Index: net/cert/x509_util_unittest.cc |
diff --git a/net/cert/x509_util_unittest.cc b/net/cert/x509_util_unittest.cc |
index 665fe15e31f423fd1ecfe4d05a67750183a6ce99..2da48d8091226c88dbe71e5980d60866737cf8d0 100644 |
--- a/net/cert/x509_util_unittest.cc |
+++ b/net/cert/x509_util_unittest.cc |
@@ -188,7 +188,6 @@ TEST(X509UtilTest, CreateSelfSigned) { |
EXPECT_FALSE(cert->HasExpired()); |
} |
-#if defined(USE_OPENSSL) |
// This is a test case based on |
// http://blogs.msdn.com/b/openspecification/archive/2013/03/26/ntlm-and-channel-binding-hash-aka-exteneded-protection-for-authentication.aspx |
// There doesn't seem to be too many public test vectors for channel bindings. |
@@ -698,7 +697,6 @@ TEST(X509UtilTest, CreateChannelBindings_Unsupported_MD4) { |
x509_util::GetTLSServerEndPointChannelBinding(*cert, &channel_bindings)); |
EXPECT_TRUE(channel_bindings.empty()); |
} |
-#endif |
} // namespace x509_util |