Index: net/cert/x509_util.cc |
diff --git a/net/cert/x509_util.cc b/net/cert/x509_util.cc |
index cc0a2c583bf343bc27a492c94d387e21eeede1b6..6ba5909ce194133edab6839ee13dffd53023b20b 100644 |
--- a/net/cert/x509_util.cc |
+++ b/net/cert/x509_util.cc |
@@ -19,7 +19,7 @@ namespace x509_util { |
static const uint16 kRSAKeyLength = 1024; |
// Certificates made by CreateKeyAndSelfSignedCert and |
-// CreateKeyAndDomainBoundCertEC will be signed using this digest algorithm. |
+// CreateKeyAndChannelIDEC will be signed using this digest algorithm. |
static const DigestAlgorithm kSignatureDigestAlgorithm = DIGEST_SHA256; |
ClientCertSorter::ClientCertSorter() : now_(base::Time::Now()) {} |
@@ -55,7 +55,7 @@ bool ClientCertSorter::operator()( |
return a_intermediates.size() < b_intermediates.size(); |
} |
-bool CreateKeyAndDomainBoundCertEC(const std::string& domain, |
+bool CreateKeyAndChannelIDEC(const std::string& domain, |
uint32 serial_number, |
base::Time not_valid_before, |
base::Time not_valid_after, |
@@ -65,13 +65,13 @@ bool CreateKeyAndDomainBoundCertEC(const std::string& domain, |
if (!new_key.get()) |
return false; |
- bool success = CreateDomainBoundCertEC(new_key.get(), |
- kSignatureDigestAlgorithm, |
- domain, |
- serial_number, |
- not_valid_before, |
- not_valid_after, |
- der_cert); |
+ bool success = CreateChannelIDEC(new_key.get(), |
+ kSignatureDigestAlgorithm, |
+ domain, |
+ serial_number, |
+ not_valid_before, |
+ not_valid_after, |
+ der_cert); |
if (success) |
key->reset(new_key.release()); |