Chromium Code Reviews| Index: net/socket/ssl_client_socket_impl.cc |
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc |
| index 80ff994982f2d3e804266d8623bae1dd2e90b0d4..f1c94e7d8a55f3c3d69cbdea6d6ad08d4628962a 100644 |
| --- a/net/socket/ssl_client_socket_impl.cc |
| +++ b/net/socket/ssl_client_socket_impl.cc |
| @@ -1356,7 +1356,10 @@ int SSLClientSocketImpl::DoVerifyCertComplete(int result) { |
| server_cert_verify_result_.public_key_hashes, server_cert_.get(), |
| server_cert_verify_result_.verified_cert.get(), |
| TransportSecurityState::ENABLE_PIN_REPORTS, &pinning_failure_log_)) { |
| - result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; |
| + if (server_cert_verify_result_.is_issued_by_known_root) |
|
estark
2016/05/31 14:59:57
I think we need to apply the same logic to the cor
dadrian
2016/05/31 18:58:31
I implemented the same logic for QUIC, but I'm wor
|
| + result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; |
| + else |
| + server_cert_verify_result_.cert_status |= CERT_STATUS_PKP_BYPASSED; |
| } |
| if (result == OK) { |