| Index: net/cert/ev_root_ca_metadata_unittest.cc
|
| diff --git a/net/cert/ev_root_ca_metadata_unittest.cc b/net/cert/ev_root_ca_metadata_unittest.cc
|
| index e26603c13ce64f59aaa84461c5270b6cfbaa76a0..39699e26564612d9ca992d2e7c00832564e9d333 100644
|
| --- a/net/cert/ev_root_ca_metadata_unittest.cc
|
| +++ b/net/cert/ev_root_ca_metadata_unittest.cc
|
| @@ -8,7 +8,7 @@
|
| #include "net/test/cert_test_util.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| -#if defined(USE_NSS)
|
| +#if defined(USE_NSS_CERTS)
|
| #include "crypto/scoped_nss_types.h"
|
| #endif
|
|
|
| @@ -16,7 +16,7 @@ namespace net {
|
|
|
| namespace {
|
|
|
| -#if defined(USE_NSS) || defined(OS_WIN)
|
| +#if defined(USE_NSS_CERTS) || defined(OS_WIN)
|
| const char kVerisignPolicy[] = "2.16.840.1.113733.1.7.23.6";
|
| const char kThawtePolicy[] = "2.16.840.1.113733.1.7.48.1";
|
| const char kFakePolicy[] = "2.16.840.1.42";
|
| @@ -37,9 +37,9 @@ class EVOidData {
|
| EVRootCAMetadata::PolicyOID fake_policy;
|
| };
|
|
|
| -#endif // defined(USE_NSS) || defined(OS_WIN)
|
| +#endif // defined(USE_NSS_CERTS) || defined(OS_WIN)
|
|
|
| -#if defined(USE_NSS)
|
| +#if defined(USE_NSS_CERTS)
|
|
|
| SECOidTag RegisterOID(PLArenaPool* arena, const char* oid_string) {
|
| SECOidData oid_data;
|
| @@ -90,7 +90,7 @@ bool EVOidData::Init() {
|
|
|
| #endif
|
|
|
| -#if defined(USE_NSS) || defined(OS_WIN)
|
| +#if defined(USE_NSS_CERTS) || defined(OS_WIN)
|
|
|
| class EVRootCAMetadataTest : public testing::Test {
|
| protected:
|
| @@ -135,7 +135,7 @@ TEST_F(EVRootCAMetadataTest, AddRemove) {
|
| ev_oid_data.fake_policy));
|
| }
|
|
|
| -#endif // defined(USE_NSS) || defined(OS_WIN)
|
| +#endif // defined(USE_NSS_CERTS) || defined(OS_WIN)
|
|
|
| } // namespace
|
|
|
|
|