Index: content/browser/ssl/ssl_policy.cc |
diff --git a/content/browser/ssl/ssl_policy.cc b/content/browser/ssl/ssl_policy.cc |
index 731645505b424d219ea6a54eec4203b56228d37c..64f474149d31486e46010437c856b25b110cf2af 100644 |
--- a/content/browser/ssl/ssl_policy.cc |
+++ b/content/browser/ssl/ssl_policy.cc |
@@ -33,10 +33,10 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) |
void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { |
// First we check if we know the policy for this error. |
- net::CertPolicy::Judgment judgment = backend_->QueryPolicy( |
- handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
- handler->cert_error()); |
+ net::CertPolicy::Judgment judgment = |
+ backend_->QueryPolicy(handler->ssl_info().cert.get(), |
+ handler->request_url(), |
+ handler->cert_error()); |
if (judgment == net::CertPolicy::ALLOWED) { |
handler->ContinueRequest(); |
@@ -162,7 +162,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
// ContinueRequest() gets posted to a different thread. Calling |
// AllowCertForHost() first ensures deterministic ordering. |
backend_->AllowCertForHost(handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
+ handler->request_url(), |
handler->cert_error()); |
handler->ContinueRequest(); |
} else { |
@@ -172,7 +172,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
// CancelRequest() gets posted to a different thread. Calling |
// DenyCertForHost() first ensures deterministic ordering. |
backend_->DenyCertForHost(handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
+ handler->request_url(), |
handler->cert_error()); |
handler->CancelRequest(); |
} |