Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index 620d8b81cb4681cb205da2ea93ffd7f5b73edd3c..cd165dc695bb0276c245006cb31f5267971ededb 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -9224,7 +9224,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
CHECK_NE(static_cast<X509Certificate*>(NULL), root_cert.get()); |
test_root_.reset(new ScopedTestRoot(root_cert.get())); |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
SetURLRequestContextForNSSHttpIO(&context_); |
EnsureNSSHttpIOInit(); |
#endif |
@@ -9253,7 +9253,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
} |
~HTTPSOCSPTest() override { |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
ShutdownNSSHttpIO(); |
#endif |
} |
@@ -9293,7 +9293,7 @@ static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() { |
// If it does not, then tests which rely on 'hard fail' behaviour should be |
// skipped. |
static bool SystemSupportsHardFailRevocationChecking() { |
-#if defined(OS_WIN) || defined(USE_NSS_VERIFIER) |
+#if defined(OS_WIN) || defined(USE_NSS_CERTS) |
return true; |
#else |
return false; |
@@ -9332,7 +9332,7 @@ static bool SystemSupportsOCSP() { |
} |
static bool SystemSupportsOCSPStapling() { |
-#if defined(USE_NSS_VERIFIER) |
+#if defined(USE_NSS_CERTS) |
return true; |
#elif defined(OS_WIN) |
return base::win::GetVersion() >= base::win::VERSION_VISTA; |