| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index 620d8b81cb4681cb205da2ea93ffd7f5b73edd3c..cd165dc695bb0276c245006cb31f5267971ededb 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -9224,7 +9224,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest {
|
| CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get());
|
| test_root_.reset(new ScopedTestRoot(root_cert.get()));
|
|
|
| -#if defined(USE_NSS_VERIFIER)
|
| +#if defined(USE_NSS_CERTS)
|
| SetURLRequestContextForNSSHttpIO(&context_);
|
| EnsureNSSHttpIOInit();
|
| #endif
|
| @@ -9253,7 +9253,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest {
|
| }
|
|
|
| ~HTTPSOCSPTest() override {
|
| -#if defined(USE_NSS_VERIFIER)
|
| +#if defined(USE_NSS_CERTS)
|
| ShutdownNSSHttpIO();
|
| #endif
|
| }
|
| @@ -9293,7 +9293,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() {
|
| // If it does not, then tests which rely on 'hard fail' behaviour should be
|
| // skipped.
|
| static bool SystemSupportsHardFailRevocationChecking() {
|
| -#if defined(OS_WIN) || defined(USE_NSS_VERIFIER)
|
| +#if defined(OS_WIN) || defined(USE_NSS_CERTS)
|
| return true;
|
| #else
|
| return false;
|
| @@ -9332,7 +9332,7 @@ static bool SystemSupportsOCSP() {
|
| }
|
|
|
| static bool SystemSupportsOCSPStapling() {
|
| -#if defined(USE_NSS_VERIFIER)
|
| +#if defined(USE_NSS_CERTS)
|
| return true;
|
| #elif defined(OS_WIN)
|
| return base::win::GetVersion() >= base::win::VERSION_VISTA;
|
|
|