Index: net/cert/x509_util_unittest.cc |
diff --git a/net/cert/x509_util_unittest.cc b/net/cert/x509_util_unittest.cc |
index 6fabe000cfa827134eec161c95df6583e959af14..41521a1d33e63ea4b3d7434ee3930c04600e4d7c 100644 |
--- a/net/cert/x509_util_unittest.cc |
+++ b/net/cert/x509_util_unittest.cc |
@@ -188,7 +188,6 @@ TEST(X509UtilTest, CreateSelfSigned) { |
EXPECT_FALSE(cert->HasExpired()); |
} |
-#if defined(USE_OPENSSL) |
// This is a test case based on |
// http://blogs.msdn.com/b/openspecification/archive/2013/03/26/ntlm-and-channel-binding-hash-aka-exteneded-protection-for-authentication.aspx |
// There doesn't seem to be too many public test vectors for channel bindings. |
@@ -698,7 +697,6 @@ TEST(X509UtilTest, CreateChannelBindings_Unsupported_MD4) { |
x509_util::GetTLSServerEndPointChannelBinding(*cert, &channel_bindings)); |
EXPECT_TRUE(channel_bindings.empty()); |
} |
-#endif |
} // namespace x509_util |