| Index: content/browser/ssl/ssl_policy_backend.cc
|
| diff --git a/content/browser/ssl/ssl_policy_backend.cc b/content/browser/ssl/ssl_policy_backend.cc
|
| index e81c35d1628108c46477c5242d8cb61da1ff5efd..891c7046f0dba6627aa5ba0426eaf9c525a97487 100644
|
| --- a/content/browser/ssl/ssl_policy_backend.cc
|
| +++ b/content/browser/ssl/ssl_policy_backend.cc
|
| @@ -31,13 +31,6 @@ bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host,
|
| return ssl_host_state_delegate_->DidHostRunInsecureContent(host, pid);
|
| }
|
|
|
| -void SSLPolicyBackend::DenyCertForHost(net::X509Certificate* cert,
|
| - const std::string& host,
|
| - net::CertStatus error) {
|
| - if (ssl_host_state_delegate_)
|
| - ssl_host_state_delegate_->DenyCert(host, cert, error);
|
| -}
|
| -
|
| void SSLPolicyBackend::AllowCertForHost(net::X509Certificate* cert,
|
| const std::string& host,
|
| net::CertStatus error) {
|
| @@ -50,11 +43,10 @@ net::CertPolicy::Judgment SSLPolicyBackend::QueryPolicy(
|
| const std::string& host,
|
| net::CertStatus error,
|
| bool* expired_previous_decision) {
|
| - if (!ssl_host_state_delegate_)
|
| - return net::CertPolicy::UNKNOWN;
|
| -
|
| - return ssl_host_state_delegate_->QueryPolicy(
|
| - host, cert, error, expired_previous_decision);
|
| + return ssl_host_state_delegate_ ?
|
| + ssl_host_state_delegate_->QueryPolicy(
|
| + host, cert, error, expired_previous_decision) :
|
| + net::CertPolicy::UNKNOWN;
|
| }
|
|
|
| } // namespace content
|
|
|