| Index: net/cert/x509_certificate.cc
|
| diff --git a/net/cert/x509_certificate.cc b/net/cert/x509_certificate.cc
|
| index a612fb08a1007f95d4e7480117f1a9f7f9b1c2bf..2b0a10a33a9347dab436ee5b7bd5e3cda774a790 100644
|
| --- a/net/cert/x509_certificate.cc
|
| +++ b/net/cert/x509_certificate.cc
|
| @@ -46,7 +46,7 @@ const char kCertificateHeader[] = "CERTIFICATE";
|
| // The PEM block header used for PKCS#7 data
|
| const char kPKCS7Header[] = "PKCS7";
|
|
|
| -#if !defined(USE_NSS)
|
| +#if !defined(USE_NSS_CERTS)
|
| // A thread-safe cache for OS certificate handles.
|
| //
|
| // Within each of the supported underlying crypto libraries, a certificate
|
| @@ -187,19 +187,19 @@ void X509CertificateCache::Remove(X509Certificate::OSCertHandle cert_handle) {
|
| cache_.erase(pos);
|
| }
|
| }
|
| -#endif // !defined(USE_NSS)
|
| +#endif // !defined(USE_NSS_CERTS)
|
|
|
| // See X509CertificateCache::InsertOrUpdate. NSS has a built-in cache, so there
|
| // is no point in wrapping another cache around it.
|
| void InsertOrUpdateCache(X509Certificate::OSCertHandle* cert_handle) {
|
| -#if !defined(USE_NSS)
|
| +#if !defined(USE_NSS_CERTS)
|
| g_x509_certificate_cache.Pointer()->InsertOrUpdate(cert_handle);
|
| #endif
|
| }
|
|
|
| // See X509CertificateCache::Remove.
|
| void RemoveFromCache(X509Certificate::OSCertHandle cert_handle) {
|
| -#if !defined(USE_NSS)
|
| +#if !defined(USE_NSS_CERTS)
|
| g_x509_certificate_cache.Pointer()->Remove(cert_handle);
|
| #endif
|
| }
|
|
|