Index: crypto/encryptor_unittest.cc |
diff --git a/crypto/encryptor_unittest.cc b/crypto/encryptor_unittest.cc |
index ac78b966da394b4bbeec520ef8cb31312f33619f..a47c1830b15f7dbe961bb600a0c49d4fd033c1e1 100644 |
--- a/crypto/encryptor_unittest.cc |
+++ b/crypto/encryptor_unittest.cc |
@@ -92,7 +92,7 @@ TEST(EncryptorTest, DecryptWrongKey) { |
// determine the padding length without checking every padding byte, |
// Encryptor::Decrypt() will still return true. This is the case for NSS |
// (crbug.com/124434) and Mac OS X 10.7 (crbug.com/127586). |
-#if !defined(USE_NSS) |
+#if !defined(USE_NSS) && !defined(OS_WIN) && !defined(OS_MACOSX) |
crypto::Encryptor decryptor; |
EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv)); |
EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decypted)); |