Index: crypto/encryptor_unittest.cc |
diff --git a/crypto/encryptor_unittest.cc b/crypto/encryptor_unittest.cc |
index 547b7469dabb3de763df8cd8eac0a97722caf765..7166c74f6e6baf1f6e721389a49f2eaabbdad0a7 100644 |
--- a/crypto/encryptor_unittest.cc |
+++ b/crypto/encryptor_unittest.cc |
@@ -95,11 +95,9 @@ TEST(EncryptorTest, DecryptWrongKey) { |
// determine the padding length without checking every padding byte, |
// Encryptor::Decrypt() will still return true. This is the case for NSS |
// (crbug.com/124434). |
-#if !defined(USE_NSS_CERTS) && !defined(OS_WIN) && !defined(OS_MACOSX) |
crypto::Encryptor decryptor; |
EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv)); |
EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decrypted)); |
-#endif |
// This demonstrates that not all wrong keys can be detected by padding |
// error. This wrong key causes the last padding byte to be 1, which is |