Bug 1630038 - remove HPKP entirely r=kjacobs,bbeurdouche
This removes processing of HTTP Public Key Pinning headers, remotely modifying pinning information, and using cached pinning information, all of which was already disabled in bug 1412438. Static pins that ship with the browser are still enforced. Differential Revision: https://phabricator.services.mozilla.com/D73352
This commit is contained in:
@@ -3479,7 +3479,7 @@ nsDocShell::DisplayLoadError(nsresult aError, nsIURI* aURI,
|
||||
|
||||
// If this is an HTTP Strict Transport Security host or a pinned host
|
||||
// and the certificate is bad, don't allow overrides (RFC 6797 section
|
||||
// 12.1, HPKP draft spec section 2.6).
|
||||
// 12.1).
|
||||
uint32_t flags =
|
||||
UsePrivateBrowsing() ? nsISocketProvider::NO_PERMANENT_STORAGE : 0;
|
||||
bool isStsHost = false;
|
||||
@@ -3492,8 +3492,8 @@ nsDocShell::DisplayLoadError(nsresult aError, nsIURI* aURI,
|
||||
GetOriginAttributes(), nullptr, nullptr,
|
||||
&isStsHost);
|
||||
NS_ENSURE_SUCCESS(rv, rv);
|
||||
rv = sss->IsSecureURI(nsISiteSecurityService::HEADER_HPKP, aURI, flags,
|
||||
GetOriginAttributes(), nullptr, nullptr,
|
||||
rv = sss->IsSecureURI(nsISiteSecurityService::STATIC_PINNING, aURI,
|
||||
flags, GetOriginAttributes(), nullptr, nullptr,
|
||||
&isPinnedHost);
|
||||
NS_ENSURE_SUCCESS(rv, rv);
|
||||
} else {
|
||||
@@ -3501,7 +3501,7 @@ nsDocShell::DisplayLoadError(nsresult aError, nsIURI* aURI,
|
||||
mozilla::dom::ContentChild::GetSingleton();
|
||||
cc->SendIsSecureURI(nsISiteSecurityService::HEADER_HSTS, aURI, flags,
|
||||
GetOriginAttributes(), &isStsHost);
|
||||
cc->SendIsSecureURI(nsISiteSecurityService::HEADER_HPKP, aURI, flags,
|
||||
cc->SendIsSecureURI(nsISiteSecurityService::STATIC_PINNING, aURI, flags,
|
||||
GetOriginAttributes(), &isPinnedHost);
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user