Index: net/quic/crypto/proof_verifier_chromium.cc |
diff --git a/net/quic/crypto/proof_verifier_chromium.cc b/net/quic/crypto/proof_verifier_chromium.cc |
index 90543cbbbccf5fcfd3fbb85b8a5eca250acca533..f12204f8f8c512472c5920e24caf625b13af753c 100644 |
--- a/net/quic/crypto/proof_verifier_chromium.cc |
+++ b/net/quic/crypto/proof_verifier_chromium.cc |
@@ -243,13 +243,16 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) { |
const CertVerifyResult& cert_verify_result = |
verify_details_->cert_verify_result; |
const CertStatus cert_status = cert_verify_result.cert_status; |
+ // TODO(estark): replace 0 below with the port that the connection was |
+ // made on. |
if (transport_security_state_ && |
(result == OK || |
(IsCertificateError(result) && IsCertStatusMinorError(cert_status))) && |
!transport_security_state_->CheckPublicKeyPins( |
- hostname_, |
- cert_verify_result.is_issued_by_known_root, |
- cert_verify_result.public_key_hashes, |
+ hostname_, cert_verify_result.is_issued_by_known_root, |
+ cert_verify_result.public_key_hashes, 0, cert_.get(), |
+ cert_verify_result.verified_cert.get(), |
+ TransportSecurityState::ENABLE_PIN_REPORTS, |
&verify_details_->pinning_failure_log)) { |
result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; |
} |