Index: net/socket/ssl_client_socket_mac.cc |
diff --git a/net/socket/ssl_client_socket_mac.cc b/net/socket/ssl_client_socket_mac.cc |
index 6a2f821ff3c94fd5ec5feb44ca4a018a262fbe53..926abcb9dfab221da5c62bc3ff0608e89cdddc0f 100644 |
--- a/net/socket/ssl_client_socket_mac.cc |
+++ b/net/socket/ssl_client_socket_mac.cc |
@@ -702,12 +702,12 @@ bool SSLClientSocketMac::SetSendBufferSize(int32 size) { |
void SSLClientSocketMac::GetSSLInfo(SSLInfo* ssl_info) { |
ssl_info->Reset(); |
- if (!server_cert_) { |
wtc
2011/07/26 00:16:35
Does this mean we can set server_cert_ to NULL as
Ryan Sleevi
2011/07/26 00:44:15
Not without further updates. The SSLClientSocket*
wtc
2011/07/26 01:37:54
Those two bugs should be marked WontFix. I rememb
Ryan Sleevi
2011/07/26 01:57:17
I agree that we shouldn't emulate the server cert
|
+ if (!server_cert_verify_result_.verified_cert) { |
NOTREACHED(); |
return; |
} |
- ssl_info->cert = server_cert_; |
+ ssl_info->cert = server_cert_verify_result_.verified_cert; |
ssl_info->cert_status = server_cert_verify_result_.cert_status; |
ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes; |
ssl_info->is_issued_by_known_root = |