Index: chrome/browser/chromeos/net/cert_verify_proc_chromeos.h |
diff --git a/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h b/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h |
index b35315f3f77724d8fdbceea22364858f9a4c848c..b79ac8a9154dd85696c698fc441d5ead8f67a2d7 100644 |
--- a/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h |
+++ b/chrome/browser/chromeos/net/cert_verify_proc_chromeos.h |
@@ -28,17 +28,16 @@ class CertVerifyProcChromeOS : public net::CertVerifyProcNSS { |
explicit CertVerifyProcChromeOS(crypto::ScopedPK11Slot public_slot); |
protected: |
- virtual ~CertVerifyProcChromeOS(); |
+ ~CertVerifyProcChromeOS() override; |
private: |
// net::CertVerifyProcNSS implementation: |
- virtual int VerifyInternal( |
- net::X509Certificate* cert, |
- const std::string& hostname, |
- int flags, |
- net::CRLSet* crl_set, |
- const net::CertificateList& additional_trust_anchors, |
- net::CertVerifyResult* verify_result) override; |
+ int VerifyInternal(net::X509Certificate* cert, |
+ const std::string& hostname, |
+ int flags, |
+ net::CRLSet* crl_set, |
+ const net::CertificateList& additional_trust_anchors, |
+ net::CertVerifyResult* verify_result) override; |
// Check if the trust root of |current_chain| is allowed. |
// |is_chain_valid_arg| is actually a ChainVerifyArgs*, which is used to pass |