| Index: net/socket/ssl_client_socket_impl.cc
 | 
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
 | 
| index 91c10da3012282f34cb23898d488dd9626b7c838..d91860c68a010b2b5a470c1c0c412054f409dea0 100644
 | 
| --- a/net/socket/ssl_client_socket_impl.cc
 | 
| +++ b/net/socket/ssl_client_socket_impl.cc
 | 
| @@ -33,7 +33,6 @@
 | 
|  #include "net/base/net_errors.h"
 | 
|  #include "net/base/trace_constants.h"
 | 
|  #include "net/cert/cert_verifier.h"
 | 
| -#include "net/cert/ct_ev_whitelist.h"
 | 
|  #include "net/cert/ct_policy_enforcer.h"
 | 
|  #include "net/cert/ct_policy_status.h"
 | 
|  #include "net/cert/ct_verifier.h"
 | 
| @@ -1538,35 +1537,20 @@ int SSLClientSocketImpl::VerifyCT() {
 | 
|        &ct_verify_result_.scts, net_log_);
 | 
|  
 | 
|    ct_verify_result_.ct_policies_applied = true;
 | 
| -  ct_verify_result_.ev_policy_compliance =
 | 
| -      ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY;
 | 
|  
 | 
|    SCTList verified_scts =
 | 
|        ct::SCTsMatchingStatus(ct_verify_result_.scts, ct::SCT_STATUS_OK);
 | 
|  
 | 
| -  if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) {
 | 
| -    scoped_refptr<ct::EVCertsWhitelist> ev_whitelist =
 | 
| -        SSLConfigService::GetEVCertsWhitelist();
 | 
| -    ct::EVPolicyCompliance ev_policy_compliance =
 | 
| -        policy_enforcer_->DoesConformToCTEVPolicy(
 | 
| -            server_cert_verify_result_.verified_cert.get(), ev_whitelist.get(),
 | 
| -            verified_scts, net_log_);
 | 
| -    ct_verify_result_.ev_policy_compliance = ev_policy_compliance;
 | 
| -    if (ev_policy_compliance !=
 | 
| -            ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY &&
 | 
| -        ev_policy_compliance !=
 | 
| -            ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_WHITELIST &&
 | 
| -        ev_policy_compliance !=
 | 
| -            ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS) {
 | 
| -      server_cert_verify_result_.cert_status |=
 | 
| -          CERT_STATUS_CT_COMPLIANCE_FAILED;
 | 
| -      server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
 | 
| -    }
 | 
| -  }
 | 
|    ct_verify_result_.cert_policy_compliance =
 | 
|        policy_enforcer_->DoesConformToCertPolicy(
 | 
|            server_cert_verify_result_.verified_cert.get(), verified_scts,
 | 
|            net_log_);
 | 
| +  if ((server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) &&
 | 
| +      (ct_verify_result_.cert_policy_compliance !=
 | 
| +       ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS)) {
 | 
| +    server_cert_verify_result_.cert_status |= CERT_STATUS_CT_COMPLIANCE_FAILED;
 | 
| +    server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
 | 
| +  }
 | 
|  
 | 
|    if (transport_security_state_->CheckCTRequirements(
 | 
|            host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
 | 
| 
 |