| Index: net/base/cert_verify_proc_win.cc
|
| diff --git a/net/base/cert_verify_proc_win.cc b/net/base/cert_verify_proc_win.cc
|
| index a733d132642c433e805d146e884b467c298f7457..154092b092bb7e9cd55617b0aa73be7e85867a84 100644
|
| --- a/net/base/cert_verify_proc_win.cc
|
| +++ b/net/base/cert_verify_proc_win.cc
|
| @@ -13,6 +13,7 @@
|
| #include "crypto/sha2.h"
|
| #include "net/base/asn1_util.h"
|
| #include "net/base/cert_status_flags.h"
|
| +#include "net/base/cert_verifier.h"
|
| #include "net/base/cert_verify_result.h"
|
| #include "net/base/crl_set.h"
|
| #include "net/base/ev_root_ca_metadata.h"
|
| @@ -545,7 +546,7 @@ int CertVerifyProcWin::VerifyInternal(X509Certificate* cert,
|
| // Get the certificatePolicies extension of the certificate.
|
| scoped_ptr_malloc<CERT_POLICIES_INFO> policies_info;
|
| LPSTR ev_policy_oid = NULL;
|
| - if (flags & X509Certificate::VERIFY_EV_CERT) {
|
| + if (flags & CertVerifier::VERIFY_EV_CERT) {
|
| GetCertPoliciesInfo(cert_handle, &policies_info);
|
| if (policies_info.get()) {
|
| EVRootCAMetadata* metadata = EVRootCAMetadata::GetInstance();
|
| @@ -567,9 +568,9 @@ int CertVerifyProcWin::VerifyInternal(X509Certificate* cert,
|
| DWORD chain_flags = CERT_CHAIN_CACHE_END_CERT |
|
| CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT;
|
| const bool rev_checking_enabled =
|
| - (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED) ||
|
| + (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED) ||
|
| (ev_policy_oid != NULL &&
|
| - (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED_EV_ONLY));
|
| + (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED_EV_ONLY));
|
|
|
| if (rev_checking_enabled) {
|
| verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED;
|
|
|