Index: net/cert/ev_root_ca_metadata.cc |
diff --git a/net/cert/ev_root_ca_metadata.cc b/net/cert/ev_root_ca_metadata.cc |
index a46e50a6f719fcc30cf427e358847291d4e8c501..dc2cea95fae5b9f91db96f79398529a0eff4a3d6 100644 |
--- a/net/cert/ev_root_ca_metadata.cc |
+++ b/net/cert/ev_root_ca_metadata.cc |
@@ -4,7 +4,7 @@ |
#include "net/cert/ev_root_ca_metadata.h" |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
#include <cert.h> |
#include <pkcs11n.h> |
#include <secerr.h> |
@@ -15,13 +15,13 @@ |
#include "base/lazy_instance.h" |
#include "base/logging.h" |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
#include "crypto/nss_util.h" |
#endif |
namespace net { |
-#if defined(USE_NSS_VERIFIER) || defined(OS_WIN) |
+#if defined(USE_NSS_CERTS) || defined(OS_WIN) |
// Raw metadata. |
struct EVMetadata { |
// kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At |
@@ -582,7 +582,7 @@ EVRootCAMetadata* EVRootCAMetadata::GetInstance() { |
return g_ev_root_ca_metadata.Pointer(); |
} |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
bool EVRootCAMetadata::IsEVPolicyOID(PolicyOID policy_oid) const { |
return policy_oids_.find(policy_oid) != policy_oids_.end(); |
} |
@@ -728,7 +728,7 @@ bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { |
EVRootCAMetadata::EVRootCAMetadata() { |
// Constructs the object from the raw metadata in ev_root_ca_metadata. |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
crypto::EnsureNSSInit(); |
for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { |