Index: net/socket/ssl_client_socket_nss.cc |
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc |
index bb923431f94a9c8d463302ac29f0ed035617a729..6165b154ebb0dcba2baccd02724169c5a07dff81 100644 |
--- a/net/socket/ssl_client_socket_nss.cc |
+++ b/net/socket/ssl_client_socket_nss.cc |
@@ -96,7 +96,6 @@ |
#include "net/cert/ct_verify_result.h" |
#include "net/cert/scoped_nss_types.h" |
#include "net/cert/sct_status_flags.h" |
-#include "net/cert/single_request_cert_verifier.h" |
#include "net/cert/x509_certificate_net_log_param.h" |
#include "net/cert/x509_util.h" |
#include "net/cert_net/nss_ocsp.h" |
@@ -2563,7 +2562,7 @@ void SSLClientSocketNSS::Disconnect() { |
// Shut down anything that may call us back. |
core_->Detach(); |
- verifier_.reset(); |
+ cert_verifier_request_.reset(); |
transport_->socket()->Disconnect(); |
// Reset object state. |
@@ -3041,20 +3040,19 @@ int SSLClientSocketNSS::DoVerifyCert(int result) { |
flags |= CertVerifier::VERIFY_CERT_IO_ENABLED; |
if (ssl_config_.rev_checking_required_local_anchors) |
flags |= CertVerifier::VERIFY_REV_CHECKING_REQUIRED_LOCAL_ANCHORS; |
- verifier_.reset(new SingleRequestCertVerifier(cert_verifier_)); |
- return verifier_->Verify( |
+ return cert_verifier_->Verify( |
core_->state().server_cert.get(), host_and_port_.host(), |
core_->state().stapled_ocsp_response, flags, |
SSLConfigService::GetCRLSet().get(), &server_cert_verify_result_, |
base::Bind(&SSLClientSocketNSS::OnHandshakeIOComplete, |
base::Unretained(this)), |
- net_log_); |
+ &cert_verifier_request_, net_log_); |
} |
// Derived from AuthCertificateCallback() in |
// mozilla/source/security/manager/ssl/src/nsNSSCallbacks.cpp. |
int SSLClientSocketNSS::DoVerifyCertComplete(int result) { |
- verifier_.reset(); |
+ cert_verifier_request_.reset(); |
if (!start_cert_verification_time_.is_null()) { |
base::TimeDelta verify_time = |