Index: net/socket/ssl_client_socket_impl.cc |
diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc |
index 91c10da3012282f34cb23898d488dd9626b7c838..d91860c68a010b2b5a470c1c0c412054f409dea0 100644 |
--- a/net/socket/ssl_client_socket_impl.cc |
+++ b/net/socket/ssl_client_socket_impl.cc |
@@ -33,7 +33,6 @@ |
#include "net/base/net_errors.h" |
#include "net/base/trace_constants.h" |
#include "net/cert/cert_verifier.h" |
-#include "net/cert/ct_ev_whitelist.h" |
#include "net/cert/ct_policy_enforcer.h" |
#include "net/cert/ct_policy_status.h" |
#include "net/cert/ct_verifier.h" |
@@ -1538,35 +1537,20 @@ int SSLClientSocketImpl::VerifyCT() { |
&ct_verify_result_.scts, net_log_); |
ct_verify_result_.ct_policies_applied = true; |
- ct_verify_result_.ev_policy_compliance = |
- ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY; |
SCTList verified_scts = |
ct::SCTsMatchingStatus(ct_verify_result_.scts, ct::SCT_STATUS_OK); |
- if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) { |
- scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = |
- SSLConfigService::GetEVCertsWhitelist(); |
- ct::EVPolicyCompliance ev_policy_compliance = |
- policy_enforcer_->DoesConformToCTEVPolicy( |
- server_cert_verify_result_.verified_cert.get(), ev_whitelist.get(), |
- verified_scts, net_log_); |
- ct_verify_result_.ev_policy_compliance = ev_policy_compliance; |
- if (ev_policy_compliance != |
- ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY && |
- ev_policy_compliance != |
- ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_WHITELIST && |
- ev_policy_compliance != |
- ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS) { |
- server_cert_verify_result_.cert_status |= |
- CERT_STATUS_CT_COMPLIANCE_FAILED; |
- server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; |
- } |
- } |
ct_verify_result_.cert_policy_compliance = |
policy_enforcer_->DoesConformToCertPolicy( |
server_cert_verify_result_.verified_cert.get(), verified_scts, |
net_log_); |
+ if ((server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) && |
+ (ct_verify_result_.cert_policy_compliance != |
+ ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS)) { |
+ server_cert_verify_result_.cert_status |= CERT_STATUS_CT_COMPLIANCE_FAILED; |
+ server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; |
+ } |
if (transport_security_state_->CheckCTRequirements( |
host_and_port_, server_cert_verify_result_.is_issued_by_known_root, |