Commit 3e871b0b authored by Adam Langley's avatar Adam Langley Committed by Commit Bot

Remove some net:: qualifications inside the namespace.

Names don't need to say net:: when already inside the namespace.

Bug: none
Change-Id: I11972d69236f22848a39bb86b2b1845c26a78a4c
Reviewed-on: https://chromium-review.googlesource.com/566065Reviewed-by: default avatarEric Roman <eroman@chromium.org>
Commit-Queue: Adam Langley <agl@chromium.org>
Cr-Commit-Position: refs/heads/master@{#486108}
parent 5201a681
...@@ -324,7 +324,7 @@ bool ParseBasicOCSPResponse(const der::Input& raw_tlv, OCSPResponse* out) { ...@@ -324,7 +324,7 @@ bool ParseBasicOCSPResponse(const der::Input& raw_tlv, OCSPResponse* out) {
if (!parser.ReadRawTLV(&sigalg_tlv)) if (!parser.ReadRawTLV(&sigalg_tlv))
return false; return false;
// TODO(crbug.com/634443): Propagate the errors. // TODO(crbug.com/634443): Propagate the errors.
net::CertErrors errors; CertErrors errors;
out->signature_algorithm = SignatureAlgorithm::Create(sigalg_tlv, &errors); out->signature_algorithm = SignatureAlgorithm::Create(sigalg_tlv, &errors);
if (!out->signature_algorithm) if (!out->signature_algorithm)
return false; return false;
......
...@@ -161,7 +161,7 @@ bool ReadCertChainFromFile(const std::string& file_path_ascii, ...@@ -161,7 +161,7 @@ bool ReadCertChainFromFile(const std::string& file_path_ascii,
const std::string& block_data = pem_tokenizer.data(); const std::string& block_data = pem_tokenizer.data();
CertErrors errors; CertErrors errors;
if (!net::ParsedCertificate::CreateAndAddToVector( if (!ParsedCertificate::CreateAndAddToVector(
bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new( bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new(
reinterpret_cast<const uint8_t*>(block_data.data()), reinterpret_cast<const uint8_t*>(block_data.data()),
block_data.size(), nullptr)), block_data.size(), nullptr)),
......
...@@ -32,10 +32,10 @@ class VerifyCertificateChainPkitsTestDelegate { ...@@ -32,10 +32,10 @@ class VerifyCertificateChainPkitsTestDelegate {
// PKITS lists chains from trust anchor to target, whereas // PKITS lists chains from trust anchor to target, whereas
// VerifyCertificateChain takes them starting with the target and ending // VerifyCertificateChain takes them starting with the target and ending
// with the trust anchor. // with the trust anchor.
std::vector<scoped_refptr<net::ParsedCertificate>> input_chain; std::vector<scoped_refptr<ParsedCertificate>> input_chain;
CertErrors parsing_errors; CertErrors parsing_errors;
for (auto i = cert_ders.rbegin(); i != cert_ders.rend(); ++i) { for (auto i = cert_ders.rbegin(); i != cert_ders.rend(); ++i) {
ASSERT_TRUE(net::ParsedCertificate::CreateAndAddToVector( ASSERT_TRUE(ParsedCertificate::CreateAndAddToVector(
bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new( bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new(
reinterpret_cast<const uint8_t*>(i->data()), i->size(), nullptr)), reinterpret_cast<const uint8_t*>(i->data()), i->size(), nullptr)),
{}, &input_chain, &parsing_errors)) {}, &input_chain, &parsing_errors))
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment