Index: content/browser/ssl/ssl_policy.cc |
diff --git a/content/browser/ssl/ssl_policy.cc b/content/browser/ssl/ssl_policy.cc |
index 1b9d60c9acd2644c296e6022e5f599f8acc96c27..c425fd9326ee46e5e45eef09b46707309fb8b3b3 100644 |
--- a/content/browser/ssl/ssl_policy.cc |
+++ b/content/browser/ssl/ssl_policy.cc |
@@ -44,9 +44,8 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) |
void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { |
// First we check if we know the policy for this error. |
- net::CertPolicy::Judgment judgment = |
- backend_->QueryPolicy(handler->ssl_info().cert, |
- handler->request_url().host()); |
+ net::CertPolicy::Judgment judgment = backend_->QueryPolicy( |
+ handler->ssl_info().cert.get(), handler->request_url().host()); |
if (judgment == net::CertPolicy::ALLOWED) { |
handler->ContinueRequest(); |
@@ -173,7 +172,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
// While AllowCertForHost() executes synchronously on this thread, |
// ContinueRequest() gets posted to a different thread. Calling |
// AllowCertForHost() first ensures deterministic ordering. |
- backend_->AllowCertForHost(handler->ssl_info().cert, |
+ backend_->AllowCertForHost(handler->ssl_info().cert.get(), |
handler->request_url().host()); |
handler->ContinueRequest(); |
} else { |
@@ -182,7 +181,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
// While DenyCertForHost() executes synchronously on this thread, |
// CancelRequest() gets posted to a different thread. Calling |
// DenyCertForHost() first ensures deterministic ordering. |
- backend_->DenyCertForHost(handler->ssl_info().cert, |
+ backend_->DenyCertForHost(handler->ssl_info().cert.get(), |
handler->request_url().host()); |
handler->CancelRequest(); |
} |