summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authordavidben <davidben@chromium.org>2015-06-08 16:01:19 -0700
committerCommit bot <commit-bot@chromium.org>2015-06-08 23:02:47 +0000
commit0786d7659f1707cd46c94d54dfbf5312dc7dd057 (patch)
tree729681fb3ede2c24fe1dd3dd04ce12ace829cfbf /net
parent8ba9a71daf0463f19e16267aa7744d4c0c2392e7 (diff)
downloadchromium_src-0786d7659f1707cd46c94d54dfbf5312dc7dd057.zip
chromium_src-0786d7659f1707cd46c94d54dfbf5312dc7dd057.tar.gz
chromium_src-0786d7659f1707cd46c94d54dfbf5312dc7dd057.tar.bz2
Consistently use BYTE* instead of PBYTE in openssl_platform_key_win.cc.
Right now it's a bit of a mix. Google style says using types like DWORD and HANDLE is encouraged, but const TCHAR * is prefered over LPCTSTR, though Chromium is not consistent about this with interesting types like PCERT_CONTEXT. We do fairly consistently use BYTE* over PBYTE, so at least standardize that one. BUG=none Review URL: https://codereview.chromium.org/1149963005 Cr-Commit-Position: refs/heads/master@{#333376}
Diffstat (limited to 'net')
-rw-r--r--net/ssl/openssl_platform_key_win.cc19
1 files changed, 9 insertions, 10 deletions
diff --git a/net/ssl/openssl_platform_key_win.cc b/net/ssl/openssl_platform_key_win.cc
index 6ee6b5a..d394f18 100644
--- a/net/ssl/openssl_platform_key_win.cc
+++ b/net/ssl/openssl_platform_key_win.cc
@@ -43,15 +43,14 @@ namespace net {
namespace {
using NCryptFreeObjectFunc = SECURITY_STATUS(WINAPI*)(NCRYPT_HANDLE);
-using NCryptSignHashFunc =
- SECURITY_STATUS(WINAPI*)(NCRYPT_KEY_HANDLE, // hKey
- VOID*, // pPaddingInfo
- PBYTE, // pbHashValue
- DWORD, // cbHashValue
- PBYTE, // pbSignature
- DWORD, // cbSignature
- DWORD*, // pcbResult
- DWORD); // dwFlags
+using NCryptSignHashFunc = SECURITY_STATUS(WINAPI*)(NCRYPT_KEY_HANDLE, // hKey
+ VOID*, // pPaddingInfo
+ BYTE*, // pbHashValue
+ DWORD, // cbHashValue
+ BYTE*, // pbSignature
+ DWORD, // cbSignature
+ DWORD*, // pcbResult
+ DWORD); // dwFlags
class CNGFunctions {
public:
@@ -196,7 +195,7 @@ bool DoNCryptSignHash(NCRYPT_KEY_HANDLE key,
// correct size. Some smartcards are buggy and do not write to it on the
// second call.
ncrypt_status = g_cng_functions.Get().ncrypt_sign_hash()(
- key, padding, const_cast<PBYTE>(in), in_len, out, signature_len,
+ key, padding, const_cast<BYTE*>(in), in_len, out, signature_len,
&signature_len, flags);
if (FAILED(ncrypt_status)) {
LOG(ERROR) << "NCryptSignHash failed: " << ncrypt_status;