| Index: base/crypto/rsa_private_key_unittest.cc | 
| =================================================================== | 
| --- base/crypto/rsa_private_key_unittest.cc	(revision 42322) | 
| +++ base/crypto/rsa_private_key_unittest.cc	(working copy) | 
| @@ -3,17 +3,12 @@ | 
| // found in the LICENSE file. | 
|  | 
| #include "base/crypto/rsa_private_key.h" | 
| -#include "base/leak_annotations.h" | 
| #include "base/scoped_ptr.h" | 
| #include "testing/gtest/include/gtest/gtest.h" | 
|  | 
| // Generate random private keys with two different sizes. Reimport, then | 
| // export them again. We should get back the same exact bytes. | 
| TEST(RSAPrivateKeyUnitTest, InitRandomTest) { | 
| -  // This test currently leaks some memory, | 
| -  // see http://crbug.com/34742 | 
| -  ANNOTATE_SCOPED_MEMORY_LEAK; | 
| - | 
| scoped_ptr<base::RSAPrivateKey> keypair1(base::RSAPrivateKey::Create(1024)); | 
| scoped_ptr<base::RSAPrivateKey> keypair2(base::RSAPrivateKey::Create(2048)); | 
| ASSERT_TRUE(keypair1.get()); | 
| @@ -53,10 +48,6 @@ | 
| // Verify that generated public keys look good. This test data was generated | 
| // with the openssl command line tool. | 
| TEST(RSAPrivateKeyUnitTest, PublicKeyTest) { | 
| -  // This test currently leaks some memory, | 
| -  // see http://crbug.com/34742 | 
| -  ANNOTATE_SCOPED_MEMORY_LEAK; | 
| - | 
| const uint8 private_key_info[] = { | 
| 0x30, 0x82, 0x02, 0x78, 0x02, 0x01, 0x00, 0x30, | 
| 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, | 
| @@ -194,10 +185,6 @@ | 
| // | 
| // This test case verifies these two failures modes don't occur. | 
| TEST(RSAPrivateKeyUnitTest, ShortIntegers) { | 
| -  // This test currently leaks some memory, | 
| -  // see http://crbug.com/34742 | 
| -  ANNOTATE_SCOPED_MEMORY_LEAK; | 
| - | 
| const uint8 short_integer_with_high_bit[] = { | 
| 0x30, 0x82, 0x02, 0x77, 0x02, 0x01, 0x00, 0x30, | 
| 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, | 
|  |