diff options
author | Jordan Bayles <jophba@chromium.org> | 2019-12-18 14:54:58 -0800 |
---|---|---|
committer | Commit Bot <commit-bot@chromium.org> | 2019-12-19 18:43:04 +0000 |
commit | 150295b3895f6b57415a34df5e20542da184bda9 (patch) | |
tree | e287c9e099027733cad1ef82014d193cb9a414bd /cast/sender | |
parent | de04a83ce4529e092e8ab53e4d6e965dbabc3627 (diff) | |
download | openscreen-150295b3895f6b57415a34df5e20542da184bda9.tar.gz |
Fix chrome build
Change-Id: Ia3583a0adf0ce8ce9c5f6c981209795554ec0ecf
Reviewed-on: https://chromium-review.googlesource.com/c/openscreen/+/1974909
Reviewed-by: Yuri Wiitala <miu@chromium.org>
Reviewed-by: mark a. foltz <mfoltz@chromium.org>
Commit-Queue: Jordan Bayles <jophba@chromium.org>
Diffstat (limited to 'cast/sender')
-rw-r--r-- | cast/sender/channel/cast_auth_util.cc | 4 | ||||
-rw-r--r-- | cast/sender/channel/cast_auth_util.h | 2 | ||||
-rw-r--r-- | cast/sender/channel/cast_auth_util_unittest.cc | 6 |
3 files changed, 6 insertions, 6 deletions
diff --git a/cast/sender/channel/cast_auth_util.cc b/cast/sender/channel/cast_auth_util.cc index 44a75b98..5201aa11 100644 --- a/cast/sender/channel/cast_auth_util.cc +++ b/cast/sender/channel/cast_auth_util.cc @@ -343,8 +343,8 @@ ErrorOr<CastDeviceCertPolicy> VerifyCredentialsImpl( std::vector<std::string> cert_chain; cert_chain.push_back(response.client_auth_certificate()); cert_chain.insert(cert_chain.end(), - response.intermediate_certificates().begin(), - response.intermediate_certificates().end()); + response.intermediate_certificate().begin(), + response.intermediate_certificate().end()); // Parse the CRL. std::unique_ptr<certificate::CastCRL> crl; diff --git a/cast/sender/channel/cast_auth_util.h b/cast/sender/channel/cast_auth_util.h index b3ea452f..df6299d3 100644 --- a/cast/sender/channel/cast_auth_util.h +++ b/cast/sender/channel/cast_auth_util.h @@ -55,7 +55,7 @@ class AuthContext { // Authenticates the given |challenge_reply|: // 1. Signature contained in the reply is valid. -// 2. Certficate used to sign is rooted to a trusted CA. +// 2. certificate used to sign is rooted to a trusted CA. ErrorOr<CastDeviceCertPolicy> AuthenticateChallengeReply( const CastMessage& challenge_reply, X509* peer_cert, diff --git a/cast/sender/channel/cast_auth_util_unittest.cc b/cast/sender/channel/cast_auth_util_unittest.cc index a4b341e2..5dec424d 100644 --- a/cast/sender/channel/cast_auth_util_unittest.cc +++ b/cast/sender/channel/cast_auth_util_unittest.cc @@ -125,7 +125,7 @@ class CastAuthUtilTest : public testing::Test { response.set_client_auth_certificate(chain[0]); for (size_t i = 1; i < chain.size(); ++i) { - response.add_intermediate_certificates(chain[i]); + response.add_intermediate_certificate(chain[i]); } response.set_hash_algorithm(digest_algorithm); @@ -170,7 +170,7 @@ TEST_F(CastAuthUtilTest, VerifySuccess) { TEST_F(CastAuthUtilTest, VerifyBadCA) { std::string signed_data; AuthResponse auth_response = CreateAuthResponse(&signed_data, SHA256); - MangleString(auth_response.mutable_intermediate_certificates(0)); + MangleString(auth_response.mutable_intermediate_certificate(0)); ErrorOr<CastDeviceCertPolicy> result = VerifyCredentials(auth_response, signed_data); EXPECT_FALSE(result); @@ -357,7 +357,7 @@ ErrorOr<CastDeviceCertPolicy> TestVerifyRevocation( if (certificate_chain.size() > 0) { response.set_client_auth_certificate(certificate_chain[0]); for (size_t i = 1; i < certificate_chain.size(); ++i) { - response.add_intermediate_certificates(certificate_chain[i]); + response.add_intermediate_certificate(certificate_chain[i]); } } |