Index: net/base/cert_verify_proc_mac.cc |
diff --git a/net/base/cert_verify_proc_mac.cc b/net/base/cert_verify_proc_mac.cc |
index 2cbffef8a23fa554e3710fa23acb144bdde3703b..76ac82fb58e82baa1c7cc8b1e5206e46dd6c98dd 100644 |
--- a/net/base/cert_verify_proc_mac.cc |
+++ b/net/base/cert_verify_proc_mac.cc |
@@ -17,6 +17,7 @@ |
#include "crypto/sha2.h" |
#include "net/base/asn1_util.h" |
#include "net/base/cert_status_flags.h" |
+#include "net/base/cert_verifier.h" |
#include "net/base/cert_verify_result.h" |
#include "net/base/crl_set.h" |
#include "net/base/net_errors.h" |
@@ -156,8 +157,8 @@ OSStatus CreateTrustPolicies(const std::string& hostname, |
// revocation checking policies and instead respect the application-level |
// revocation preference. |
status = x509_util::CreateRevocationPolicies( |
- (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED), |
- (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED_EV_ONLY), |
+ (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED), |
+ (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED_EV_ONLY), |
local_policies); |
if (status) |
return status; |
@@ -383,7 +384,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert, |
// Note: For EV certificates, the Apple TP will handle setting these flags |
// as part of EV evaluation. |
- if (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED) { |
+ if (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED) { |
// Require a positive result from an OCSP responder or a CRL (or both) |
// for every certificate in the chain. The Apple TP automatically |
// excludes the self-signed root from this requirement. If a certificate |
@@ -536,7 +537,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert, |
if (IsCertStatusError(verify_result->cert_status)) |
return MapCertStatusToNetError(verify_result->cert_status); |
- if (flags & X509Certificate::VERIFY_EV_CERT) { |
+ if (flags & CertVerifier::VERIFY_EV_CERT) { |
// Determine the certificate's EV status using SecTrustCopyExtendedResult(), |
// which we need to look up because the function wasn't added until |
// Mac OS X 10.5.7. |
@@ -567,7 +568,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert, |
if (CFDictionaryContainsKey(ev_dict, |
kSecEVOrganizationName)) { |
verify_result->cert_status |= CERT_STATUS_IS_EV; |
- if (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED_EV_ONLY) |
+ if (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED_EV_ONLY) |
verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED; |
} |
} |