| Index: net/cert/x509_util_nss.cc
|
| diff --git a/net/cert/x509_util_nss.cc b/net/cert/x509_util_nss.cc
|
| index beed9a1a984d27fd0dc500ce91f090ba0cb85331..b138bd405af42ed79ea51220bed302de41b2c5a9 100644
|
| --- a/net/cert/x509_util_nss.cc
|
| +++ b/net/cert/x509_util_nss.cc
|
| @@ -33,14 +33,14 @@ namespace net {
|
|
|
| namespace {
|
|
|
| -class DomainBoundCertOIDWrapper {
|
| +class ChannelIDOIDWrapper {
|
| public:
|
| - static DomainBoundCertOIDWrapper* GetInstance() {
|
| + static ChannelIDOIDWrapper* GetInstance() {
|
| // Instantiated as a leaky singleton to allow the singleton to be
|
| // constructed on a worker thead that is not joined when a process
|
| // shuts down.
|
| - return Singleton<DomainBoundCertOIDWrapper,
|
| - LeakySingletonTraits<DomainBoundCertOIDWrapper> >::get();
|
| + return Singleton<ChannelIDOIDWrapper,
|
| + LeakySingletonTraits<ChannelIDOIDWrapper> >::get();
|
| }
|
|
|
| SECOidTag domain_bound_cert_oid_tag() const {
|
| @@ -48,16 +48,16 @@ class DomainBoundCertOIDWrapper {
|
| }
|
|
|
| private:
|
| - friend struct DefaultSingletonTraits<DomainBoundCertOIDWrapper>;
|
| + friend struct DefaultSingletonTraits<ChannelIDOIDWrapper>;
|
|
|
| - DomainBoundCertOIDWrapper();
|
| + ChannelIDOIDWrapper();
|
|
|
| SECOidTag domain_bound_cert_oid_tag_;
|
|
|
| - DISALLOW_COPY_AND_ASSIGN(DomainBoundCertOIDWrapper);
|
| + DISALLOW_COPY_AND_ASSIGN(ChannelIDOIDWrapper);
|
| };
|
|
|
| -DomainBoundCertOIDWrapper::DomainBoundCertOIDWrapper()
|
| +ChannelIDOIDWrapper::ChannelIDOIDWrapper()
|
| : domain_bound_cert_oid_tag_(SEC_OID_UNKNOWN) {
|
| // 1.3.6.1.4.1.11129.2.1.6
|
| // (iso.org.dod.internet.private.enterprises.google.googleSecurity.
|
| @@ -291,13 +291,13 @@ bool IsSupportedValidityRange(base::Time not_valid_before,
|
| return true;
|
| }
|
|
|
| -bool CreateDomainBoundCertEC(crypto::ECPrivateKey* key,
|
| - DigestAlgorithm alg,
|
| - const std::string& domain,
|
| - uint32 serial_number,
|
| - base::Time not_valid_before,
|
| - base::Time not_valid_after,
|
| - std::string* der_cert) {
|
| +bool CreateChannelIDEC(crypto::ECPrivateKey* key,
|
| + DigestAlgorithm alg,
|
| + const std::string& domain,
|
| + uint32 serial_number,
|
| + base::Time not_valid_before,
|
| + base::Time not_valid_after,
|
| + std::string* der_cert) {
|
| DCHECK(key);
|
|
|
| CERTCertificate* cert = CreateCertificate(key->public_key(),
|
| @@ -338,7 +338,7 @@ bool CreateDomainBoundCertEC(crypto::ECPrivateKey* key,
|
| // Add the extension to the opaque handle
|
| if (CERT_AddExtension(
|
| cert_handle,
|
| - DomainBoundCertOIDWrapper::GetInstance()->domain_bound_cert_oid_tag(),
|
| + ChannelIDOIDWrapper::GetInstance()->domain_bound_cert_oid_tag(),
|
| asn1_domain_string,
|
| PR_TRUE,
|
| PR_TRUE) != SECSuccess){
|
|
|