| Index: chrome/browser/net/sqlite_server_bound_cert_store.cc
|
| diff --git a/chrome/browser/net/sqlite_server_bound_cert_store.cc b/chrome/browser/net/sqlite_server_bound_cert_store.cc
|
| index 69dea95c36f4dd7e4b4f156e15ad7d6a6c2340b4..e4a35e932a12b95917a3cd0d28ce01b8eaecd196 100644
|
| --- a/chrome/browser/net/sqlite_server_bound_cert_store.cc
|
| +++ b/chrome/browser/net/sqlite_server_bound_cert_store.cc
|
| @@ -283,7 +283,7 @@ bool SQLiteServerBoundCertStore::Backend::EnsureDatabaseVersion() {
|
| cert_from_db.data(), cert_from_db.size()));
|
| if (cert) {
|
| if (cur_version == 2) {
|
| - update_expires_smt.Reset();
|
| + update_expires_smt.Reset(true);
|
| update_expires_smt.BindInt64(0,
|
| cert->valid_expiry().ToInternalValue());
|
| update_expires_smt.BindString(1, origin);
|
| @@ -294,7 +294,7 @@ bool SQLiteServerBoundCertStore::Backend::EnsureDatabaseVersion() {
|
| }
|
| }
|
|
|
| - update_creation_smt.Reset();
|
| + update_creation_smt.Reset(true);
|
| update_creation_smt.BindInt64(0, cert->valid_start().ToInternalValue());
|
| update_creation_smt.BindString(1, origin);
|
| if (!update_creation_smt.Run()) {
|
| @@ -406,7 +406,7 @@ void SQLiteServerBoundCertStore::Backend::Commit() {
|
| scoped_ptr<PendingOperation> po(*it);
|
| switch (po->op()) {
|
| case PendingOperation::CERT_ADD: {
|
| - add_smt.Reset();
|
| + add_smt.Reset(true);
|
| add_smt.BindString(0, po->cert().server_identifier());
|
| const std::string& private_key = po->cert().private_key();
|
| add_smt.BindBlob(1, private_key.data(), private_key.size());
|
| @@ -420,7 +420,7 @@ void SQLiteServerBoundCertStore::Backend::Commit() {
|
| break;
|
| }
|
| case PendingOperation::CERT_DELETE:
|
| - del_smt.Reset();
|
| + del_smt.Reset(true);
|
| del_smt.BindString(0, po->cert().server_identifier());
|
| if (!del_smt.Run())
|
| NOTREACHED() << "Could not delete a server bound cert from the DB.";
|
|
|