| Index: net/socket/ssl_client_socket_impl.cc
|
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
|
| index 97a3997a2e3b8bae9a7307ab4ab6e1f2878ee000..a7a5d338a9679ac3c5a14db651fd2cb2d718dc27 100644
|
| --- a/net/socket/ssl_client_socket_impl.cc
|
| +++ b/net/socket/ssl_client_socket_impl.cc
|
| @@ -795,6 +795,7 @@ bool SSLClientSocketImpl::GetSSLInfo(SSLInfo* ssl_info) {
|
| ssl_info->token_binding_negotiated = tb_was_negotiated_;
|
| ssl_info->token_binding_key_param = tb_negotiated_param_;
|
| ssl_info->pinning_failure_log = pinning_failure_log_;
|
| + ssl_info->ocsp = server_cert_verify_result_.ocsp;
|
|
|
| AddCTInfoToSSLInfo(ssl_info);
|
|
|
| @@ -1284,13 +1285,11 @@ int SSLClientSocketImpl::DoVerifyCert(int result) {
|
| }
|
|
|
| std::string ocsp_response;
|
| - if (cert_verifier_->SupportsOCSPStapling()) {
|
| - const uint8_t* ocsp_response_raw;
|
| - size_t ocsp_response_len;
|
| - SSL_get0_ocsp_response(ssl_, &ocsp_response_raw, &ocsp_response_len);
|
| - ocsp_response.assign(reinterpret_cast<const char*>(ocsp_response_raw),
|
| - ocsp_response_len);
|
| - }
|
| + const uint8_t* ocsp_response_raw;
|
| + size_t ocsp_response_len;
|
| + SSL_get0_ocsp_response(ssl_, &ocsp_response_raw, &ocsp_response_len);
|
| + ocsp_response.assign(reinterpret_cast<const char*>(ocsp_response_raw),
|
| + ocsp_response_len);
|
|
|
| start_cert_verification_time_ = base::TimeTicks::Now();
|
|
|
|
|