| Index: net/socket/ssl_client_socket_impl.cc
 | 
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
 | 
| index d042912d83bcff11d9492e2f07207d35419450c0..4f5f2c4651d758975e5d522ab2f9201bec0b2426 100644
 | 
| --- a/net/socket/ssl_client_socket_impl.cc
 | 
| +++ b/net/socket/ssl_client_socket_impl.cc
 | 
| @@ -798,6 +798,7 @@ bool SSLClientSocketImpl::GetSSLInfo(SSLInfo* ssl_info) {
 | 
|    ssl_info->token_binding_negotiated = tb_was_negotiated_;
 | 
|    ssl_info->token_binding_key_param = tb_negotiated_param_;
 | 
|    ssl_info->pinning_failure_log = pinning_failure_log_;
 | 
| +  ssl_info->ocsp_result = server_cert_verify_result_.ocsp_result;
 | 
|  
 | 
|    AddCTInfoToSSLInfo(ssl_info);
 | 
|  
 | 
| @@ -1287,13 +1288,11 @@ int SSLClientSocketImpl::DoVerifyCert(int result) {
 | 
|    }
 | 
|  
 | 
|    std::string ocsp_response;
 | 
| -  if (cert_verifier_->SupportsOCSPStapling()) {
 | 
| -    const uint8_t* ocsp_response_raw;
 | 
| -    size_t ocsp_response_len;
 | 
| -    SSL_get0_ocsp_response(ssl_, &ocsp_response_raw, &ocsp_response_len);
 | 
| -    ocsp_response.assign(reinterpret_cast<const char*>(ocsp_response_raw),
 | 
| -                         ocsp_response_len);
 | 
| -  }
 | 
| +  const uint8_t* ocsp_response_raw;
 | 
| +  size_t ocsp_response_len;
 | 
| +  SSL_get0_ocsp_response(ssl_, &ocsp_response_raw, &ocsp_response_len);
 | 
| +  ocsp_response.assign(reinterpret_cast<const char*>(ocsp_response_raw),
 | 
| +                       ocsp_response_len);
 | 
|  
 | 
|    start_cert_verification_time_ = base::TimeTicks::Now();
 | 
|  
 | 
| 
 |