| Index: net/base/x509_certificate_win.cc
|
| diff --git a/net/base/x509_certificate_win.cc b/net/base/x509_certificate_win.cc
|
| index 23f423067a501c403c1bfb4de09cc7c9f8eb2b60..901c0a636f9360f0a1cb2a60738040d2996f03b9 100644
|
| --- a/net/base/x509_certificate_win.cc
|
| +++ b/net/base/x509_certificate_win.cc
|
| @@ -377,7 +377,7 @@ bool ContainsPolicy(const CERT_POLICIES_INFO* policies_info,
|
| // Helper function to parse a principal from a WinInet description of that
|
| // principal.
|
| void ParsePrincipal(const std::string& description,
|
| - X509Certificate::Principal* principal) {
|
| + CertPrincipal* principal) {
|
| // The description of the principal is a string with each LDAP value on
|
| // a separate line.
|
| const std::string kDelimiters("\r\n");
|
| @@ -722,7 +722,7 @@ bool X509Certificate::VerifyEV() const {
|
|
|
| // Look up the EV policy OID of the root CA.
|
| PCCERT_CONTEXT root_cert = element[num_elements - 1]->pCertContext;
|
| - Fingerprint fingerprint = CalculateFingerprint(root_cert);
|
| + SHA1Fingerprint fingerprint = CalculateFingerprint(root_cert);
|
| const char* ev_policy_oid = NULL;
|
| if (!metadata->GetPolicyOID(fingerprint, &ev_policy_oid))
|
| return false;
|
| @@ -766,13 +766,13 @@ void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) {
|
| }
|
|
|
| // static
|
| -X509Certificate::Fingerprint X509Certificate::CalculateFingerprint(
|
| +SHA1Fingerprint X509Certificate::CalculateFingerprint(
|
| OSCertHandle cert) {
|
| DCHECK(NULL != cert->pbCertEncoded);
|
| DCHECK(0 != cert->cbCertEncoded);
|
|
|
| BOOL rv;
|
| - Fingerprint sha1;
|
| + SHA1Fingerprint sha1;
|
| DWORD sha1_size = sizeof(sha1.data);
|
| rv = CryptHashCertificate(NULL, CALG_SHA1, 0, cert->pbCertEncoded,
|
| cert->cbCertEncoded, sha1.data, &sha1_size);
|
|
|