Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index c59ee4fdda91bfd595c34edf5818bf5cee1ac99e..200349b468ee61495a3ca22f4e25c90e3f9a9750 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -9235,7 +9235,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get()); |
test_root_.reset(new ScopedTestRoot(root_cert.get())); |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
SetURLRequestContextForNSSHttpIO(&context_); |
EnsureNSSHttpIOInit(); |
#endif |
@@ -9264,7 +9264,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
} |
~HTTPSOCSPTest() override { |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
ShutdownNSSHttpIO(); |
#endif |
} |
@@ -9304,7 +9304,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() { |
// If it does not, then tests which rely on 'hard fail' behaviour should be |
// skipped. |
static bool SystemSupportsHardFailRevocationChecking() { |
-#if defined(OS_WIN) || defined(USE_NSS_VERIFIER) |
+#if defined(OS_WIN) || defined(USE_NSS_CERTS) |
return true; |
#else |
return false; |
@@ -9343,7 +9343,7 @@ static bool SystemSupportsOCSP() { |
} |
static bool SystemSupportsOCSPStapling() { |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
return true; |
#elif defined(OS_WIN) |
return base::win::GetVersion() >= base::win::VERSION_VISTA; |