Index: ios/web/net/crw_cert_verification_controller.mm |
diff --git a/ios/web/net/crw_cert_verification_controller.mm b/ios/web/net/crw_cert_verification_controller.mm |
index 42d3738b71ba40f35d31e97b6da9bd770785dd66..8daf4b0ce25a372db439c58b822bac4953c7e0d2 100644 |
--- a/ios/web/net/crw_cert_verification_controller.mm |
+++ b/ios/web/net/crw_cert_verification_controller.mm |
@@ -18,7 +18,6 @@ |
#include "ios/web/public/web_thread.h" |
#import "ios/web/web_state/wk_web_view_security_util.h" |
#include "net/cert/cert_verify_result.h" |
-#include "net/ssl/ssl_config_service.h" |
#include "net/url_request/url_request_context.h" |
#include "net/url_request/url_request_context_getter.h" |
@@ -430,8 +429,9 @@ decideLoadPolicyForAcceptedTrustResult:(SecTrustResultType)trustResult |
web::CertVerifierBlockAdapter::Params params( |
blockCert.Pass(), base::SysNSStringToUTF8(host)); |
params.flags = self.certVerifyFlags; |
- params.crl_set = net::SSLConfigService::GetCRLSet(); |
// OCSP response is not provided by iOS API. |
+ // CRLSets are not used for getting the reason of rejection, because |
+ // of low benefits and high cost of storing CRLSet on the disk. |
Ryan Sleevi
2015/11/23 22:26:12
Reword:
// CRLSets are not used, as the OS is used
Eugene But (OOO till 7-30)
2015/11/23 22:36:00
Done.
|
_certVerifier->Verify(params, ^(net::CertVerifyResult result, int) { |
completionHandler(result, YES); |
}); |