diff options
author | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-04-02 21:02:15 +0000 |
---|---|---|
committer | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-04-02 21:02:15 +0000 |
commit | cca8f4ae3d30e5fac962ee26538a6b2a06a2698c (patch) | |
tree | 0fe277334c557d81b50bf1008ddf12bbb1432465 /net/base/keygen_handler_win.cc | |
parent | bb64b5128f1641cba1e802ae7d0768be955ffdc5 (diff) | |
download | chromium_src-cca8f4ae3d30e5fac962ee26538a6b2a06a2698c.zip chromium_src-cca8f4ae3d30e5fac962ee26538a6b2a06a2698c.tar.gz chromium_src-cca8f4ae3d30e5fac962ee26538a6b2a06a2698c.tar.bz2 |
We should delete the underlying persistent public key only
when we cannot sign the challenge. This matches what Mozilla
does.
Fix nits.
R=snej
BUG=148
TEST=No compilation errors.
Review URL: http://codereview.chromium.org/1535016
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@43524 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/keygen_handler_win.cc')
-rw-r--r-- | net/base/keygen_handler_win.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/base/keygen_handler_win.cc b/net/base/keygen_handler_win.cc index 7a664b9..d6e5402 100644 --- a/net/base/keygen_handler_win.cc +++ b/net/base/keygen_handler_win.cc @@ -85,7 +85,7 @@ bool EncodeChallenge(const std::string& challenge, std::vector<BYTE>* output) { CERT_NAME_VALUE challenge_nv; challenge_nv.dwValueType = CERT_RDN_IA5_STRING; challenge_nv.Value.pbData = const_cast<BYTE*>( - reinterpret_cast<const BYTE*>(challenge.c_str())); + reinterpret_cast<const BYTE*>(challenge.data())); challenge_nv.Value.cbData = challenge.size(); return EncodeAndAppendType(X509_ANY_STRING, &challenge_nv, output); |