Index: net/cert/x509_util.cc |
diff --git a/net/cert/x509_util.cc b/net/cert/x509_util.cc |
index cc0a2c583bf343bc27a492c94d387e21eeede1b6..c03edde6e935b42feb9c4464329850c8f9cb14cc 100644 |
--- a/net/cert/x509_util.cc |
+++ b/net/cert/x509_util.cc |
@@ -19,7 +19,7 @@ namespace x509_util { |
static const uint16 kRSAKeyLength = 1024; |
// Certificates made by CreateKeyAndSelfSignedCert and |
-// CreateKeyAndDomainBoundCertEC will be signed using this digest algorithm. |
+// CreateKeyAndChannelIDEC will be signed using this digest algorithm. |
static const DigestAlgorithm kSignatureDigestAlgorithm = DIGEST_SHA256; |
ClientCertSorter::ClientCertSorter() : now_(base::Time::Now()) {} |
@@ -55,7 +55,7 @@ bool ClientCertSorter::operator()( |
return a_intermediates.size() < b_intermediates.size(); |
} |
-bool CreateKeyAndDomainBoundCertEC(const std::string& domain, |
+bool CreateKeyAndChannelIDEC(const std::string& domain, |
uint32 serial_number, |
base::Time not_valid_before, |
base::Time not_valid_after, |
@@ -65,7 +65,7 @@ bool CreateKeyAndDomainBoundCertEC(const std::string& domain, |
if (!new_key.get()) |
return false; |
- bool success = CreateDomainBoundCertEC(new_key.get(), |
+ bool success = CreateChannelIDEC(new_key.get(), |
kSignatureDigestAlgorithm, |
domain, |
serial_number, |