| Index: net/socket/ssl_client_socket_nss.cc
|
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
|
| index 2830fd174ee3fbac71fa9121a4f65765c0b67a0d..e1a8335055799cda13761e3b1d0fd88015e9b100 100644
|
| --- a/net/socket/ssl_client_socket_nss.cc
|
| +++ b/net/socket/ssl_client_socket_nss.cc
|
| @@ -90,10 +90,10 @@
|
| #include "net/base/net_errors.h"
|
| #include "net/base/net_util.h"
|
| #include "net/cert/asn1_util.h"
|
| -#include "net/cert/cert_policy_enforcer.h"
|
| #include "net/cert/cert_status_flags.h"
|
| #include "net/cert/cert_verifier.h"
|
| #include "net/cert/ct_ev_whitelist.h"
|
| +#include "net/cert/ct_policy_enforcer.h"
|
| #include "net/cert/ct_verifier.h"
|
| #include "net/cert/ct_verify_result.h"
|
| #include "net/cert/scoped_nss_types.h"
|
| @@ -2372,7 +2372,7 @@ SSLClientSocketNSS::SSLClientSocketNSS(
|
| nss_fd_(NULL),
|
| net_log_(transport_->socket()->NetLog()),
|
| transport_security_state_(context.transport_security_state),
|
| - policy_enforcer_(context.cert_policy_enforcer),
|
| + policy_enforcer_(context.ct_policy_enforcer),
|
| valid_thread_id_(base::kInvalidThreadId) {
|
| DCHECK(cert_verifier_);
|
|
|
|
|