Index: crypto/ec_private_key_unittest.cc |
diff --git a/crypto/ec_private_key_unittest.cc b/crypto/ec_private_key_unittest.cc |
index d2ec256deda7461cd6ef8626437c66a3fae8d196..0e30d9209503537cda8c5f5814e1e293d8034cb6 100644 |
--- a/crypto/ec_private_key_unittest.cc |
+++ b/crypto/ec_private_key_unittest.cc |
@@ -9,16 +9,9 @@ |
#include "base/memory/scoped_ptr.h" |
#include "testing/gtest/include/gtest/gtest.h" |
-#if defined(USE_OPENSSL) |
-// Once ECPrivateKey is implemented for OpenSSL, remove this #if block. |
-// TODO(mattm): When that happens, also add some exported keys from each to test |
+// TODO(mattm): also add some exported keys from each to test |
wtc
2013/10/14 21:45:07
Nit: remove "also".
digit1
2013/10/15 11:43:44
Done.
|
// interop between NSS and OpenSSL. |
-TEST(ECPrivateKeyUnitTest, OpenSSLStub) { |
- scoped_ptr<crypto::ECPrivateKey> keypair1( |
- crypto::ECPrivateKey::Create()); |
- ASSERT_FALSE(keypair1.get()); |
-} |
-#else |
+ |
// Generate random private keys. Export, then re-import. We should get |
// back the same exact public key, and the private key should have the same |
// value and elliptic curve params. |
@@ -103,5 +96,4 @@ TEST(ECPrivateKeyUnitTest, BadPasswordTest) { |
crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo( |
password2, privkey1, pubkey1)); |
ASSERT_FALSE(keypair2.get()); |
-} |
-#endif // !defined(USE_OPENSSL) |
+} |