| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index 5489ead7e36861501d492ac80037a7361e452859..ea65abc75e5bce45cc2abbe09e0fcccb5d076cd7 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -1261,10 +1261,10 @@ int SSLClientSocketOpenSSL::DoVerifyCertComplete(int result) {
|
| (result == OK ||
|
| (IsCertificateError(result) && IsCertStatusMinorError(cert_status))) &&
|
| !transport_security_state_->CheckPublicKeyPins(
|
| - host_and_port_.host(),
|
| - server_cert_verify_result_.is_issued_by_known_root,
|
| - server_cert_verify_result_.public_key_hashes,
|
| - &pinning_failure_log_)) {
|
| + host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
|
| + server_cert_verify_result_.public_key_hashes, server_cert_.get(),
|
| + server_cert_verify_result_.verified_cert.get(),
|
| + TransportSecurityState::ENABLE_PIN_REPORTS, &pinning_failure_log_)) {
|
| result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN;
|
| }
|
|
|
|
|