| Index: net/socket/ssl_client_socket_impl.cc
 | 
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
 | 
| index 9bbc41d8f0c4b869120d59839ebbe4f608f16dc4..b4025fbf6944d71627b20ac645da10a06b26ee35 100644
 | 
| --- a/net/socket/ssl_client_socket_impl.cc
 | 
| +++ b/net/socket/ssl_client_socket_impl.cc
 | 
| @@ -1571,13 +1571,14 @@ int SSLClientSocketImpl::VerifyCT() {
 | 
|            server_cert_verify_result_.verified_cert.get(), verified_scts,
 | 
|            net_log_);
 | 
|  
 | 
| -  if (ct_verify_result_.cert_policy_compliance !=
 | 
| -          ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS &&
 | 
| -      ct_verify_result_.cert_policy_compliance !=
 | 
| -          ct::CertPolicyCompliance::CERT_POLICY_BUILD_NOT_TIMELY &&
 | 
| -      transport_security_state_->ShouldRequireCT(
 | 
| -          host_and_port_.host(), server_cert_verify_result_.verified_cert.get(),
 | 
| -          server_cert_verify_result_.public_key_hashes)) {
 | 
| +  if (transport_security_state_->CheckCTRequirements(
 | 
| +          host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
 | 
| +          server_cert_verify_result_.public_key_hashes,
 | 
| +          server_cert_verify_result_.verified_cert.get(), server_cert_.get(),
 | 
| +          ct_verify_result_.scts,
 | 
| +          TransportSecurityState::ENABLE_EXPECT_CT_REPORTS,
 | 
| +          ct_verify_result_.cert_policy_compliance) !=
 | 
| +      TransportSecurityState::CT_REQUIREMENTS_MET) {
 | 
|      server_cert_verify_result_.cert_status |=
 | 
|          CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED;
 | 
|      return ERR_CERTIFICATE_TRANSPARENCY_REQUIRED;
 | 
| 
 |