Index: net/cert/internal/parse_certificate_unittest.cc |
diff --git a/net/cert/internal/parse_certificate_unittest.cc b/net/cert/internal/parse_certificate_unittest.cc |
index a54d895acba757271f3889f1dd67f499164f2169..6ddc768f68fbf31b2305cf5f2d421b9073775f25 100644 |
--- a/net/cert/internal/parse_certificate_unittest.cc |
+++ b/net/cert/internal/parse_certificate_unittest.cc |
@@ -214,27 +214,6 @@ TEST(ParseTbsCertificateTest, Version3WithExtensions) { |
RunTbsCertificateTest("tbs_v3_extensions.pem"); |
} |
-// Tests parsing a TBSCertificate for v3 that contains no optional fields, and |
-// has a negative serial number. |
-// |
-// CAs are not supposed to include negative serial numbers, however RFC 5280 |
-// expects consumers to deal with it anyway). |
-TEST(ParseTbsCertificateTest, NegativeSerialNumber) { |
- RunTbsCertificateTest("tbs_negative_serial_number.pem"); |
-} |
- |
-// Tests parsing a TBSCertificate with a serial number that is 21 octets long |
-// (and the first byte is 0). |
-TEST(ParseTbCertificateTest, SerialNumber21OctetsLeading0) { |
- RunTbsCertificateTest("tbs_serial_number_21_octets_leading_0.pem"); |
-} |
- |
-// Tests parsing a TBSCertificate with a serial number that is 26 octets long |
-// (and does not contain a leading 0). |
-TEST(ParseTbsCertificateTest, SerialNumber26Octets) { |
- RunTbsCertificateTest("tbs_serial_number_26_octets.pem"); |
-} |
- |
// Tests parsing a TBSCertificate which lacks a version number (causing it to |
// default to v1). |
TEST(ParseTbsCertificateTest, Version1) { |