| Index: net/cert/ct_known_logs.cc
|
| diff --git a/net/cert/ct_known_logs.cc b/net/cert/ct_known_logs.cc
|
| index da086c7312c7c0f95567d24d676c8656626e1cd4..a65988971ed4494e267c1ee1dbe9a36613258e34 100644
|
| --- a/net/cert/ct_known_logs.cc
|
| +++ b/net/cert/ct_known_logs.cc
|
| @@ -37,7 +37,8 @@ CreateLogVerifiersForKnownLogs() {
|
| // Add all qualified logs.
|
| for (const auto& log : kCTLogList) {
|
| base::StringPiece key(log.log_key, log.log_key_length);
|
| - verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url));
|
| + verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url,
|
| + log.log_dns_domain));
|
| // Make sure no null logs enter verifiers. Parsing of all known logs should
|
| // succeed.
|
| CHECK(verifiers.back().get());
|
| @@ -48,7 +49,8 @@ CreateLogVerifiersForKnownLogs() {
|
| for (const auto& disqualified_log : kDisqualifiedCTLogList) {
|
| const CTLogInfo& log = disqualified_log.log_info;
|
| base::StringPiece key(log.log_key, log.log_key_length);
|
| - verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url));
|
| + verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url,
|
| + log.log_dns_domain));
|
| // Make sure no null logs enter verifiers. Parsing of all known logs should
|
| // succeed.
|
| CHECK(verifiers.back().get());
|
|
|