| Index: chrome/browser/safe_browsing/client_side_detection_host.cc
|
| diff --git a/chrome/browser/safe_browsing/client_side_detection_host.cc b/chrome/browser/safe_browsing/client_side_detection_host.cc
|
| index e70421a399f622ae90888fa00e2376a7256a74b0..bdc561ebe38dfdcfe4a471ba4dfbf44d1aa3aaab 100644
|
| --- a/chrome/browser/safe_browsing/client_side_detection_host.cc
|
| +++ b/chrome/browser/safe_browsing/client_side_detection_host.cc
|
| @@ -218,7 +218,7 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
|
| << params_.url;
|
| RenderViewHost* rvh = web_contents_->GetRenderViewHost();
|
| rvh->Send(new SafeBrowsingMsg_StartPhishingDetection(
|
| - rvh->routing_id(), params_.url));
|
| + rvh->GetRoutingID(), params_.url));
|
| }
|
|
|
| // No need to protect |canceled_| with a lock because it is only read and
|
| @@ -329,7 +329,7 @@ void ClientSideDetectionHost::OnSafeBrowsingHit(
|
| if (web_contents() &&
|
| web_contents()->GetRenderProcessHost()->GetID() ==
|
| resource.render_process_host_id &&
|
| - web_contents()->GetRenderViewHost()->routing_id() ==
|
| + web_contents()->GetRenderViewHost()->GetRoutingID() ==
|
| resource.render_view_id &&
|
| (resource.threat_type == SafeBrowsingService::URL_PHISHING ||
|
| resource.threat_type == SafeBrowsingService::URL_MALWARE) &&
|
| @@ -408,7 +408,7 @@ void ClientSideDetectionHost::MaybeShowPhishingWarning(GURL phishing_url,
|
| resource.render_process_host_id =
|
| web_contents()->GetRenderProcessHost()->GetID();
|
| resource.render_view_id =
|
| - web_contents()->GetRenderViewHost()->routing_id();
|
| + web_contents()->GetRenderViewHost()->GetRoutingID();
|
| if (!sb_service_->IsWhitelisted(resource)) {
|
| // We need to stop any pending navigations, otherwise the interstital
|
| // might not get created properly.
|
|
|