| Index: content/browser/renderer_host/p2p/socket_host_tcp.cc
 | 
| diff --git a/content/browser/renderer_host/p2p/socket_host_tcp.cc b/content/browser/renderer_host/p2p/socket_host_tcp.cc
 | 
| index e55cce722d161775e79fe884d8de3d2491cd2927..1687a3a474a73d98d62e9919ee9fac8157a4c7f9 100644
 | 
| --- a/content/browser/renderer_host/p2p/socket_host_tcp.cc
 | 
| +++ b/content/browser/renderer_host/p2p/socket_host_tcp.cc
 | 
| @@ -183,11 +183,15 @@ void P2PSocketHostTcpBase::StartTls() {
 | 
|        new net::ClientSocketHandle());
 | 
|    socket_handle->SetSocket(std::move(socket_));
 | 
|  
 | 
| -  net::SSLClientSocketContext context;
 | 
| -  context.cert_verifier = url_context_->GetURLRequestContext()->cert_verifier();
 | 
| -  context.transport_security_state =
 | 
| -      url_context_->GetURLRequestContext()->transport_security_state();
 | 
| -  DCHECK(context.transport_security_state);
 | 
| +  const net::URLRequestContext* url_request_context =
 | 
| +      url_context_->GetURLRequestContext();
 | 
| +  net::SSLClientSocketContext context(
 | 
| +      url_request_context->cert_verifier(),
 | 
| +      nullptr, /* TODO(rkn): ChannelIDService is not thread safe. */
 | 
| +      url_request_context->transport_security_state(),
 | 
| +      url_request_context->cert_transparency_verifier(),
 | 
| +      url_request_context->ct_policy_enforcer(),
 | 
| +      std::string() /* TODO(rsleevi): Ensure a proper unique shard. */);
 | 
|  
 | 
|    // Default ssl config.
 | 
|    const net::SSLConfig ssl_config;
 | 
| @@ -196,7 +200,7 @@ void P2PSocketHostTcpBase::StartTls() {
 | 
|    // Calling net::HostPortPair::FromIPEndPoint will crash if the IP address is
 | 
|    // empty.
 | 
|    if (!remote_address_.ip_address.address().empty()) {
 | 
| -      net::HostPortPair::FromIPEndPoint(remote_address_.ip_address);
 | 
| +    net::HostPortPair::FromIPEndPoint(remote_address_.ip_address);
 | 
|    } else {
 | 
|      dest_host_port_pair.set_port(remote_address_.ip_address.port());
 | 
|    }
 | 
| 
 |