| Index: net/socket/ssl_client_socket_nss.cc
|
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
|
| index bb923431f94a9c8d463302ac29f0ed035617a729..6165b154ebb0dcba2baccd02724169c5a07dff81 100644
|
| --- a/net/socket/ssl_client_socket_nss.cc
|
| +++ b/net/socket/ssl_client_socket_nss.cc
|
| @@ -96,7 +96,6 @@
|
| #include "net/cert/ct_verify_result.h"
|
| #include "net/cert/scoped_nss_types.h"
|
| #include "net/cert/sct_status_flags.h"
|
| -#include "net/cert/single_request_cert_verifier.h"
|
| #include "net/cert/x509_certificate_net_log_param.h"
|
| #include "net/cert/x509_util.h"
|
| #include "net/cert_net/nss_ocsp.h"
|
| @@ -2563,7 +2562,7 @@ void SSLClientSocketNSS::Disconnect() {
|
|
|
| // Shut down anything that may call us back.
|
| core_->Detach();
|
| - verifier_.reset();
|
| + cert_verifier_request_.reset();
|
| transport_->socket()->Disconnect();
|
|
|
| // Reset object state.
|
| @@ -3041,20 +3040,19 @@ int SSLClientSocketNSS::DoVerifyCert(int result) {
|
| flags |= CertVerifier::VERIFY_CERT_IO_ENABLED;
|
| if (ssl_config_.rev_checking_required_local_anchors)
|
| flags |= CertVerifier::VERIFY_REV_CHECKING_REQUIRED_LOCAL_ANCHORS;
|
| - verifier_.reset(new SingleRequestCertVerifier(cert_verifier_));
|
| - return verifier_->Verify(
|
| + return cert_verifier_->Verify(
|
| core_->state().server_cert.get(), host_and_port_.host(),
|
| core_->state().stapled_ocsp_response, flags,
|
| SSLConfigService::GetCRLSet().get(), &server_cert_verify_result_,
|
| base::Bind(&SSLClientSocketNSS::OnHandshakeIOComplete,
|
| base::Unretained(this)),
|
| - net_log_);
|
| + &cert_verifier_request_, net_log_);
|
| }
|
|
|
| // Derived from AuthCertificateCallback() in
|
| // mozilla/source/security/manager/ssl/src/nsNSSCallbacks.cpp.
|
| int SSLClientSocketNSS::DoVerifyCertComplete(int result) {
|
| - verifier_.reset();
|
| + cert_verifier_request_.reset();
|
|
|
| if (!start_cert_verification_time_.is_null()) {
|
| base::TimeDelta verify_time =
|
|
|