| Index: content/browser/renderer_host/p2p/socket_host_tcp.cc
|
| diff --git a/content/browser/renderer_host/p2p/socket_host_tcp.cc b/content/browser/renderer_host/p2p/socket_host_tcp.cc
|
| index e55cce722d161775e79fe884d8de3d2491cd2927..1687a3a474a73d98d62e9919ee9fac8157a4c7f9 100644
|
| --- a/content/browser/renderer_host/p2p/socket_host_tcp.cc
|
| +++ b/content/browser/renderer_host/p2p/socket_host_tcp.cc
|
| @@ -183,11 +183,15 @@ void P2PSocketHostTcpBase::StartTls() {
|
| new net::ClientSocketHandle());
|
| socket_handle->SetSocket(std::move(socket_));
|
|
|
| - net::SSLClientSocketContext context;
|
| - context.cert_verifier = url_context_->GetURLRequestContext()->cert_verifier();
|
| - context.transport_security_state =
|
| - url_context_->GetURLRequestContext()->transport_security_state();
|
| - DCHECK(context.transport_security_state);
|
| + const net::URLRequestContext* url_request_context =
|
| + url_context_->GetURLRequestContext();
|
| + net::SSLClientSocketContext context(
|
| + url_request_context->cert_verifier(),
|
| + nullptr, /* TODO(rkn): ChannelIDService is not thread safe. */
|
| + url_request_context->transport_security_state(),
|
| + url_request_context->cert_transparency_verifier(),
|
| + url_request_context->ct_policy_enforcer(),
|
| + std::string() /* TODO(rsleevi): Ensure a proper unique shard. */);
|
|
|
| // Default ssl config.
|
| const net::SSLConfig ssl_config;
|
| @@ -196,7 +200,7 @@ void P2PSocketHostTcpBase::StartTls() {
|
| // Calling net::HostPortPair::FromIPEndPoint will crash if the IP address is
|
| // empty.
|
| if (!remote_address_.ip_address.address().empty()) {
|
| - net::HostPortPair::FromIPEndPoint(remote_address_.ip_address);
|
| + net::HostPortPair::FromIPEndPoint(remote_address_.ip_address);
|
| } else {
|
| dest_host_port_pair.set_port(remote_address_.ip_address.port());
|
| }
|
|
|