| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index 00ccb3f90585b94068516f96b63448acb02bc683..0fc5d9eb048305fe5c74286aec780f4f66eadec9 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -2077,25 +2077,7 @@ int SSLClientSocketOpenSSL::NewSessionCallback(SSL_SESSION* session) {
|
| }
|
|
|
| void SSLClientSocketOpenSSL::AddSCTInfoToSSLInfo(SSLInfo* ssl_info) const {
|
| - for (ct::SCTList::const_iterator iter =
|
| - ct_verify_result_.verified_scts.begin();
|
| - iter != ct_verify_result_.verified_scts.end(); ++iter) {
|
| - ssl_info->signed_certificate_timestamps.push_back(
|
| - SignedCertificateTimestampAndStatus(*iter, ct::SCT_STATUS_OK));
|
| - }
|
| - for (ct::SCTList::const_iterator iter =
|
| - ct_verify_result_.invalid_scts.begin();
|
| - iter != ct_verify_result_.invalid_scts.end(); ++iter) {
|
| - ssl_info->signed_certificate_timestamps.push_back(
|
| - SignedCertificateTimestampAndStatus(*iter, ct::SCT_STATUS_INVALID));
|
| - }
|
| - for (ct::SCTList::const_iterator iter =
|
| - ct_verify_result_.unknown_logs_scts.begin();
|
| - iter != ct_verify_result_.unknown_logs_scts.end(); ++iter) {
|
| - ssl_info->signed_certificate_timestamps.push_back(
|
| - SignedCertificateTimestampAndStatus(*iter,
|
| - ct::SCT_STATUS_LOG_UNKNOWN));
|
| - }
|
| + ssl_info->UpdateSignedCertificateTimestamps(ct_verify_result_);
|
| }
|
|
|
| std::string SSLClientSocketOpenSSL::GetSessionCacheKey() const {
|
|
|