summaryrefslogtreecommitdiffstats
path: root/chrome/browser/ssl/ssl_host_state.h
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-17 00:48:48 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-17 00:48:48 +0000
commit9ec84b6f69e5e3933fc4bb3e75ecf2771500a361 (patch)
tree465ac8593ac5698de6f2c11c1f2835657ea73639 /chrome/browser/ssl/ssl_host_state.h
parented7ccca742cd4b87f8aac33f35d6a309e6de7111 (diff)
downloadchromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.zip
chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.tar.gz
chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.tar.bz2
Minor clean-up tasks that were TODO(snej)
Rename Principal->CertPrincipal, Policy->CertPolicy, both of which are merely syntatic fluff. Rename Fingerprint->SHA1Fingerprint, which is more important since those using the fingerprint, such as the unit tests, were truly hardcoded against SHA-1 fingerprints, and if the fingerprint ever changed, wouldn't cause errors until run time. R=wtc BUG=None TEST=Compilers stay green Review URL: http://codereview.chromium.org/2815048 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@52789 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/ssl/ssl_host_state.h')
-rw-r--r--chrome/browser/ssl/ssl_host_state.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/chrome/browser/ssl/ssl_host_state.h b/chrome/browser/ssl/ssl_host_state.h
index 3c87900..b35cb36 100644
--- a/chrome/browser/ssl/ssl_host_state.h
+++ b/chrome/browser/ssl/ssl_host_state.h
@@ -40,7 +40,7 @@ class SSLHostState : public NonThreadSafe {
void AllowCertForHost(net::X509Certificate* cert, const std::string& host);
// Queries whether |cert| is allowed or denied for |host|.
- net::X509Certificate::Policy::Judgment QueryPolicy(
+ net::CertPolicy::Judgment QueryPolicy(
net::X509Certificate* cert, const std::string& host);
private:
@@ -54,7 +54,7 @@ class SSLHostState : public NonThreadSafe {
std::set<BrokenHostEntry> ran_insecure_content_hosts_;
// Certificate policies for each host.
- std::map<std::string, net::X509Certificate::Policy> cert_policy_for_host_;
+ std::map<std::string, net::CertPolicy> cert_policy_for_host_;
DISALLOW_COPY_AND_ASSIGN(SSLHostState);
};