Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index be7f4d1b3b3250e7b05a804948e95b824bd80e16..1202d049282eda930a0e9bf7e0cfd6fb96e0bda8 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -245,7 +245,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) { |
NULL, |
empty_cert_list_, |
&verify_result); |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_ANDROID) |
+#if defined(USE_NSS_VERIFIER) || defined(OS_ANDROID) |
EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
#else |
// TOOD(bulach): investigate why macosx and win aren't returning |
@@ -255,7 +255,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) { |
// Either the system crypto library should correctly report a certificate |
// name mismatch, or our certificate blacklist should cause us to report an |
// invalid certificate. |
-#if defined(USE_NSS_CERTS) || defined(OS_WIN) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) || defined(OS_WIN) |
EXPECT_TRUE(verify_result.cert_status & |
(CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID)); |
#endif |