Chromium Code Reviews| Index: net/cert/internal/name_constraints.h |
| diff --git a/net/cert/internal/name_constraints.h b/net/cert/internal/name_constraints.h |
| index 46cb0dade74a34796d7741d572c2c490462ec1aa..d0e49489695ba065db6d00bf664d74b8abd80248 100644 |
| --- a/net/cert/internal/name_constraints.h |
| +++ b/net/cert/internal/name_constraints.h |
| @@ -87,12 +87,13 @@ class NET_EXPORT NameConstraints { |
| // |subject_rdn_sequence| should be the DER-encoded value of the subject's |
| // RDNSequence (not including Sequence tag), and may be an empty ASN.1 |
| // sequence. |subject_alt_name_extnvalue_tlv| should be the extnValue of the |
|
eroman
2016/02/10 17:30:09
Update this line to reflect new variable name.
mattm
2016/02/10 22:48:40
Done.
|
| - // subjectAltName extension (including the OCTET STRING tag & length), or |
| + // subjectAltName extension (not including the OCTET STRING tag & length), or |
| // empty if the cert did not have a subjectAltName extension. |
|
eroman
2016/02/10 17:30:09
This line also needs updating (since that is now c
mattm
2016/02/10 22:48:40
Done.
|
| // Note that this method does not check hostname or IP address in commonName, |
| // which is deprecated (crbug.com/308330). |
| bool IsPermittedCert(const der::Input& subject_rdn_sequence, |
| - const der::Input& subject_alt_name_extnvalue_tlv) const; |
| + bool has_subject_alt_name, |
| + const der::Input& subject_alt_name_tlv) const; |
| // Returns true if the ASCII hostname |name| is permitted. |
| // |name| may be a wildcard hostname (starts with "*."). Eg, "*.bar.com" |