| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index c59ee4fdda91bfd595c34edf5818bf5cee1ac99e..200349b468ee61495a3ca22f4e25c90e3f9a9750 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -9235,7 +9235,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest {
|
| CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get());
|
| test_root_.reset(new ScopedTestRoot(root_cert.get()));
|
|
|
| -#if defined(USE_NSS_VERIFIER)
|
| +#if defined(USE_NSS_CERTS)
|
| SetURLRequestContextForNSSHttpIO(&context_);
|
| EnsureNSSHttpIOInit();
|
| #endif
|
| @@ -9264,7 +9264,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest {
|
| }
|
|
|
| ~HTTPSOCSPTest() override {
|
| -#if defined(USE_NSS_VERIFIER)
|
| +#if defined(USE_NSS_CERTS)
|
| ShutdownNSSHttpIO();
|
| #endif
|
| }
|
| @@ -9304,7 +9304,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() {
|
| // If it does not, then tests which rely on 'hard fail' behaviour should be
|
| // skipped.
|
| static bool SystemSupportsHardFailRevocationChecking() {
|
| -#if defined(OS_WIN) || defined(USE_NSS_VERIFIER)
|
| +#if defined(OS_WIN) || defined(USE_NSS_CERTS)
|
| return true;
|
| #else
|
| return false;
|
| @@ -9343,7 +9343,7 @@ static bool SystemSupportsOCSP() {
|
| }
|
|
|
| static bool SystemSupportsOCSPStapling() {
|
| -#if defined(USE_NSS_VERIFIER)
|
| +#if defined(USE_NSS_CERTS)
|
| return true;
|
| #elif defined(OS_WIN)
|
| return base::win::GetVersion() >= base::win::VERSION_VISTA;
|
|
|