| Index: net/cert/x509_util_unittest.cc
|
| diff --git a/net/cert/x509_util_unittest.cc b/net/cert/x509_util_unittest.cc
|
| index 6fabe000cfa827134eec161c95df6583e959af14..41521a1d33e63ea4b3d7434ee3930c04600e4d7c 100644
|
| --- a/net/cert/x509_util_unittest.cc
|
| +++ b/net/cert/x509_util_unittest.cc
|
| @@ -188,7 +188,6 @@ TEST(X509UtilTest, CreateSelfSigned) {
|
| EXPECT_FALSE(cert->HasExpired());
|
| }
|
|
|
| -#if defined(USE_OPENSSL)
|
| // This is a test case based on
|
| // http://blogs.msdn.com/b/openspecification/archive/2013/03/26/ntlm-and-channel-binding-hash-aka-exteneded-protection-for-authentication.aspx
|
| // There doesn't seem to be too many public test vectors for channel bindings.
|
| @@ -698,7 +697,6 @@ TEST(X509UtilTest, CreateChannelBindings_Unsupported_MD4) {
|
| x509_util::GetTLSServerEndPointChannelBinding(*cert, &channel_bindings));
|
| EXPECT_TRUE(channel_bindings.empty());
|
| }
|
| -#endif
|
|
|
| } // namespace x509_util
|
|
|
|
|