| Index: extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| diff --git a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| index 9a0d067a72f6ae80ecab358fa6e58bdcc0ec07bd..2d5bd143dcb1698a6c37f27f8d54982aa9dbdada 100644
|
| --- a/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| +++ b/extensions/browser/api/cast_channel/cast_auth_util_nss.cc
|
| @@ -30,10 +30,10 @@ typedef scoped_ptr<
|
| ScopedCERTCertificate;
|
|
|
| // Authenticates the given credentials:
|
| -// 1. |signature| verification of |data| using |certificate|.
|
| +// 1. |signature| verification of |peer_cert| using |certificate|.
|
| // 2. |certificate| is signed by a trusted CA.
|
| AuthResult VerifyCredentials(const AuthResponse& response,
|
| - const std::string& data) {
|
| + const std::string& peer_cert) {
|
| const std::string kErrorPrefix("Failed to verify credentials: ");
|
| const std::string& certificate = response.client_auth_certificate();
|
| const std::string& signature = response.signature();
|
| @@ -98,7 +98,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
|
|
| VLOG(1) << "Cert signed by trusted CA";
|
|
|
| - // Verify that the |signature| matches |data|.
|
| + // Verify that the |signature| matches |peer_cert|.
|
| crypto::ScopedSECKEYPublicKey public_key(CERT_ExtractPublicKey(cert.get()));
|
| if (!public_key.get()) {
|
| return AuthResult::CreateWithNSSError(
|
| @@ -112,7 +112,7 @@ AuthResult VerifyCredentials(const AuthResponse& response,
|
| const_cast<char*>(signature.data()));
|
| signature_item.len = signature.length();
|
| verified = VFY_VerifyDataDirect(
|
| - reinterpret_cast<unsigned char*>(const_cast<char*>(data.data())),
|
| + reinterpret_cast<unsigned char*>(const_cast<char*>(peer_cert.data())),
|
| data.size(),
|
| public_key.get(),
|
| &signature_item,
|
|
|