Chromium Code Reviews| Index: crypto/ec_private_key_unittest.cc |
| diff --git a/crypto/ec_private_key_unittest.cc b/crypto/ec_private_key_unittest.cc |
| index d2ec256deda7461cd6ef8626437c66a3fae8d196..0e30d9209503537cda8c5f5814e1e293d8034cb6 100644 |
| --- a/crypto/ec_private_key_unittest.cc |
| +++ b/crypto/ec_private_key_unittest.cc |
| @@ -9,16 +9,9 @@ |
| #include "base/memory/scoped_ptr.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| -#if defined(USE_OPENSSL) |
| -// Once ECPrivateKey is implemented for OpenSSL, remove this #if block. |
| -// TODO(mattm): When that happens, also add some exported keys from each to test |
| +// TODO(mattm): also add some exported keys from each to test |
|
wtc
2013/10/14 21:45:07
Nit: remove "also".
digit1
2013/10/15 11:43:44
Done.
|
| // interop between NSS and OpenSSL. |
| -TEST(ECPrivateKeyUnitTest, OpenSSLStub) { |
| - scoped_ptr<crypto::ECPrivateKey> keypair1( |
| - crypto::ECPrivateKey::Create()); |
| - ASSERT_FALSE(keypair1.get()); |
| -} |
| -#else |
| + |
| // Generate random private keys. Export, then re-import. We should get |
| // back the same exact public key, and the private key should have the same |
| // value and elliptic curve params. |
| @@ -103,5 +96,4 @@ TEST(ECPrivateKeyUnitTest, BadPasswordTest) { |
| crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo( |
| password2, privkey1, pubkey1)); |
| ASSERT_FALSE(keypair2.get()); |
| -} |
| -#endif // !defined(USE_OPENSSL) |
| +} |