summaryrefslogtreecommitdiffstats
path: root/net/url_request
diff options
context:
space:
mode:
authordimich@chromium.org <dimich@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-08-06 23:09:00 +0000
committerdimich@chromium.org <dimich@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-08-06 23:09:00 +0000
commit9aa1ebb737c8d3410985aff86f2bf3aaf15be4f4 (patch)
treecd82003552ccf38c27c93822c5e7e4fe4f8f6af4 /net/url_request
parenta837f5e323ba9449f8733c5e77e4de42529600e2 (diff)
downloadchromium_src-9aa1ebb737c8d3410985aff86f2bf3aaf15be4f4.zip
chromium_src-9aa1ebb737c8d3410985aff86f2bf3aaf15be4f4.tar.gz
chromium_src-9aa1ebb737c8d3410985aff86f2bf3aaf15be4f4.tar.bz2
Revert 150124 - Implement SHA-256 fingerprint support.
The HTTP-based Public Key Pinning Internet Draft (tools.ietf.org/html/draft-ietf-websec-key-pinning) requires this. Per wtc, give the *Fingeprint* types more meaningful *HashValue* names. Cleaning up lint along the way. This CL reverts 149268, which reverted 149261 the previous version of this CL. It includes a fix to the compile problem that necessitated 149268. BUG=117914 TEST=net_unittests, unit_tests TransportSecurityPersisterTest Review URL: https://chromiumcodereview.appspot.com/10836062 TBR=palmer@chromium.org Review URL: https://chromiumcodereview.appspot.com/10836120 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@150166 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/url_request')
-rw-r--r--net/url_request/url_request_unittest.cc8
1 files changed, 4 insertions, 4 deletions
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
index 3d785e9..0178d37 100644
--- a/net/url_request/url_request_unittest.cc
+++ b/net/url_request/url_request_unittest.cc
@@ -147,7 +147,7 @@ void CheckSSLInfo(const SSLInfo& ssl_info) {
EXPECT_NE(0, cipher_suite);
}
-bool FingerprintsEqual(const HashValueVector& a, const HashValueVector& b) {
+bool FingerprintsEqual(const FingerprintVector& a, const FingerprintVector& b) {
size_t size = a.size();
if (size != b.size())
@@ -550,7 +550,7 @@ class URLRequestTestHTTP : public URLRequestTest {
strlen(expected_data)));
}
- bool DoManyCookiesRequest(int num_cookies) {
+ bool DoManyCookiesRequest(int num_cookies){
TestDelegate d;
URLRequest r(test_server_.GetURL("set-many-cookies?" +
base::IntToString(num_cookies)),
@@ -564,7 +564,7 @@ class URLRequestTestHTTP : public URLRequestTest {
bool is_success = r.status().is_success();
- if (!is_success) {
+ if (!is_success){
// Requests handled by ChromeFrame send a less precise error message,
// ERR_CONNECTION_ABORTED.
EXPECT_TRUE(r.status().error() == ERR_RESPONSE_HEADERS_TOO_BIG ||
@@ -1473,7 +1473,7 @@ class TestSSLConfigService : public SSLConfigService {
// This the fingerprint of the "Testing CA" certificate used by the testserver.
// See net/data/ssl/certificates/ocsp-test-root.pem.
-static const SHA1HashValue kOCSPTestCertFingerprint =
+static const SHA1Fingerprint kOCSPTestCertFingerprint =
{ { 0xf1, 0xad, 0xf6, 0xce, 0x42, 0xac, 0xe7, 0xb4, 0xf4, 0x24,
0xdb, 0x1a, 0xf7, 0xa0, 0x9f, 0x09, 0xa1, 0xea, 0xf1, 0x5c } };