| Index: net/cert/cert_verify_proc_unittest.cc
|
| diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc
|
| index 2c0e97dcdc1e31b9069a2324a6e70927d690f57c..c1722d5d69c1a4f04141fad2dec463f9059632ab 100644
|
| --- a/net/cert/cert_verify_proc_unittest.cc
|
| +++ b/net/cert/cert_verify_proc_unittest.cc
|
| @@ -528,7 +528,7 @@ TEST_F(CertVerifyProcTest, InvalidKeyUsage) {
|
| CertVerifyResult verify_result;
|
| int error = Verify(server_cert, "jira.aquameta.com", flags, NULL,
|
| empty_cert_list_, &verify_result);
|
| -#if defined(USE_OPENSSL)
|
| +#if defined(USE_OPENSSL) && !defined(OS_ANDROID)
|
| // This certificate has two errors: "invalid key usage" and "untrusted CA".
|
| // However, OpenSSL returns only one (the latter), and we can't detect
|
| // the other errors.
|
| @@ -539,7 +539,7 @@ TEST_F(CertVerifyProcTest, InvalidKeyUsage) {
|
| #endif
|
| // TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors
|
| // from NSS.
|
| -#if !defined(USE_NSS) && !defined(OS_IOS)
|
| +#if !defined(USE_NSS) && !defined(OS_IOS) && !defined(OS_ANDROID)
|
| // The certificate is issued by an unknown CA.
|
| EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| #endif
|
|
|