| Index: chrome/browser/chromeos/net/cert_verify_proc_chromeos.h
|
| diff --git a/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h b/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h
|
| index b35315f3f77724d8fdbceea22364858f9a4c848c..b79ac8a9154dd85696c698fc441d5ead8f67a2d7 100644
|
| --- a/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h
|
| +++ b/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h
|
| @@ -28,17 +28,16 @@ class CertVerifyProcChromeOS : public net::CertVerifyProcNSS {
|
| explicit CertVerifyProcChromeOS(crypto::ScopedPK11Slot public_slot);
|
|
|
| protected:
|
| - virtual ~CertVerifyProcChromeOS();
|
| + ~CertVerifyProcChromeOS() override;
|
|
|
| private:
|
| // net::CertVerifyProcNSS implementation:
|
| - virtual int VerifyInternal(
|
| - net::X509Certificate* cert,
|
| - const std::string& hostname,
|
| - int flags,
|
| - net::CRLSet* crl_set,
|
| - const net::CertificateList& additional_trust_anchors,
|
| - net::CertVerifyResult* verify_result) override;
|
| + int VerifyInternal(net::X509Certificate* cert,
|
| + const std::string& hostname,
|
| + int flags,
|
| + net::CRLSet* crl_set,
|
| + const net::CertificateList& additional_trust_anchors,
|
| + net::CertVerifyResult* verify_result) override;
|
|
|
| // Check if the trust root of |current_chain| is allowed.
|
| // |is_chain_valid_arg| is actually a ChainVerifyArgs*, which is used to pass
|
|
|