| Index: net/cert/ct_known_logs.cc | 
| diff --git a/net/cert/ct_known_logs.cc b/net/cert/ct_known_logs.cc | 
| index 0602581708e1e211b2d57939fed94ad6e9230f94..0f0338752fb5e7dc5e88220a58049f8fe0f7623e 100644 | 
| --- a/net/cert/ct_known_logs.cc | 
| +++ b/net/cert/ct_known_logs.cc | 
| @@ -37,7 +37,8 @@ CreateLogVerifiersForKnownLogs() { | 
| // Add all qualified logs. | 
| for (const auto& log : kCTLogList) { | 
| base::StringPiece key(log.log_key, log.log_key_length); | 
| -    verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url)); | 
| +    verifiers.push_back( | 
| +        CTLogVerifier::Create(key, log.log_name, log.log_url, log.log_domain)); | 
| // Make sure no null logs enter verifiers. Parsing of all known logs should | 
| // succeed. | 
| CHECK(verifiers.back().get()); | 
| @@ -48,7 +49,8 @@ CreateLogVerifiersForKnownLogs() { | 
| for (const auto& disqualified_log : kDisqualifiedCTLogList) { | 
| const CTLogInfo& log = disqualified_log.log_info; | 
| base::StringPiece key(log.log_key, log.log_key_length); | 
| -    verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url)); | 
| +    verifiers.push_back( | 
| +        CTLogVerifier::Create(key, log.log_name, log.log_url, log.log_domain)); | 
| // Make sure no null logs enter verifiers. Parsing of all known logs should | 
| // succeed. | 
| CHECK(verifiers.back().get()); | 
|  |