| Index: net/cert/internal/parse_certificate_unittest.cc
|
| diff --git a/net/cert/internal/parse_certificate_unittest.cc b/net/cert/internal/parse_certificate_unittest.cc
|
| index a54d895acba757271f3889f1dd67f499164f2169..6ddc768f68fbf31b2305cf5f2d421b9073775f25 100644
|
| --- a/net/cert/internal/parse_certificate_unittest.cc
|
| +++ b/net/cert/internal/parse_certificate_unittest.cc
|
| @@ -214,27 +214,6 @@ TEST(ParseTbsCertificateTest, Version3WithExtensions) {
|
| RunTbsCertificateTest("tbs_v3_extensions.pem");
|
| }
|
|
|
| -// Tests parsing a TBSCertificate for v3 that contains no optional fields, and
|
| -// has a negative serial number.
|
| -//
|
| -// CAs are not supposed to include negative serial numbers, however RFC 5280
|
| -// expects consumers to deal with it anyway).
|
| -TEST(ParseTbsCertificateTest, NegativeSerialNumber) {
|
| - RunTbsCertificateTest("tbs_negative_serial_number.pem");
|
| -}
|
| -
|
| -// Tests parsing a TBSCertificate with a serial number that is 21 octets long
|
| -// (and the first byte is 0).
|
| -TEST(ParseTbCertificateTest, SerialNumber21OctetsLeading0) {
|
| - RunTbsCertificateTest("tbs_serial_number_21_octets_leading_0.pem");
|
| -}
|
| -
|
| -// Tests parsing a TBSCertificate with a serial number that is 26 octets long
|
| -// (and does not contain a leading 0).
|
| -TEST(ParseTbsCertificateTest, SerialNumber26Octets) {
|
| - RunTbsCertificateTest("tbs_serial_number_26_octets.pem");
|
| -}
|
| -
|
| // Tests parsing a TBSCertificate which lacks a version number (causing it to
|
| // default to v1).
|
| TEST(ParseTbsCertificateTest, Version1) {
|
|
|