Index: content/browser/ssl/ssl_policy.cc |
diff --git a/content/browser/ssl/ssl_policy.cc b/content/browser/ssl/ssl_policy.cc |
index 2abee5bf437970bd7fc2151ef6059a97064e8642..3448a0f6630aec70fe8c449f381b24e40f52a8f3 100644 |
--- a/content/browser/ssl/ssl_policy.cc |
+++ b/content/browser/ssl/ssl_policy.cc |
@@ -33,10 +33,10 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) |
void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { |
// First we check if we know the policy for this error. |
- net::CertPolicy::Judgment judgment = backend_->QueryPolicy( |
- handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
- handler->cert_error()); |
+ net::CertPolicy::Judgment judgment = |
+ backend_->QueryPolicy(handler->ssl_info().cert.get(), |
+ handler->request_url(), |
+ handler->cert_error()); |
if (judgment == net::CertPolicy::ALLOWED) { |
handler->ContinueRequest(); |
@@ -162,7 +162,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
// ContinueRequest() gets posted to a different thread. Calling |
// AllowCertForHost() first ensures deterministic ordering. |
backend_->AllowCertForHost(handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
+ handler->request_url(), |
handler->cert_error()); |
handler->ContinueRequest(); |
} else { |
@@ -172,7 +172,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
// CancelRequest() gets posted to a different thread. Calling |
// DenyCertForHost() first ensures deterministic ordering. |
backend_->DenyCertForHost(handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
+ handler->request_url(), |
handler->cert_error()); |
handler->CancelRequest(); |
} |