Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index a2da83abff4de7c4cad88bdb779fb07513bb4c0a..e5b5cc17580401686caeffa41ccb5671a26b0407 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -9134,7 +9134,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get()); |
test_root_.reset(new ScopedTestRoot(root_cert.get())); |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
SetURLRequestContextForNSSHttpIO(&context_); |
EnsureNSSHttpIOInit(); |
#endif |
@@ -9163,7 +9163,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
} |
~HTTPSOCSPTest() override { |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
ShutdownNSSHttpIO(); |
#endif |
} |
@@ -9203,7 +9203,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() { |
// If it does not, then tests which rely on 'hard fail' behaviour should be |
// skipped. |
static bool SystemSupportsHardFailRevocationChecking() { |
-#if defined(OS_WIN) || defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(OS_WIN) || defined(USE_NSS_VERIFIER) |
return true; |
#else |
return false; |
@@ -9242,7 +9242,7 @@ static bool SystemSupportsOCSP() { |
} |
static bool SystemSupportsOCSPStapling() { |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) |
+#if defined(USE_NSS_VERIFIER) |
return true; |
#elif defined(OS_WIN) |
return base::win::GetVersion() >= base::win::VERSION_VISTA; |