Index: net/cert/internal/name_constraints.h |
diff --git a/net/cert/internal/name_constraints.h b/net/cert/internal/name_constraints.h |
index 46cb0dade74a34796d7741d572c2c490462ec1aa..d0e49489695ba065db6d00bf664d74b8abd80248 100644 |
--- a/net/cert/internal/name_constraints.h |
+++ b/net/cert/internal/name_constraints.h |
@@ -87,12 +87,13 @@ class NET_EXPORT NameConstraints { |
// |subject_rdn_sequence| should be the DER-encoded value of the subject's |
// RDNSequence (not including Sequence tag), and may be an empty ASN.1 |
// sequence. |subject_alt_name_extnvalue_tlv| should be the extnValue of the |
eroman
2016/02/10 17:30:09
Update this line to reflect new variable name.
mattm
2016/02/10 22:48:40
Done.
|
- // subjectAltName extension (including the OCTET STRING tag & length), or |
+ // subjectAltName extension (not including the OCTET STRING tag & length), or |
// empty if the cert did not have a subjectAltName extension. |
eroman
2016/02/10 17:30:09
This line also needs updating (since that is now c
mattm
2016/02/10 22:48:40
Done.
|
// Note that this method does not check hostname or IP address in commonName, |
// which is deprecated (crbug.com/308330). |
bool IsPermittedCert(const der::Input& subject_rdn_sequence, |
- const der::Input& subject_alt_name_extnvalue_tlv) const; |
+ bool has_subject_alt_name, |
+ const der::Input& subject_alt_name_tlv) const; |
// Returns true if the ASCII hostname |name| is permitted. |
// |name| may be a wildcard hostname (starts with "*."). Eg, "*.bar.com" |