Index: net/socket/ssl_client_socket_nss.cc |
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc |
index e1a8335055799cda13761e3b1d0fd88015e9b100..9ed05bf14bdc2f737dbcb46ce38e55fd22e65233 100644 |
--- a/net/socket/ssl_client_socket_nss.cc |
+++ b/net/socket/ssl_client_socket_nss.cc |
@@ -3125,11 +3125,10 @@ void SSLClientSocketNSS::VerifyCT() { |
// TODO(ekasper): wipe stapled_ocsp_response and sct_list_from_tls_extension |
// from the state after verification is complete, to conserve memory. |
- if (policy_enforcer_ && |
- (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV)) { |
+ if (policy_enforcer_) { |
scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = |
SSLConfigService::GetEVCertsWhitelist(); |
- if (!policy_enforcer_->DoesConformToCTEVPolicy( |
+ if (!policy_enforcer_->DoesConformToCTPolicy( |
server_cert_verify_result_.verified_cert.get(), ev_whitelist.get(), |
ct_verify_result_, net_log_)) { |
// TODO(eranm): Log via the BoundNetLog, see crbug.com/437766 |