| Index: content/browser/ssl/ssl_policy.cc
|
| diff --git a/content/browser/ssl/ssl_policy.cc b/content/browser/ssl/ssl_policy.cc
|
| index 2abee5bf437970bd7fc2151ef6059a97064e8642..3448a0f6630aec70fe8c449f381b24e40f52a8f3 100644
|
| --- a/content/browser/ssl/ssl_policy.cc
|
| +++ b/content/browser/ssl/ssl_policy.cc
|
| @@ -33,10 +33,10 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend)
|
|
|
| void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) {
|
| // First we check if we know the policy for this error.
|
| - net::CertPolicy::Judgment judgment = backend_->QueryPolicy(
|
| - handler->ssl_info().cert.get(),
|
| - handler->request_url().host(),
|
| - handler->cert_error());
|
| + net::CertPolicy::Judgment judgment =
|
| + backend_->QueryPolicy(handler->ssl_info().cert.get(),
|
| + handler->request_url(),
|
| + handler->cert_error());
|
|
|
| if (judgment == net::CertPolicy::ALLOWED) {
|
| handler->ContinueRequest();
|
| @@ -162,7 +162,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler,
|
| // ContinueRequest() gets posted to a different thread. Calling
|
| // AllowCertForHost() first ensures deterministic ordering.
|
| backend_->AllowCertForHost(handler->ssl_info().cert.get(),
|
| - handler->request_url().host(),
|
| + handler->request_url(),
|
| handler->cert_error());
|
| handler->ContinueRequest();
|
| } else {
|
| @@ -172,7 +172,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler,
|
| // CancelRequest() gets posted to a different thread. Calling
|
| // DenyCertForHost() first ensures deterministic ordering.
|
| backend_->DenyCertForHost(handler->ssl_info().cert.get(),
|
| - handler->request_url().host(),
|
| + handler->request_url(),
|
| handler->cert_error());
|
| handler->CancelRequest();
|
| }
|
|
|