| Index: net/socket/ssl_client_socket_nss.cc
|
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
|
| index 8fad0a021d91b1b554018f74ddbe78d99626f2c3..82932785a93570915973f10be30931655631fccc 100644
|
| --- a/net/socket/ssl_client_socket_nss.cc
|
| +++ b/net/socket/ssl_client_socket_nss.cc
|
| @@ -3151,25 +3151,7 @@ bool SSLClientSocketNSS::CalledOnValidThread() const {
|
| }
|
|
|
| void SSLClientSocketNSS::AddSCTInfoToSSLInfo(SSLInfo* ssl_info) const {
|
| - for (ct::SCTList::const_iterator iter =
|
| - ct_verify_result_.verified_scts.begin();
|
| - iter != ct_verify_result_.verified_scts.end(); ++iter) {
|
| - ssl_info->signed_certificate_timestamps.push_back(
|
| - SignedCertificateTimestampAndStatus(*iter, ct::SCT_STATUS_OK));
|
| - }
|
| - for (ct::SCTList::const_iterator iter =
|
| - ct_verify_result_.invalid_scts.begin();
|
| - iter != ct_verify_result_.invalid_scts.end(); ++iter) {
|
| - ssl_info->signed_certificate_timestamps.push_back(
|
| - SignedCertificateTimestampAndStatus(*iter, ct::SCT_STATUS_INVALID));
|
| - }
|
| - for (ct::SCTList::const_iterator iter =
|
| - ct_verify_result_.unknown_logs_scts.begin();
|
| - iter != ct_verify_result_.unknown_logs_scts.end(); ++iter) {
|
| - ssl_info->signed_certificate_timestamps.push_back(
|
| - SignedCertificateTimestampAndStatus(*iter,
|
| - ct::SCT_STATUS_LOG_UNKNOWN));
|
| - }
|
| + ssl_info->UpdateSignedCertificateTimestamps(ct_verify_result_);
|
| }
|
|
|
| // static
|
|
|