Index: net/base/x509_certificate_nss.cc |
diff --git a/net/base/x509_certificate_nss.cc b/net/base/x509_certificate_nss.cc |
index e311edb6d108ff9d035cb2bb3e1a631b149af980..8eb337f7353507394cf379ccd1233ff98ec3cdb5 100644 |
--- a/net/base/x509_certificate_nss.cc |
+++ b/net/base/x509_certificate_nss.cc |
@@ -219,7 +219,7 @@ void GetCertChainInfo(CERTCertList* cert_list, |
typedef char* (*CERTGetNameFunc)(CERTName* name); |
void ParsePrincipal(CERTName* name, |
- X509Certificate::Principal* principal) { |
+ CertPrincipal* principal) { |
// TODO(jcampan): add business_category and serial_number. |
// TODO(wtc): NSS has the CERT_GetOrgName, CERT_GetOrgUnitName, and |
// CERT_GetDomainComponentName functions, but they return only the most |
@@ -706,7 +706,7 @@ bool X509Certificate::VerifyEV() const { |
cvout[cvout_trust_anchor_index].value.pointer.cert; |
if (root_ca == NULL) |
return false; |
- X509Certificate::Fingerprint fingerprint = |
+ SHA1Fingerprint fingerprint = |
X509Certificate::CalculateFingerprint(root_ca); |
SECOidTag ev_policy_tag = SEC_OID_UNKNOWN; |
if (!metadata->GetPolicyOID(fingerprint, &ev_policy_tag)) |
@@ -750,9 +750,9 @@ void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) { |
} |
// static |
-X509Certificate::Fingerprint X509Certificate::CalculateFingerprint( |
+SHA1Fingerprint X509Certificate::CalculateFingerprint( |
OSCertHandle cert) { |
- Fingerprint sha1; |
+ SHA1Fingerprint sha1; |
memset(sha1.data, 0, sizeof(sha1.data)); |
DCHECK(NULL != cert->derCert.data); |