| Index: content/browser/ssl/ssl_policy.cc
|
| diff --git a/content/browser/ssl/ssl_policy.cc b/content/browser/ssl/ssl_policy.cc
|
| index 1b9d60c9acd2644c296e6022e5f599f8acc96c27..c425fd9326ee46e5e45eef09b46707309fb8b3b3 100644
|
| --- a/content/browser/ssl/ssl_policy.cc
|
| +++ b/content/browser/ssl/ssl_policy.cc
|
| @@ -44,9 +44,8 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend)
|
|
|
| void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) {
|
| // First we check if we know the policy for this error.
|
| - net::CertPolicy::Judgment judgment =
|
| - backend_->QueryPolicy(handler->ssl_info().cert,
|
| - handler->request_url().host());
|
| + net::CertPolicy::Judgment judgment = backend_->QueryPolicy(
|
| + handler->ssl_info().cert.get(), handler->request_url().host());
|
|
|
| if (judgment == net::CertPolicy::ALLOWED) {
|
| handler->ContinueRequest();
|
| @@ -173,7 +172,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler,
|
| // While AllowCertForHost() executes synchronously on this thread,
|
| // ContinueRequest() gets posted to a different thread. Calling
|
| // AllowCertForHost() first ensures deterministic ordering.
|
| - backend_->AllowCertForHost(handler->ssl_info().cert,
|
| + backend_->AllowCertForHost(handler->ssl_info().cert.get(),
|
| handler->request_url().host());
|
| handler->ContinueRequest();
|
| } else {
|
| @@ -182,7 +181,7 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler,
|
| // While DenyCertForHost() executes synchronously on this thread,
|
| // CancelRequest() gets posted to a different thread. Calling
|
| // DenyCertForHost() first ensures deterministic ordering.
|
| - backend_->DenyCertForHost(handler->ssl_info().cert,
|
| + backend_->DenyCertForHost(handler->ssl_info().cert.get(),
|
| handler->request_url().host());
|
| handler->CancelRequest();
|
| }
|
|
|