| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index 4e86c055932ed7517600625db0179d13ee720029..a5d75ce78a6ecda36d7ad223db5372a66eccc309 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -1250,7 +1250,7 @@ void SSLClientSocketOpenSSL::VerifyCT() {
|
| SSLConfigService::GetEVCertsWhitelist();
|
| if (!policy_enforcer_->DoesConformToCTEVPolicy(
|
| server_cert_verify_result_.verified_cert.get(),
|
| - ev_whitelist.get(), ct_verify_result_)) {
|
| + ev_whitelist.get(), ct_verify_result_, net_log_)) {
|
| // TODO(eranm): Log via the BoundNetLog, see crbug.com/437766
|
| VLOG(1) << "EV certificate for "
|
| << server_cert_verify_result_.verified_cert->subject()
|
|
|