Chromium Code Reviews| Index: ios/web/net/crw_cert_verification_controller.mm |
| diff --git a/ios/web/net/crw_cert_verification_controller.mm b/ios/web/net/crw_cert_verification_controller.mm |
| index 42d3738b71ba40f35d31e97b6da9bd770785dd66..8daf4b0ce25a372db439c58b822bac4953c7e0d2 100644 |
| --- a/ios/web/net/crw_cert_verification_controller.mm |
| +++ b/ios/web/net/crw_cert_verification_controller.mm |
| @@ -18,7 +18,6 @@ |
| #include "ios/web/public/web_thread.h" |
| #import "ios/web/web_state/wk_web_view_security_util.h" |
| #include "net/cert/cert_verify_result.h" |
| -#include "net/ssl/ssl_config_service.h" |
| #include "net/url_request/url_request_context.h" |
| #include "net/url_request/url_request_context_getter.h" |
| @@ -430,8 +429,9 @@ decideLoadPolicyForAcceptedTrustResult:(SecTrustResultType)trustResult |
| web::CertVerifierBlockAdapter::Params params( |
| blockCert.Pass(), base::SysNSStringToUTF8(host)); |
| params.flags = self.certVerifyFlags; |
| - params.crl_set = net::SSLConfigService::GetCRLSet(); |
| // OCSP response is not provided by iOS API. |
| + // CRLSets are not used for getting the reason of rejection, because |
| + // of low benefits and high cost of storing CRLSet on the disk. |
|
Ryan Sleevi
2015/11/23 22:26:12
Reword:
// CRLSets are not used, as the OS is used
Eugene But (OOO till 7-30)
2015/11/23 22:36:00
Done.
|
| _certVerifier->Verify(params, ^(net::CertVerifyResult result, int) { |
| completionHandler(result, YES); |
| }); |