProtoSPDY21:
break;
}
@@ -362,7 +391,7 @@ std::string HttpResponseInfo::ConnectionInfoToString(
return "unknown";
case CONNECTION_INFO_HTTP1:
return "http/1";
- case CONNECTION_INFO_SPDY2:
+ case CONNECTION_INFO_DEPRECATED_SPDY2:
return "spdy/2";
case CONNECTION_INFO_SPDY3:
return "spdy/3";