Index: net/cert/internal/parsed_certificate.cc |
diff --git a/net/cert/internal/parsed_certificate.cc b/net/cert/internal/parsed_certificate.cc |
index 6d1a071bce53e0bf04714caebd4d7eb822c2c095..8b990464205c9a22e8d6e52260618c705e58f072 100644 |
--- a/net/cert/internal/parsed_certificate.cc |
+++ b/net/cert/internal/parsed_certificate.cc |
@@ -104,7 +104,7 @@ scoped_refptr<ParsedCertificate> ParsedCertificate::CreateInternal( |
} |
// Attempt to parse the signature algorithm contained in the Certificate. |
- // Do not give up on failure here, since SignatureAlgorithm::CreateFromDer |
+ // Do not give up on failure here, since SignatureAlgorithm::Create |
// will fail on valid but unsupported signature algorithms. |
// TODO(mattm): should distinguish between unsupported algorithms and parsing |
// errors. |
@@ -155,8 +155,8 @@ scoped_refptr<ParsedCertificate> ParsedCertificate::CreateInternal( |
&result->subject_alt_names_extension_)) { |
// RFC 5280 section 4.2.1.6: |
// SubjectAltName ::= GeneralNames |
- result->subject_alt_names_ = GeneralNames::CreateFromDer( |
- result->subject_alt_names_extension_.value); |
+ result->subject_alt_names_ = |
+ GeneralNames::Create(result->subject_alt_names_extension_.value); |
if (!result->subject_alt_names_) |
return nullptr; |
// RFC 5280 section 4.1.2.6: |
@@ -174,7 +174,7 @@ scoped_refptr<ParsedCertificate> ParsedCertificate::CreateInternal( |
if (ConsumeExtension(NameConstraintsOid(), &result->unparsed_extensions_, |
&extension)) { |
result->name_constraints_ = |
- NameConstraints::CreateFromDer(extension.value, extension.critical); |
+ NameConstraints::Create(extension.value, extension.critical); |
if (!result->name_constraints_) |
return nullptr; |
} |