| Index: net/url_request/url_request_unittest.cc | 
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc | 
| index 057900a9c7b392bc2ae4c5f47f7051a813d7700a..31657cb3d4407ea3836fff75080075de4ad9a174 100644 | 
| --- a/net/url_request/url_request_unittest.cc | 
| +++ b/net/url_request/url_request_unittest.cc | 
| @@ -9052,7 +9052,7 @@ class HTTPSOCSPTest : public HTTPSRequestTest { | 
| }; | 
|  | 
| static CertStatus ExpectedCertStatusForFailedOnlineRevocationCheck() { | 
| -#if defined(OS_WIN) | 
| +#if defined(OS_WIN) || defined(OS_MACOSX) | 
| // Windows can return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION but we don't | 
| // have that ability on other platforms. | 
| return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; | 
| @@ -9093,6 +9093,19 @@ static bool SystemUsesChromiumEVMetadata() { | 
| #endif | 
| } | 
|  | 
| +// Returns the expected CertStatus for tests that expect an online revocation | 
| +// check failure as a result of checking a test EV cert, which will not | 
| +// actually trigger an online revocation check on some platforms. | 
| +static CertStatus ExpectedCertStatusForFailedOnlineEVRevocationCheck() { | 
| +  if (SystemUsesChromiumEVMetadata()) { | 
| +    return ExpectedCertStatusForFailedOnlineRevocationCheck(); | 
| +  } else { | 
| +    // If SystemUsesChromiumEVMetadata is false, revocation checking will not | 
| +    // be enabled, and thus there will not be a revocation check to fail. | 
| +    return 0u; | 
| +  } | 
| +} | 
| + | 
| static bool SystemSupportsOCSP() { | 
| #if defined(OS_ANDROID) | 
| // TODO(jnd): http://crbug.com/117478 - EV verification is not yet supported. | 
| @@ -9144,10 +9157,7 @@ TEST_F(HTTPSOCSPTest, Revoked) { | 
| CertStatus cert_status; | 
| DoConnection(ssl_options, &cert_status); | 
|  | 
| -#if !(defined(OS_MACOSX) && !defined(OS_IOS)) | 
| -  // Doesn't pass on OS X yet for reasons that need to be investigated. | 
| EXPECT_EQ(CERT_STATUS_REVOKED, cert_status & CERT_STATUS_ALL_ERRORS); | 
| -#endif | 
| EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); | 
| EXPECT_TRUE(cert_status & CERT_STATUS_REV_CHECKING_ENABLED); | 
| } | 
| @@ -9654,7 +9664,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) { | 
| CertStatus cert_status; | 
| DoConnection(ssl_options, &cert_status); | 
|  | 
| -  EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), | 
| +  EXPECT_EQ(ExpectedCertStatusForFailedOnlineEVRevocationCheck(), | 
| cert_status & CERT_STATUS_ALL_ERRORS); | 
|  | 
| EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); | 
| @@ -9728,7 +9738,7 @@ TEST_F(HTTPSEVCRLSetTest, ExpiredCRLSet) { | 
| CertStatus cert_status; | 
| DoConnection(ssl_options, &cert_status); | 
|  | 
| -  EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), | 
| +  EXPECT_EQ(ExpectedCertStatusForFailedOnlineEVRevocationCheck(), | 
| cert_status & CERT_STATUS_ALL_ERRORS); | 
|  | 
| EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); | 
| @@ -9781,7 +9791,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSetNotCovered) { | 
| // Even with a fresh CRLSet, we should still do online revocation checks when | 
| // the certificate chain isn't covered by the CRLSet, which it isn't in this | 
| // test. | 
| -  EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), | 
| +  EXPECT_EQ(ExpectedCertStatusForFailedOnlineEVRevocationCheck(), | 
| cert_status & CERT_STATUS_ALL_ERRORS); | 
|  | 
| EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); | 
|  |