| Index: net/quic/chromium/crypto/proof_verifier_chromium.cc
 | 
| diff --git a/net/quic/chromium/crypto/proof_verifier_chromium.cc b/net/quic/chromium/crypto/proof_verifier_chromium.cc
 | 
| index 95b1999061827fbb4ae003456e9f864cd7a4a964..a36b5cf7f09d016f2870f50887af8232382df8ff 100644
 | 
| --- a/net/quic/chromium/crypto/proof_verifier_chromium.cc
 | 
| +++ b/net/quic/chromium/crypto/proof_verifier_chromium.cc
 | 
| @@ -420,13 +420,15 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) {
 | 
|              cert_verify_result.verified_cert.get(), verified_scts, net_log_);
 | 
|  
 | 
|      int ct_result = OK;
 | 
| -    if (verify_details_->ct_verify_result.cert_policy_compliance !=
 | 
| -            ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS &&
 | 
| -        verify_details_->ct_verify_result.cert_policy_compliance !=
 | 
| -            ct::CertPolicyCompliance::CERT_POLICY_BUILD_NOT_TIMELY &&
 | 
| -        transport_security_state_->ShouldRequireCT(
 | 
| -            hostname_, cert_verify_result.verified_cert.get(),
 | 
| -            cert_verify_result.public_key_hashes)) {
 | 
| +    if (transport_security_state_->CheckCTRequirements(
 | 
| +            HostPortPair(hostname_, port_),
 | 
| +            cert_verify_result.is_issued_by_known_root,
 | 
| +            cert_verify_result.public_key_hashes,
 | 
| +            cert_verify_result.verified_cert.get(), cert_.get(),
 | 
| +            verify_details_->ct_verify_result.scts,
 | 
| +            TransportSecurityState::ENABLE_EXPECT_CT_REPORTS,
 | 
| +            verify_details_->ct_verify_result.cert_policy_compliance) !=
 | 
| +        TransportSecurityState::CT_REQUIREMENTS_MET) {
 | 
|        verify_details_->cert_verify_result.cert_status |=
 | 
|            CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED;
 | 
|        ct_result = ERR_CERTIFICATE_TRANSPARENCY_REQUIRED;
 | 
| 
 |