| Index: net/cert/internal/name_constraints.h
|
| diff --git a/net/cert/internal/name_constraints.h b/net/cert/internal/name_constraints.h
|
| index 46cb0dade74a34796d7741d572c2c490462ec1aa..ed05de0417beef0397971c4c5fd5e34c71f7227a 100644
|
| --- a/net/cert/internal/name_constraints.h
|
| +++ b/net/cert/internal/name_constraints.h
|
| @@ -86,13 +86,15 @@ class NET_EXPORT NameConstraints {
|
| // Tests if a certificate is allowed by the name constraints.
|
| // |subject_rdn_sequence| should be the DER-encoded value of the subject's
|
| // RDNSequence (not including Sequence tag), and may be an empty ASN.1
|
| - // sequence. |subject_alt_name_extnvalue_tlv| should be the extnValue of the
|
| - // subjectAltName extension (including the OCTET STRING tag & length), or
|
| - // empty if the cert did not have a subjectAltName extension.
|
| + // sequence. |subject_alt_name_tlv| should be the extnValue of the
|
| + // subjectAltName extension (not including the OCTET STRING tag & length). If
|
| + // the cert did not have a subjectAltName extension, |has_subject_alt_name|
|
| + // should be false and |subject_alt_name_tlv| should be empty.
|
| // Note that this method does not check hostname or IP address in commonName,
|
| // which is deprecated (crbug.com/308330).
|
| bool IsPermittedCert(const der::Input& subject_rdn_sequence,
|
| - const der::Input& subject_alt_name_extnvalue_tlv) const;
|
| + bool has_subject_alt_name,
|
| + const der::Input& subject_alt_name_tlv) const;
|
|
|
| // Returns true if the ASCII hostname |name| is permitted.
|
| // |name| may be a wildcard hostname (starts with "*."). Eg, "*.bar.com"
|
|
|