Index: net/cert/x509_certificate.cc |
diff --git a/net/cert/x509_certificate.cc b/net/cert/x509_certificate.cc |
index a612fb08a1007f95d4e7480117f1a9f7f9b1c2bf..2b0a10a33a9347dab436ee5b7bd5e3cda774a790 100644 |
--- a/net/cert/x509_certificate.cc |
+++ b/net/cert/x509_certificate.cc |
@@ -46,7 +46,7 @@ const char kCertificateHeader[] = "CERTIFICATE"; |
// The PEM block header used for PKCS#7 data |
const char kPKCS7Header[] = "PKCS7"; |
-#if !defined(USE_NSS) |
+#if !defined(USE_NSS_CERTS) |
// A thread-safe cache for OS certificate handles. |
// |
// Within each of the supported underlying crypto libraries, a certificate |
@@ -187,19 +187,19 @@ void X509CertificateCache::Remove(X509Certificate::OSCertHandle cert_handle) { |
cache_.erase(pos); |
} |
} |
-#endif // !defined(USE_NSS) |
+#endif // !defined(USE_NSS_CERTS) |
// See X509CertificateCache::InsertOrUpdate. NSS has a built-in cache, so there |
// is no point in wrapping another cache around it. |
void InsertOrUpdateCache(X509Certificate::OSCertHandle* cert_handle) { |
-#if !defined(USE_NSS) |
+#if !defined(USE_NSS_CERTS) |
g_x509_certificate_cache.Pointer()->InsertOrUpdate(cert_handle); |
#endif |
} |
// See X509CertificateCache::Remove. |
void RemoveFromCache(X509Certificate::OSCertHandle cert_handle) { |
-#if !defined(USE_NSS) |
+#if !defined(USE_NSS_CERTS) |
g_x509_certificate_cache.Pointer()->Remove(cert_handle); |
#endif |
} |