diff options
author | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-07-17 00:48:48 +0000 |
---|---|---|
committer | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-07-17 00:48:48 +0000 |
commit | 9ec84b6f69e5e3933fc4bb3e75ecf2771500a361 (patch) | |
tree | 465ac8593ac5698de6f2c11c1f2835657ea73639 /chrome/browser/ssl/ssl_policy.cc | |
parent | ed7ccca742cd4b87f8aac33f35d6a309e6de7111 (diff) | |
download | chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.zip chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.tar.gz chromium_src-9ec84b6f69e5e3933fc4bb3e75ecf2771500a361.tar.bz2 |
Minor clean-up tasks that were TODO(snej)
Rename Principal->CertPrincipal, Policy->CertPolicy, both of which are merely syntatic fluff.
Rename Fingerprint->SHA1Fingerprint, which is more important since those using the fingerprint, such as the unit tests, were truly hardcoded against SHA-1 fingerprints, and if the fingerprint ever changed, wouldn't cause errors until run time.
R=wtc
BUG=None
TEST=Compilers stay green
Review URL: http://codereview.chromium.org/2815048
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@52789 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/ssl/ssl_policy.cc')
-rw-r--r-- | chrome/browser/ssl/ssl_policy.cc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/chrome/browser/ssl/ssl_policy.cc b/chrome/browser/ssl/ssl_policy.cc index 768422f..ea1ff71 100644 --- a/chrome/browser/ssl/ssl_policy.cc +++ b/chrome/browser/ssl/ssl_policy.cc @@ -42,11 +42,11 @@ SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { // First we check if we know the policy for this error. - net::X509Certificate::Policy::Judgment judgment = + net::CertPolicy::Judgment judgment = backend_->QueryPolicy(handler->ssl_info().cert, handler->request_url().host()); - if (judgment == net::X509Certificate::Policy::ALLOWED) { + if (judgment == net::CertPolicy::ALLOWED) { handler->ContinueRequest(); return; } |