| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index e86672c6b726829b084437edff72696abff23eff..b5f870d0f11295e781a2ff1648efab3689577438 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -8258,7 +8258,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest {
|
| CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get());
|
| test_root_.reset(new ScopedTestRoot(root_cert.get()));
|
|
|
| -#if defined(USE_NSS) || defined(OS_IOS)
|
| +#if defined(USE_NSS_CERTS) || defined(OS_IOS)
|
| SetURLRequestContextForNSSHttpIO(&context_);
|
| EnsureNSSHttpIOInit();
|
| #endif
|
| @@ -8287,7 +8287,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest {
|
| }
|
|
|
| ~HTTPSOCSPTest() override {
|
| -#if defined(USE_NSS) || defined(OS_IOS)
|
| +#if defined(USE_NSS_CERTS) || defined(OS_IOS)
|
| ShutdownNSSHttpIO();
|
| #endif
|
| }
|
| @@ -8327,7 +8327,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() {
|
| // If it does not, then tests which rely on 'hard fail' behaviour should be
|
| // skipped.
|
| static bool SystemSupportsHardFailRevocationChecking() {
|
| -#if defined(OS_WIN) || defined(USE_NSS) || defined(OS_IOS)
|
| +#if defined(OS_WIN) || defined(USE_NSS_CERTS) || defined(OS_IOS)
|
| return true;
|
| #else
|
| return false;
|
| @@ -8366,7 +8366,7 @@ static bool SystemSupportsOCSP() {
|
| }
|
|
|
| static bool SystemSupportsOCSPStapling() {
|
| -#if defined(USE_NSS)
|
| +#if defined(USE_NSS_CERTS)
|
| return true;
|
| #elif defined(OS_WIN)
|
| return base::win::GetVersion() >= base::win::VERSION_VISTA;
|
| @@ -8463,7 +8463,7 @@ TEST_F(HTTPSOCSPTest, ValidStapled) {
|
| }
|
|
|
| // Disabled on NSS ports. See https://crbug.com/431716.
|
| -#if defined(USE_NSS)
|
| +#if defined(USE_NSS_CERTS)
|
| #define MAYBE_RevokedStapled DISABLED_RevokedStapled
|
| #else
|
| #define MAYBE_RevokedStapled RevokedStapled
|
|
|