| Index: components/webcrypto/algorithms/rsa_pss_unittest.cc
|
| diff --git a/components/webcrypto/algorithms/rsa_pss_unittest.cc b/components/webcrypto/algorithms/rsa_pss_unittest.cc
|
| index 3297c89f4b10550be05d5c726e89520e41bb42c7..00ef290503e60d273d837b64374ab2c531e6507f 100644
|
| --- a/components/webcrypto/algorithms/rsa_pss_unittest.cc
|
| +++ b/components/webcrypto/algorithms/rsa_pss_unittest.cc
|
| @@ -19,14 +19,6 @@ namespace webcrypto {
|
|
|
| namespace {
|
|
|
| -bool SupportsRsaPss() {
|
| -#if defined(USE_OPENSSL)
|
| - return true;
|
| -#else
|
| - return false;
|
| -#endif
|
| -}
|
| -
|
| blink::WebCryptoAlgorithm CreateRsaPssAlgorithm(
|
| unsigned int salt_length_bytes) {
|
| return blink::WebCryptoAlgorithm::adoptParamsAndCreate(
|
| @@ -39,11 +31,6 @@ class WebCryptoRsaPssTest : public WebCryptoTestBase {};
|
| // Test that no two RSA-PSS signatures are identical, when using a non-zero
|
| // lengthed salt.
|
| TEST_F(WebCryptoRsaPssTest, SignIsRandom) {
|
| - if (!SupportsRsaPss()) {
|
| - LOG(WARNING) << "Skipping test because RSA-PSS is not supported";
|
| - return;
|
| - }
|
| -
|
| // Import public/private key pair.
|
| blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| @@ -97,11 +84,6 @@ TEST_F(WebCryptoRsaPssTest, SignIsRandom) {
|
| // Try signing and verifying when the salt length is 0. The signature in this
|
| // case is not random.
|
| TEST_F(WebCryptoRsaPssTest, SignVerifyNoSalt) {
|
| - if (!SupportsRsaPss()) {
|
| - LOG(WARNING) << "Skipping test because RSA-PSS is not supported";
|
| - return;
|
| - }
|
| -
|
| // Import public/private key pair.
|
| blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| @@ -147,11 +129,6 @@ TEST_F(WebCryptoRsaPssTest, SignVerifyNoSalt) {
|
| }
|
|
|
| TEST_F(WebCryptoRsaPssTest, SignEmptyMessage) {
|
| - if (!SupportsRsaPss()) {
|
| - LOG(WARNING) << "Skipping test because RSA-PSS is not supported";
|
| - return;
|
| - }
|
| -
|
| // Import public/private key pair.
|
| blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull();
|
| blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull();
|
| @@ -189,11 +166,6 @@ TEST_F(WebCryptoRsaPssTest, SignEmptyMessage) {
|
| // * Verify over corrupted message should fail
|
| // * Verification with corrupted signature should fail
|
| TEST_F(WebCryptoRsaPssTest, VerifyKnownAnswer) {
|
| - if (!SupportsRsaPss()) {
|
| - LOG(WARNING) << "Skipping test because RSA-PSS is not supported";
|
| - return;
|
| - }
|
| -
|
| scoped_ptr<base::DictionaryValue> test_data;
|
| ASSERT_TRUE(ReadJsonTestFileToDictionary("rsa_pss.json", &test_data));
|
|
|
|
|