Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index ed6f028b2002d2446f10186473d9bb2e3d002c0e..1d4ac9b7676f6ebf0e1a7a4c0c7ca4353414b140 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -212,7 +212,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) { |
NULL, |
empty_cert_list_, |
&verify_result); |
-#if defined(USE_NSS) || defined(OS_IOS) || defined(OS_ANDROID) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_ANDROID) |
EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
#else |
// TOOD(bulach): investigate why macosx and win aren't returning |
@@ -222,7 +222,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) { |
// Either the system crypto library should correctly report a certificate |
// name mismatch, or our certificate blacklist should cause us to report an |
// invalid certificate. |
-#if defined(USE_NSS) || defined(OS_WIN) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_WIN) || defined(OS_IOS) |
EXPECT_TRUE(verify_result.cert_status & |
(CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID)); |
#endif |
@@ -754,7 +754,7 @@ TEST_F(CertVerifyProcTest, InvalidKeyUsage) { |
#endif |
// TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors |
// from NSS. |
-#if !defined(USE_NSS) && !defined(OS_IOS) && !defined(OS_ANDROID) |
+#if !defined(USE_NSS_CERTS) && !defined(OS_IOS) && !defined(OS_ANDROID) |
// The certificate is issued by an unknown CA. |
EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID); |
#endif |
@@ -1166,7 +1166,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
} |
#endif |
-#if defined(USE_NSS) || defined(OS_IOS) || defined(OS_WIN) || defined(OS_MACOSX) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_WIN) || \ |
+ defined(OS_MACOSX) |
// Test that CRLSets are effective in making a certificate appear to be |
// revoked. |
TEST_F(CertVerifyProcTest, CRLSet) { |
@@ -1420,7 +1421,7 @@ const WeakDigestTestData kVerifyIntermediateCATestData[] = { |
"weak_digest_sha1_ee.pem", EXPECT_MD2 | EXPECT_SHA1 }, |
}; |
// Disabled on NSS - MD4 is not supported, and MD2 and MD5 are disabled. |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
#define MAYBE_VerifyIntermediate DISABLED_VerifyIntermediate |
#else |
#define MAYBE_VerifyIntermediate VerifyIntermediate |
@@ -1445,7 +1446,7 @@ const WeakDigestTestData kVerifyEndEntityTestData[] = { |
// Disabled on NSS - NSS caches chains/signatures in such a way that cannot |
// be cleared until NSS is cleanly shutdown, which is not presently supported |
// in Chromium. |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
#define MAYBE_VerifyEndEntity DISABLED_VerifyEndEntity |
#else |
#define MAYBE_VerifyEndEntity VerifyEndEntity |
@@ -1468,7 +1469,7 @@ const WeakDigestTestData kVerifyIncompleteIntermediateTestData[] = { |
}; |
// Disabled on NSS - libpkix does not return constructed chains on error, |
// preventing us from detecting/inspecting the verified chain. |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
#define MAYBE_VerifyIncompleteIntermediate \ |
DISABLED_VerifyIncompleteIntermediate |
#else |
@@ -1493,7 +1494,7 @@ const WeakDigestTestData kVerifyIncompleteEETestData[] = { |
}; |
// Disabled on NSS - libpkix does not return constructed chains on error, |
// preventing us from detecting/inspecting the verified chain. |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
#define MAYBE_VerifyIncompleteEndEntity DISABLED_VerifyIncompleteEndEntity |
#else |
#define MAYBE_VerifyIncompleteEndEntity VerifyIncompleteEndEntity |
@@ -1518,7 +1519,7 @@ const WeakDigestTestData kVerifyMixedTestData[] = { |
}; |
// NSS does not support MD4 and does not enable MD2 by default, making all |
// permutations invalid. |
-#if defined(USE_NSS) || defined(OS_IOS) |
+#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
#define MAYBE_VerifyMixed DISABLED_VerifyMixed |
#else |
#define MAYBE_VerifyMixed VerifyMixed |