summaryrefslogtreecommitdiffstats
path: root/chrome/browser/ssl/ssl_policy.cc
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-17 00:48:48 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-17 00:48:48 +0000
commit9ec84b6f69e5e3933fc4bb3e75ecf2771500a361 (patch)
tree465ac8593ac5698de6f2c11c1f2835657ea73639 /chrome/browser/ssl/ssl_policy.cc
parented7ccca742cd4b87f8aac33f35d6a309e6de7111 (diff)
downloadchromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.zip
chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.tar.gz
chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.tar.bz2
Minor clean-up tasks that were TODO(snej)
Rename Principal->CertPrincipal, Policy->CertPolicy, both of which are merely syntatic fluff. Rename Fingerprint->SHA1Fingerprint, which is more important since those using the fingerprint, such as the unit tests, were truly hardcoded against SHA-1 fingerprints, and if the fingerprint ever changed, wouldn't cause errors until run time. R=wtc BUG=None TEST=Compilers stay green Review URL: http://codereview.chromium.org/2815048 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@52789 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/ssl/ssl_policy.cc')
-rw-r--r--chrome/browser/ssl/ssl_policy.cc4
1 files changed, 2 insertions, 2 deletions
diff --git a/chrome/browser/ssl/ssl_policy.cc b/chrome/browser/ssl/ssl_policy.cc
index 768422f..ea1ff71 100644
--- a/chrome/browser/ssl/ssl_policy.cc
+++ b/chrome/browser/ssl/ssl_policy.cc
@@ -42,11 +42,11 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend)
void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) {
// First we check if we know the policy for this error.
- net::X509Certificate::Policy::Judgment judgment =
+ net::CertPolicy::Judgment judgment =
backend_->QueryPolicy(handler->ssl_info().cert,
handler->request_url().host());
- if (judgment == net::X509Certificate::Policy::ALLOWED) {
+ if (judgment == net::CertPolicy::ALLOWED) {
handler->ContinueRequest();
return;
}