summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-12-03 18:50:45 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-12-03 18:50:45 +0000
commit4f99c556d1221778c1e6e38c199dfa93726a4425 (patch)
tree25472000648f99ddb428145fe112fd4b2d769196 /net
parentef2c674e2fadd48ba5299dcbfe5a0d4fc806ee49 (diff)
downloadchromium_src-4f99c556d1221778c1e6e38c199dfa93726a4425.zip
chromium_src-4f99c556d1221778c1e6e38c199dfa93726a4425.tar.gz
chromium_src-4f99c556d1221778c1e6e38c199dfa93726a4425.tar.bz2
nss: fix order of parenthesis.
Thanks to PVS-Studio for finding this. BUG=324701 Review URL: https://codereview.chromium.org/99423002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@238438 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r--net/third_party/nss/patches/channelid.patch2
-rw-r--r--net/third_party/nss/ssl/ssl3con.c2
2 files changed, 2 insertions, 2 deletions
diff --git a/net/third_party/nss/patches/channelid.patch b/net/third_party/nss/patches/channelid.patch
index 46554f9..b2ab19d 100644
--- a/net/third_party/nss/patches/channelid.patch
+++ b/net/third_party/nss/patches/channelid.patch
@@ -151,7 +151,7 @@ diff -pu a/nss/lib/ssl/ssl3con.c b/nss/lib/ssl/ssl3con.c
+ spki = SECKEY_EncodeDERSubjectPublicKeyInfo(ss->ssl3.channelIDPub);
+
+ if (spki->len != sizeof(P256_SPKI_PREFIX) + CHANNEL_ID_PUBLIC_KEY_LENGTH ||
-+ memcmp(spki->data, P256_SPKI_PREFIX, sizeof(P256_SPKI_PREFIX) != 0)) {
++ memcmp(spki->data, P256_SPKI_PREFIX, sizeof(P256_SPKI_PREFIX)) != 0) {
+ PORT_SetError(SSL_ERROR_INVALID_CHANNEL_ID_KEY);
+ rv = SECFailure;
+ goto loser;
diff --git a/net/third_party/nss/ssl/ssl3con.c b/net/third_party/nss/ssl/ssl3con.c
index ddb8232..06992e0 100644
--- a/net/third_party/nss/ssl/ssl3con.c
+++ b/net/third_party/nss/ssl/ssl3con.c
@@ -10712,7 +10712,7 @@ ssl3_SendEncryptedExtensions(sslSocket *ss)
spki = SECKEY_EncodeDERSubjectPublicKeyInfo(ss->ssl3.channelIDPub);
if (spki->len != sizeof(P256_SPKI_PREFIX) + CHANNEL_ID_PUBLIC_KEY_LENGTH ||
- memcmp(spki->data, P256_SPKI_PREFIX, sizeof(P256_SPKI_PREFIX) != 0)) {
+ memcmp(spki->data, P256_SPKI_PREFIX, sizeof(P256_SPKI_PREFIX)) != 0) {
PORT_SetError(SSL_ERROR_INVALID_CHANNEL_ID_KEY);
rv = SECFailure;
goto loser;