Index: net/cert/ev_root_ca_metadata.cc |
diff --git a/net/cert/ev_root_ca_metadata.cc b/net/cert/ev_root_ca_metadata.cc |
index a5ac6e2231e1ce0b0880c77faec345e523c2be27..33afaf2a08eb2f2cdd2aa3cac6a73c352c3406bb 100644 |
--- a/net/cert/ev_root_ca_metadata.cc |
+++ b/net/cert/ev_root_ca_metadata.cc |
@@ -4,7 +4,7 @@ |
#include "net/cert/ev_root_ca_metadata.h" |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
#include <cert.h> |
#include <pkcs11n.h> |
#include <secerr.h> |
@@ -15,13 +15,13 @@ |
#include "base/lazy_instance.h" |
#include "base/logging.h" |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
#include "crypto/nss_util.h" |
#endif |
namespace net { |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_WIN) |
+#if defined(USE_NSS_VERIFIER) || defined(OS_WIN) |
// Raw metadata. |
struct EVMetadata { |
// kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At |
@@ -503,7 +503,7 @@ EVRootCAMetadata* EVRootCAMetadata::GetInstance() { |
return g_ev_root_ca_metadata.Pointer(); |
} |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
bool EVRootCAMetadata::IsEVPolicyOID(PolicyOID policy_oid) const { |
return policy_oids_.find(policy_oid) != policy_oids_.end(); |
} |
@@ -649,7 +649,7 @@ bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { |
EVRootCAMetadata::EVRootCAMetadata() { |
// Constructs the object from the raw metadata in ev_root_ca_metadata. |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
crypto::EnsureNSSInit(); |
for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { |