Index: net/cert/x509_util_nss_unittest.cc |
diff --git a/net/cert/x509_util_nss_unittest.cc b/net/cert/x509_util_nss_unittest.cc |
index 0ad5ecddfaa99ba0600093d41539f64f93402622..40a8d9c7e931589671690a19befe35b22c764a66 100644 |
--- a/net/cert/x509_util_nss_unittest.cc |
+++ b/net/cert/x509_util_nss_unittest.cc |
@@ -76,8 +76,8 @@ void VerifyCertificateSignature(const std::string& der_cert, |
} |
#endif // !defined(OS_WIN) && !defined(OS_MACOSX) |
-void VerifyDomainBoundCert(const std::string& domain, |
- const std::string& der_cert) { |
+void VerifyChannelID(const std::string& domain, |
+ const std::string& der_cert) { |
// Origin Bound Cert OID. |
static const char oid_string[] = "1.3.6.1.4.1.11129.2.1.6"; |
@@ -143,21 +143,21 @@ void VerifyDomainBoundCert(const std::string& domain, |
// This test creates a domain-bound cert and an EC private key and |
// then verifies the content of the certificate. |
-TEST(X509UtilNSSTest, CreateKeyAndDomainBoundCertEC) { |
+TEST(X509UtilNSSTest, CreateKeyAndChannelIDEC) { |
// Create a sample ASCII weborigin. |
std::string domain = "weborigin.com"; |
base::Time now = base::Time::Now(); |
scoped_ptr<crypto::ECPrivateKey> private_key; |
std::string der_cert; |
- ASSERT_TRUE(x509_util::CreateKeyAndDomainBoundCertEC( |
+ ASSERT_TRUE(x509_util::CreateKeyAndChannelIDEC( |
domain, 1, |
now, |
now + base::TimeDelta::FromDays(1), |
&private_key, |
&der_cert)); |
- VerifyDomainBoundCert(domain, der_cert); |
+ VerifyChannelID(domain, der_cert); |
#if !defined(OS_WIN) && !defined(OS_MACOSX) |
// signature_verifier_win and signature_verifier_mac can't handle EC certs. |