summaryrefslogtreecommitdiffstats
path: root/net/base/ssl_config_service.cc
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-11-10 22:13:46 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-11-10 22:13:46 +0000
commit2d6e778368680b39f71e000ee03ce3430b96507a (patch)
tree1ee8495bd25760f5e9cd471594dc413190351b33 /net/base/ssl_config_service.cc
parentbb339ae418909bc5325b1695f6b96bcb9d5370e7 (diff)
downloadchromium_src-2d6e778368680b39f71e000ee03ce3430b96507a.zip
chromium_src-2d6e778368680b39f71e000ee03ce3430b96507a.tar.gz
chromium_src-2d6e778368680b39f71e000ee03ce3430b96507a.tar.bz2
net: assorted changes needed for Snap Start tests.
In IsAllowedBadCert, the pointer compare doesn't always work. Creating a certificate by X509Certificate::CreateFromBytes and putting it in the allowed bad list doesn't match the same certificate from a server. InvalidateSessionIfBadCertificate: I'm sure that there's history here that I don't know, so please review carefully. In order to test resumption against a server with a test certificate we need to avoid destroying the session. ClearSessionCache, AdoptSocket: only for testing BUG=none TEST=none http://codereview.chromium.org/4558004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@65713 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/ssl_config_service.cc')
-rw-r--r--net/base/ssl_config_service.cc2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/base/ssl_config_service.cc b/net/base/ssl_config_service.cc
index cdfa4d3..d372138 100644
--- a/net/base/ssl_config_service.cc
+++ b/net/base/ssl_config_service.cc
@@ -31,7 +31,7 @@ SSLConfig::~SSLConfig() {
bool SSLConfig::IsAllowedBadCert(X509Certificate* cert) const {
for (size_t i = 0; i < allowed_bad_certs.size(); ++i) {
- if (cert == allowed_bad_certs[i].cert)
+ if (cert->Equals(allowed_bad_certs[i].cert))
return true;
}
return false;