| Index: net/socket/ssl_client_socket_impl.cc
|
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
|
| index d042912d83bcff11d9492e2f07207d35419450c0..4f5f2c4651d758975e5d522ab2f9201bec0b2426 100644
|
| --- a/net/socket/ssl_client_socket_impl.cc
|
| +++ b/net/socket/ssl_client_socket_impl.cc
|
| @@ -798,6 +798,7 @@ bool SSLClientSocketImpl::GetSSLInfo(SSLInfo* ssl_info) {
|
| ssl_info->token_binding_negotiated = tb_was_negotiated_;
|
| ssl_info->token_binding_key_param = tb_negotiated_param_;
|
| ssl_info->pinning_failure_log = pinning_failure_log_;
|
| + ssl_info->ocsp_result = server_cert_verify_result_.ocsp_result;
|
|
|
| AddCTInfoToSSLInfo(ssl_info);
|
|
|
| @@ -1287,13 +1288,11 @@ int SSLClientSocketImpl::DoVerifyCert(int result) {
|
| }
|
|
|
| std::string ocsp_response;
|
| - if (cert_verifier_->SupportsOCSPStapling()) {
|
| - const uint8_t* ocsp_response_raw;
|
| - size_t ocsp_response_len;
|
| - SSL_get0_ocsp_response(ssl_, &ocsp_response_raw, &ocsp_response_len);
|
| - ocsp_response.assign(reinterpret_cast<const char*>(ocsp_response_raw),
|
| - ocsp_response_len);
|
| - }
|
| + const uint8_t* ocsp_response_raw;
|
| + size_t ocsp_response_len;
|
| + SSL_get0_ocsp_response(ssl_, &ocsp_response_raw, &ocsp_response_len);
|
| + ocsp_response.assign(reinterpret_cast<const char*>(ocsp_response_raw),
|
| + ocsp_response_len);
|
|
|
| start_cert_verification_time_ = base::TimeTicks::Now();
|
|
|
|
|