Index: net/cert/x509_util_openssl_unittest.cc |
diff --git a/net/cert/x509_util_openssl_unittest.cc b/net/cert/x509_util_openssl_unittest.cc |
index c99f811705dbd373e1b7163c1aae4b4f80e9d769..4b267e88edf24d2486741904f760d8698b8b2d88 100644 |
--- a/net/cert/x509_util_openssl_unittest.cc |
+++ b/net/cert/x509_util_openssl_unittest.cc |
@@ -42,7 +42,7 @@ void VerifyCertificateSignature(const std::string& der_cert, |
// Verify the attributes of a domain-bound certificate. |
// |domain| is the bound domain name. |
// |der_cert| is the DER-encoded X.509 certificate. |
-void VerifyDomainBoundCert(const std::string& domain, |
+void VerifyChannelID(const std::string& domain, |
const std::string& der_cert) { |
wtc
2014/07/01 19:50:52
Fix the indentation.
Ryan Hamilton
2014/07/21 19:12:08
Done.
|
// Origin Bound Cert OID. |
static const char oid_string[] = "1.3.6.1.4.1.11129.2.1.6"; |
@@ -112,7 +112,7 @@ TEST(X509UtilOpenSSLTest, IsSupportedValidityRange) { |
EXPECT_FALSE(x509_util::IsSupportedValidityRange(too_late, too_late)); |
} |
-TEST(X509UtilOpenSSLTest, CreateDomainBoundCertEC) { |
+TEST(X509UtilOpenSSLTest, CreateChannelIDEC) { |
// Create a sample ASCII weborigin. |
std::string domain = "weborigin.com"; |
base::Time now = base::Time::Now(); |
@@ -121,7 +121,7 @@ TEST(X509UtilOpenSSLTest, CreateDomainBoundCertEC) { |
crypto::ECPrivateKey::Create()); |
std::string der_cert; |
ASSERT_TRUE( |
- x509_util::CreateDomainBoundCertEC(private_key.get(), |
+ x509_util::CreateChannelIDEC(private_key.get(), |
x509_util::DIGEST_SHA1, |
domain, |
1, |
@@ -129,7 +129,7 @@ TEST(X509UtilOpenSSLTest, CreateDomainBoundCertEC) { |
now + base::TimeDelta::FromDays(1), |
&der_cert)); |
wtc
2014/07/01 19:50:52
Fix the indentation of the arguments.
Ryan Hamilton
2014/07/21 19:12:08
Done.
|
- VerifyDomainBoundCert(domain, der_cert); |
+ VerifyChannelID(domain, der_cert); |
// signature_verifier_win and signature_verifier_mac can't handle EC certs. |
std::vector<uint8> spki; |