Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index 9d7e7503ba4d62ed1c79cf1b741a88d0d9674c5b..05335b62a2c3e0d57fabf89d8e68a907f8e4731b 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -157,7 +157,7 @@ TEST_F(CertVerifyProcTest, DISABLED_WithoutRevocationChecking) { |
&verify_result)); |
} |
-#if defined(OS_ANDROID) || defined(USE_OPENSSL) |
+#if defined(OS_ANDROID) || defined(USE_OPENSSL_CERTS) |
// TODO(jnd): http://crbug.com/117478 - EV verification is not yet supported. |
#define MAYBE_EVVerification DISABLED_EVVerification |
#else |
@@ -724,7 +724,7 @@ TEST_F(CertVerifyProcTest, InvalidKeyUsage) { |
NULL, |
empty_cert_list_, |
&verify_result); |
-#if defined(USE_OPENSSL) && !defined(OS_ANDROID) |
+#if defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID) |
// This certificate has two errors: "invalid key usage" and "untrusted CA". |
// However, OpenSSL returns only one (the latter), and we can't detect |
// the other errors. |
@@ -1402,7 +1402,7 @@ TEST_P(CertVerifyProcWeakDigestTest, Verify) { |
const WeakDigestTestData kVerifyRootCATestData[] = { |
{ "weak_digest_md5_root.pem", "weak_digest_sha1_intermediate.pem", |
"weak_digest_sha1_ee.pem", false, false, false }, |
-#if defined(USE_OPENSSL) || defined(OS_WIN) |
+#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) |
// MD4 is not supported by OS X / NSS |
{ "weak_digest_md4_root.pem", "weak_digest_sha1_intermediate.pem", |
"weak_digest_sha1_ee.pem", false, false, false }, |
@@ -1417,7 +1417,7 @@ INSTANTIATE_TEST_CASE_P(VerifyRoot, CertVerifyProcWeakDigestTest, |
const WeakDigestTestData kVerifyIntermediateCATestData[] = { |
{ "weak_digest_sha1_root.pem", "weak_digest_md5_intermediate.pem", |
"weak_digest_sha1_ee.pem", true, false, false }, |
-#if defined(USE_OPENSSL) || defined(OS_WIN) |
+#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) |
// MD4 is not supported by OS X / NSS |
{ "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem", |
"weak_digest_sha1_ee.pem", false, true, false }, |
@@ -1440,7 +1440,7 @@ WRAPPED_INSTANTIATE_TEST_CASE_P( |
const WeakDigestTestData kVerifyEndEntityTestData[] = { |
{ "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", |
"weak_digest_md5_ee.pem", true, false, false }, |
-#if defined(USE_OPENSSL) || defined(OS_WIN) |
+#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) |
// MD4 is not supported by OS X / NSS |
{ "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", |
"weak_digest_md4_ee.pem", false, true, false }, |
@@ -1464,7 +1464,7 @@ WRAPPED_INSTANTIATE_TEST_CASE_P(MAYBE_VerifyEndEntity, |
const WeakDigestTestData kVerifyIncompleteIntermediateTestData[] = { |
{ NULL, "weak_digest_md5_intermediate.pem", "weak_digest_sha1_ee.pem", |
true, false, false }, |
-#if defined(USE_OPENSSL) || defined(OS_WIN) |
+#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) |
// MD4 is not supported by OS X / NSS |
{ NULL, "weak_digest_md4_intermediate.pem", "weak_digest_sha1_ee.pem", |
false, true, false }, |
@@ -1489,7 +1489,7 @@ WRAPPED_INSTANTIATE_TEST_CASE_P( |
const WeakDigestTestData kVerifyIncompleteEETestData[] = { |
{ NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md5_ee.pem", |
true, false, false }, |
-#if defined(USE_OPENSSL) || defined(OS_WIN) |
+#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) |
// MD4 is not supported by OS X / NSS |
{ NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md4_ee.pem", |
false, true, false }, |
@@ -1516,7 +1516,7 @@ const WeakDigestTestData kVerifyMixedTestData[] = { |
"weak_digest_md2_ee.pem", true, false, true }, |
{ "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem", |
"weak_digest_md5_ee.pem", true, false, true }, |
-#if defined(USE_OPENSSL) || defined(OS_WIN) |
+#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) |
// MD4 is not supported by OS X / NSS |
{ "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem", |
"weak_digest_md2_ee.pem", false, true, true }, |