aboutsummaryrefslogtreecommitdiff
path: root/cast/sender
diff options
context:
space:
mode:
authorJordan Bayles <jophba@chromium.org>2019-12-18 14:54:58 -0800
committerCommit Bot <commit-bot@chromium.org>2019-12-19 18:43:04 +0000
commit150295b3895f6b57415a34df5e20542da184bda9 (patch)
treee287c9e099027733cad1ef82014d193cb9a414bd /cast/sender
parentde04a83ce4529e092e8ab53e4d6e965dbabc3627 (diff)
downloadopenscreen-150295b3895f6b57415a34df5e20542da184bda9.tar.gz
Fix chrome build
Change-Id: Ia3583a0adf0ce8ce9c5f6c981209795554ec0ecf Reviewed-on: https://chromium-review.googlesource.com/c/openscreen/+/1974909 Reviewed-by: Yuri Wiitala <miu@chromium.org> Reviewed-by: mark a. foltz <mfoltz@chromium.org> Commit-Queue: Jordan Bayles <jophba@chromium.org>
Diffstat (limited to 'cast/sender')
-rw-r--r--cast/sender/channel/cast_auth_util.cc4
-rw-r--r--cast/sender/channel/cast_auth_util.h2
-rw-r--r--cast/sender/channel/cast_auth_util_unittest.cc6
3 files changed, 6 insertions, 6 deletions
diff --git a/cast/sender/channel/cast_auth_util.cc b/cast/sender/channel/cast_auth_util.cc
index 44a75b98..5201aa11 100644
--- a/cast/sender/channel/cast_auth_util.cc
+++ b/cast/sender/channel/cast_auth_util.cc
@@ -343,8 +343,8 @@ ErrorOr<CastDeviceCertPolicy> VerifyCredentialsImpl(
std::vector<std::string> cert_chain;
cert_chain.push_back(response.client_auth_certificate());
cert_chain.insert(cert_chain.end(),
- response.intermediate_certificates().begin(),
- response.intermediate_certificates().end());
+ response.intermediate_certificate().begin(),
+ response.intermediate_certificate().end());
// Parse the CRL.
std::unique_ptr<certificate::CastCRL> crl;
diff --git a/cast/sender/channel/cast_auth_util.h b/cast/sender/channel/cast_auth_util.h
index b3ea452f..df6299d3 100644
--- a/cast/sender/channel/cast_auth_util.h
+++ b/cast/sender/channel/cast_auth_util.h
@@ -55,7 +55,7 @@ class AuthContext {
// Authenticates the given |challenge_reply|:
// 1. Signature contained in the reply is valid.
-// 2. Certficate used to sign is rooted to a trusted CA.
+// 2. certificate used to sign is rooted to a trusted CA.
ErrorOr<CastDeviceCertPolicy> AuthenticateChallengeReply(
const CastMessage& challenge_reply,
X509* peer_cert,
diff --git a/cast/sender/channel/cast_auth_util_unittest.cc b/cast/sender/channel/cast_auth_util_unittest.cc
index a4b341e2..5dec424d 100644
--- a/cast/sender/channel/cast_auth_util_unittest.cc
+++ b/cast/sender/channel/cast_auth_util_unittest.cc
@@ -125,7 +125,7 @@ class CastAuthUtilTest : public testing::Test {
response.set_client_auth_certificate(chain[0]);
for (size_t i = 1; i < chain.size(); ++i) {
- response.add_intermediate_certificates(chain[i]);
+ response.add_intermediate_certificate(chain[i]);
}
response.set_hash_algorithm(digest_algorithm);
@@ -170,7 +170,7 @@ TEST_F(CastAuthUtilTest, VerifySuccess) {
TEST_F(CastAuthUtilTest, VerifyBadCA) {
std::string signed_data;
AuthResponse auth_response = CreateAuthResponse(&signed_data, SHA256);
- MangleString(auth_response.mutable_intermediate_certificates(0));
+ MangleString(auth_response.mutable_intermediate_certificate(0));
ErrorOr<CastDeviceCertPolicy> result =
VerifyCredentials(auth_response, signed_data);
EXPECT_FALSE(result);
@@ -357,7 +357,7 @@ ErrorOr<CastDeviceCertPolicy> TestVerifyRevocation(
if (certificate_chain.size() > 0) {
response.set_client_auth_certificate(certificate_chain[0]);
for (size_t i = 1; i < certificate_chain.size(); ++i) {
- response.add_intermediate_certificates(certificate_chain[i]);
+ response.add_intermediate_certificate(certificate_chain[i]);
}
}