| Index: net/cert/cert_verify_proc_unittest.cc
|
| diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc
|
| index be7f4d1b3b3250e7b05a804948e95b824bd80e16..1202d049282eda930a0e9bf7e0cfd6fb96e0bda8 100644
|
| --- a/net/cert/cert_verify_proc_unittest.cc
|
| +++ b/net/cert/cert_verify_proc_unittest.cc
|
| @@ -245,7 +245,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) {
|
| NULL,
|
| empty_cert_list_,
|
| &verify_result);
|
| -#if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_ANDROID)
|
| +#if defined(USE_NSS_VERIFIER) || defined(OS_ANDROID)
|
| EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error);
|
| #else
|
| // TOOD(bulach): investigate why macosx and win aren't returning
|
| @@ -255,7 +255,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) {
|
| // Either the system crypto library should correctly report a certificate
|
| // name mismatch, or our certificate blacklist should cause us to report an
|
| // invalid certificate.
|
| -#if defined(USE_NSS_CERTS) || defined(OS_WIN) || defined(OS_IOS)
|
| +#if defined(USE_NSS_VERIFIER) || defined(OS_WIN)
|
| EXPECT_TRUE(verify_result.cert_status &
|
| (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
|
| #endif
|
|
|