| Index: net/base/cert_verify_proc.cc
|
| diff --git a/net/base/cert_verify_proc.cc b/net/base/cert_verify_proc.cc
|
| index 420a8a53b52e371b4fa65ab3135cd0ecb995f33f..52c4e7899acbcb1161a613847c9727fea4c57bbe 100644
|
| --- a/net/base/cert_verify_proc.cc
|
| +++ b/net/base/cert_verify_proc.cc
|
| @@ -8,6 +8,7 @@
|
| #include "base/sha1.h"
|
| #include "build/build_config.h"
|
| #include "net/base/cert_status_flags.h"
|
| +#include "net/base/cert_verifier.h"
|
| #include "net/base/cert_verify_result.h"
|
| #include "net/base/crl_set.h"
|
| #include "net/base/net_errors.h"
|
| @@ -85,9 +86,9 @@ int CertVerifyProc::Verify(X509Certificate* cert,
|
| // A possible optimisation is to only enable online revocation checking in
|
| // the event that the leaf certificate appears to include a EV policy ID.
|
| // However, it's expected that having a current CRLSet will be very common.
|
| - if ((flags & X509Certificate::VERIFY_EV_CERT) &&
|
| + if ((flags & CertVerifier::VERIFY_EV_CERT) &&
|
| (!crl_set || crl_set->IsExpired())) {
|
| - flags |= X509Certificate::VERIFY_REV_CHECKING_ENABLED;
|
| + flags |= CertVerifier::VERIFY_REV_CHECKING_ENABLED;
|
| }
|
|
|
| int rv = VerifyInternal(cert, hostname, flags, crl_set, verify_result);
|
|
|