| Index: crypto/encryptor_unittest.cc
|
| diff --git a/crypto/encryptor_unittest.cc b/crypto/encryptor_unittest.cc
|
| index 547b7469dabb3de763df8cd8eac0a97722caf765..7166c74f6e6baf1f6e721389a49f2eaabbdad0a7 100644
|
| --- a/crypto/encryptor_unittest.cc
|
| +++ b/crypto/encryptor_unittest.cc
|
| @@ -95,11 +95,9 @@ TEST(EncryptorTest, DecryptWrongKey) {
|
| // determine the padding length without checking every padding byte,
|
| // Encryptor::Decrypt() will still return true. This is the case for NSS
|
| // (crbug.com/124434).
|
| -#if !defined(USE_NSS_CERTS) && !defined(OS_WIN) && !defined(OS_MACOSX)
|
| crypto::Encryptor decryptor;
|
| EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv));
|
| EXPECT_FALSE(decryptor.Decrypt(ciphertext, &decrypted));
|
| -#endif
|
|
|
| // This demonstrates that not all wrong keys can be detected by padding
|
| // error. This wrong key causes the last padding byte to be 1, which is
|
|
|