Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index e86672c6b726829b084437edff72696abff23eff..b5f870d0f11295e781a2ff1648efab3689577438 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -8258,7 +8258,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get()); |
test_root_.reset(new ScopedTestRoot(root_cert.get())); |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
SetURLRequestContextForNSSHttpIO(&context_); |
EnsureNSSHttpIOInit(); |
#endif |
@@ -8287,7 +8287,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
} |
~HTTPSOCSPTest() override { |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
ShutdownNSSHttpIO(); |
#endif |
} |
@@ -8327,7 +8327,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() { |
// If it does not, then tests which rely on 'hard fail' behaviour should be |
// skipped. |
static bool SystemSupportsHardFailRevocationChecking() { |
-#if defined(OS_WIN) || defined(USE_NSS) || defined(OS_IOS) |
+#if defined(OS_WIN) || defined(USE_NSS_CERTS) || defined(OS_IOS) |
return true; |
#else |
return false; |
@@ -8366,7 +8366,7 @@ static bool SystemSupportsOCSP() { |
} |
static bool SystemSupportsOCSPStapling() { |
-#if defined(USE_NSS) |
+#if defined(USE_NSS_CERTS) |
return true; |
#elif defined(OS_WIN) |
return base::win::GetVersion() >= base::win::VERSION_VISTA; |
@@ -8463,7 +8463,7 @@ TEST_F(HTTPSOCSPTest, ValidStapled) { |
} |
// Disabled on NSS ports. See https://crbug.com/431716. |
-#if defined(USE_NSS) |
+#if defined(USE_NSS_CERTS) |
#define MAYBE_RevokedStapled DISABLED_RevokedStapled |
#else |
#define MAYBE_RevokedStapled RevokedStapled |