| Index: content/child/webcrypto/shared_crypto_unittest.cc
|
| diff --git a/content/child/webcrypto/shared_crypto_unittest.cc b/content/child/webcrypto/shared_crypto_unittest.cc
|
| index 814a26fb45ff31d140754e9e2ac4a3504cf9fdab..bb6eb64b6843f3e5533a705d83b7f71c7de56fe6 100644
|
| --- a/content/child/webcrypto/shared_crypto_unittest.cc
|
| +++ b/content/child/webcrypto/shared_crypto_unittest.cc
|
| @@ -675,9 +675,7 @@ TEST_F(SharedCryptoTest, HMACSampleSets) {
|
| blink::WebCryptoKeyUsageSign | blink::WebCryptoKeyUsageVerify);
|
|
|
| EXPECT_EQ(test_hash.id(), key.algorithm().hmacParams()->hash().id());
|
| -#if defined(WEBCRYPTO_HMAC_KEY_HAS_LENGTH)
|
| EXPECT_EQ(test_key.size() * 8, key.algorithm().hmacParams()->lengthBits());
|
| -#endif
|
|
|
| // Verify exported raw key is identical to the imported data
|
| blink::WebArrayBuffer raw_key;
|
| @@ -958,9 +956,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateKeyHmac)) {
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdHmac, key.algorithm().id());
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdSha1,
|
| key.algorithm().hmacParams()->hash().id());
|
| -#if defined(WEBCRYPTO_HMAC_KEY_HAS_LENGTH)
|
| EXPECT_EQ(512u, key.algorithm().hmacParams()->lengthBits());
|
| -#endif
|
|
|
| blink::WebArrayBuffer raw_key;
|
| ASSERT_STATUS_SUCCESS(
|
| @@ -984,9 +980,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateKeyHmacNoLength)) {
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdHmac, key.algorithm().id());
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdSha1,
|
| key.algorithm().hmacParams()->hash().id());
|
| -#if defined(WEBCRYPTO_HMAC_KEY_HAS_LENGTH)
|
| - EXPECT_EQ(512u, key.algorithm().hmacParams()->lengthBits());
|
| -#endif
|
| + EXPECT_EQ(512u, key.algorithm().hmacParams()->lengthBits());
|
| blink::WebArrayBuffer raw_key;
|
| ASSERT_STATUS_SUCCESS(ExportKey(blink::WebCryptoKeyFormatRaw, key, &raw_key));
|
| EXPECT_EQ(64U, raw_key.byteLength());
|
| @@ -997,9 +991,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateKeyHmacNoLength)) {
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdHmac, key.algorithm().id());
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdSha512,
|
| key.algorithm().hmacParams()->hash().id());
|
| -#if defined(WEBCRYPTO_HMAC_KEY_HAS_LENGTH)
|
| - EXPECT_EQ(1024u, key.algorithm().hmacParams()->lengthBits());
|
| -#endif
|
| + EXPECT_EQ(1024u, key.algorithm().hmacParams()->lengthBits());
|
| ASSERT_STATUS_SUCCESS(ExportKey(blink::WebCryptoKeyFormatRaw, key, &raw_key));
|
| EXPECT_EQ(128U, raw_key.byteLength());
|
| }
|
| @@ -1376,9 +1368,7 @@ TEST_F(SharedCryptoTest, MAYBE(ImportJwkInputConsistency)) {
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdHmac, key.algorithm().id());
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdSha256,
|
| key.algorithm().hmacParams()->hash().id());
|
| -#if defined(WEBCRYPTO_HMAC_KEY_HAS_LENGTH)
|
| - EXPECT_EQ(320u, key.algorithm().hmacParams()->lengthBits());
|
| -#endif
|
| + EXPECT_EQ(320u, key.algorithm().hmacParams()->lengthBits());
|
| EXPECT_EQ(blink::WebCryptoKeyUsageVerify, key.usages());
|
| key = blink::WebCryptoKey::createNull();
|
|
|
| @@ -2637,9 +2627,7 @@ TEST_F(SharedCryptoTest, MAYBE(AesKwJwkSymkeyUnwrapKnownData)) {
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdHmac, unwrapped_key.algorithm().id());
|
| EXPECT_EQ(blink::WebCryptoAlgorithmIdSha256,
|
| unwrapped_key.algorithm().hmacParams()->hash().id());
|
| -#if defined(WEBCRYPTO_HMAC_KEY_HAS_LENGTH)
|
| EXPECT_EQ(256u, unwrapped_key.algorithm().hmacParams()->lengthBits());
|
| -#endif
|
| EXPECT_EQ(true, unwrapped_key.extractable());
|
| EXPECT_EQ(blink::WebCryptoKeyUsageVerify, unwrapped_key.usages());
|
|
|
|
|