| Index: extensions/browser/api/cast_channel/cast_auth_util.cc
|
| diff --git a/extensions/browser/api/cast_channel/cast_auth_util.cc b/extensions/browser/api/cast_channel/cast_auth_util.cc
|
| index 0e5c38844cbe1e84e1e8210a4c4bbd56a9ac34ea..451058b03581e12b9f2ddaa05787490161588138 100644
|
| --- a/extensions/browser/api/cast_channel/cast_auth_util.cc
|
| +++ b/extensions/browser/api/cast_channel/cast_auth_util.cc
|
| @@ -148,13 +148,12 @@
|
| response.intermediate_certificate().end());
|
|
|
| // Use the current time when checking certificate validity.
|
| - base::Time now = base::Time::Now();
|
| + base::Time::Exploded now;
|
| + base::Time::Now().UTCExplode(&now);
|
|
|
| - // CRL should not be enforced until it is served.
|
| cast_crypto::CastDeviceCertPolicy device_policy;
|
| - if (!cast_crypto::VerifyDeviceCert(
|
| - cert_chain, now, &verification_context, &device_policy, nullptr,
|
| - cast_certificate::CRLPolicy::CRL_OPTIONAL)) {
|
| + if (!cast_crypto::VerifyDeviceCert(cert_chain, now, &verification_context,
|
| + &device_policy)) {
|
| // TODO(eroman): The error information was lost; this error is ambiguous.
|
| return AuthResult("Failed verifying cast device certificate",
|
| AuthResult::ERROR_CERT_NOT_SIGNED_BY_TRUSTED_CA);
|
|
|