| Index: chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| diff --git a/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc b/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| index f6e31e05d74e600f8da202789f65d9e96a4fb207..af2c261d3819aebaab88bf25e072def6ecafd8d6 100644
|
| --- a/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| +++ b/chrome/browser/ssl/chrome_ssl_host_state_delegate.cc
|
| @@ -436,28 +436,29 @@ bool ChromeSSLHostStateDelegate::HasAllowException(
|
|
|
| void ChromeSSLHostStateDelegate::HostRanInsecureContent(
|
| const std::string& host,
|
| - int pid,
|
| + int child_id,
|
| InsecureContentType content_type) {
|
| switch (content_type) {
|
| case MIXED_CONTENT:
|
| - ran_mixed_content_hosts_.insert(BrokenHostEntry(host, pid));
|
| + ran_mixed_content_hosts_.insert(BrokenHostEntry(host, child_id));
|
| return;
|
| case CERT_ERRORS_CONTENT:
|
| - ran_content_with_cert_errors_hosts_.insert(BrokenHostEntry(host, pid));
|
| + ran_content_with_cert_errors_hosts_.insert(
|
| + BrokenHostEntry(host, child_id));
|
| return;
|
| }
|
| }
|
|
|
| bool ChromeSSLHostStateDelegate::DidHostRunInsecureContent(
|
| const std::string& host,
|
| - int pid,
|
| + int child_id,
|
| InsecureContentType content_type) const {
|
| switch (content_type) {
|
| case MIXED_CONTENT:
|
| - return !!ran_mixed_content_hosts_.count(BrokenHostEntry(host, pid));
|
| + return !!ran_mixed_content_hosts_.count(BrokenHostEntry(host, child_id));
|
| case CERT_ERRORS_CONTENT:
|
| return !!ran_content_with_cert_errors_hosts_.count(
|
| - BrokenHostEntry(host, pid));
|
| + BrokenHostEntry(host, child_id));
|
| }
|
| NOTREACHED();
|
| return false;
|
|
|