| Index: net/socket/ssl_client_socket_nss.cc
|
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
|
| index 011474fedca1a1ea5efd9c9270aa75566d58071c..79b2a8c7b8fa271574123661e631b546fc882708 100644
|
| --- a/net/socket/ssl_client_socket_nss.cc
|
| +++ b/net/socket/ssl_client_socket_nss.cc
|
| @@ -3526,15 +3526,6 @@ int SSLClientSocketNSS::DoVerifyCertComplete(int result) {
|
| // purposes. See https://bugzilla.mozilla.org/show_bug.cgi?id=508081 and
|
| // http://crbug.com/15630 for more info.
|
|
|
| - // TODO(hclam): Skip logging if server cert was expected to be bad because
|
| - // |server_cert_verify_result_| doesn't contain all the information about
|
| - // the cert.
|
| - if (result == OK) {
|
| - int ssl_version =
|
| - SSLConnectionStatusToVersion(core_->state().ssl_connection_status);
|
| - RecordConnectionTypeMetrics(ssl_version);
|
| - }
|
| -
|
| const CertStatus cert_status = server_cert_verify_result_.cert_status;
|
| if (transport_security_state_ &&
|
| (result == OK ||
|
|
|