| Index: net/base/dnssec_chain_verifier.cc
|
| diff --git a/net/base/dnssec_chain_verifier.cc b/net/base/dnssec_chain_verifier.cc
|
| index e6d31eef8db5cc9c1dd992a95d918d8049397200..6e6836549c2069fd51eadc78a3a2afffcbbbe9f3 100644
|
| --- a/net/base/dnssec_chain_verifier.cc
|
| +++ b/net/base/dnssec_chain_verifier.cc
|
| @@ -489,7 +489,7 @@ bool DNSSECChainVerifier::ReadDNSKEYs(std::vector<base::StringPiece>* out,
|
| base::StringPiece key;
|
| if (!VariableLength16(&key))
|
| return false;
|
| - if (key.size() == 0) {
|
| + if (key.empty()) {
|
| if (!is_root)
|
| return false;
|
| key = base::StringPiece(reinterpret_cast<const char*>(kRootKey),
|
| @@ -597,7 +597,7 @@ DNSSECChainVerifier::Error DNSSECChainVerifier::EnterZone(
|
| if (!ReadAheadKey(&key, entry_key))
|
| return BAD_DATA;
|
|
|
| - if (zone.size() == 1 && key.size() == 0) {
|
| + if (zone.size() == 1 && key.empty()) {
|
| // If a key is omitted in the root zone then it's the root key.
|
| key = base::StringPiece(reinterpret_cast<const char*>(kRootKey),
|
| sizeof(kRootKey));
|
| @@ -609,7 +609,7 @@ DNSSECChainVerifier::Error DNSSECChainVerifier::EnterZone(
|
| if (!ReadDNSKEYs(&dnskeys, zone.size() == 1))
|
| return BAD_DATA;
|
|
|
| - if (sig.size() == 0) {
|
| + if (sig.empty()) {
|
| // An omitted signature on the keys means that only the entry key is used.
|
| if (dnskeys.size() > 1 || entry_key != 0)
|
| return BAD_DATA;
|
|
|