| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index 27df32d0209b48a8cd7a80c95dbab49fb9d070de..7b3b5572f8c9aa401aff60133ba3f04cb0363ef9 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -1256,10 +1256,10 @@ int SSLClientSocketOpenSSL::DoVerifyCertComplete(int result) {
|
| (result == OK ||
|
| (IsCertificateError(result) && IsCertStatusMinorError(cert_status))) &&
|
| !transport_security_state_->CheckPublicKeyPins(
|
| - host_and_port_.host(),
|
| - server_cert_verify_result_.is_issued_by_known_root,
|
| - server_cert_verify_result_.public_key_hashes,
|
| - &pinning_failure_log_)) {
|
| + host_and_port_, server_cert_verify_result_.is_issued_by_known_root,
|
| + server_cert_verify_result_.public_key_hashes, server_cert_.get(),
|
| + server_cert_verify_result_.verified_cert.get(),
|
| + TransportSecurityState::ENABLE_PIN_REPORTS, &pinning_failure_log_)) {
|
| result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN;
|
| }
|
|
|
|
|