| Index: crypto/encryptor_unittest.cc
|
| diff --git a/crypto/encryptor_unittest.cc b/crypto/encryptor_unittest.cc
|
| index ac78b966da394b4bbeec520ef8cb31312f33619f..a47c1830b15f7dbe961bb600a0c49d4fd033c1e1 100644
|
| --- a/crypto/encryptor_unittest.cc
|
| +++ b/crypto/encryptor_unittest.cc
|
| @@ -92,7 +92,7 @@ TEST(EncryptorTest, DecryptWrongKey) {
|
| // determine the padding length without checking every padding byte,
|
| // Encryptor::Decrypt() will still return true. This is the case for NSS
|
| // (crbug.com/124434) and Mac OS X 10.7 (crbug.com/127586).
|
| -#if !defined(USE_NSS)
|
| +#if !defined(USE_NSS) && !defined(OS_WIN) && !defined(OS_MACOSX)
|
| crypto::Encryptor decryptor;
|
| EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv));
|
| EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decypted));
|
|
|