| Index: net/socket/ssl_client_socket_impl.cc
|
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
|
| index 91c10da3012282f34cb23898d488dd9626b7c838..d91860c68a010b2b5a470c1c0c412054f409dea0 100644
|
| --- a/net/socket/ssl_client_socket_impl.cc
|
| +++ b/net/socket/ssl_client_socket_impl.cc
|
| @@ -33,7 +33,6 @@
|
| #include "net/base/net_errors.h"
|
| #include "net/base/trace_constants.h"
|
| #include "net/cert/cert_verifier.h"
|
| -#include "net/cert/ct_ev_whitelist.h"
|
| #include "net/cert/ct_policy_enforcer.h"
|
| #include "net/cert/ct_policy_status.h"
|
| #include "net/cert/ct_verifier.h"
|
| @@ -1538,35 +1537,20 @@ int SSLClientSocketImpl::VerifyCT() {
|
| &ct_verify_result_.scts, net_log_);
|
|
|
| ct_verify_result_.ct_policies_applied = true;
|
| - ct_verify_result_.ev_policy_compliance =
|
| - ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY;
|
|
|
| SCTList verified_scts =
|
| ct::SCTsMatchingStatus(ct_verify_result_.scts, ct::SCT_STATUS_OK);
|
|
|
| - if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) {
|
| - scoped_refptr<ct::EVCertsWhitelist> ev_whitelist =
|
| - SSLConfigService::GetEVCertsWhitelist();
|
| - ct::EVPolicyCompliance ev_policy_compliance =
|
| - policy_enforcer_->DoesConformToCTEVPolicy(
|
| - server_cert_verify_result_.verified_cert.get(), ev_whitelist.get(),
|
| - verified_scts, net_log_);
|
| - ct_verify_result_.ev_policy_compliance = ev_policy_compliance;
|
| - if (ev_policy_compliance !=
|
| - ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY &&
|
| - ev_policy_compliance !=
|
| - ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_WHITELIST &&
|
| - ev_policy_compliance !=
|
| - ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS) {
|
| - server_cert_verify_result_.cert_status |=
|
| - CERT_STATUS_CT_COMPLIANCE_FAILED;
|
| - server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
|
| - }
|
| - }
|
| ct_verify_result_.cert_policy_compliance =
|
| policy_enforcer_->DoesConformToCertPolicy(
|
| server_cert_verify_result_.verified_cert.get(), verified_scts,
|
| net_log_);
|
| + if ((server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) &&
|
| + (ct_verify_result_.cert_policy_compliance !=
|
| + ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS)) {
|
| + server_cert_verify_result_.cert_status |= CERT_STATUS_CT_COMPLIANCE_FAILED;
|
| + server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
|
| + }
|
|
|
| if (transport_security_state_->CheckCTRequirements(
|
| host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
|
|
|