Index: content/child/webcrypto/shared_crypto_unittest.cc |
diff --git a/content/child/webcrypto/shared_crypto_unittest.cc b/content/child/webcrypto/shared_crypto_unittest.cc |
index ad01f4e1ecce1c874df19e99173ffa0d79d2d45b..69f87f4919eb21349a2b9be07da6c3b5c15a5039 100644 |
--- a/content/child/webcrypto/shared_crypto_unittest.cc |
+++ b/content/child/webcrypto/shared_crypto_unittest.cc |
@@ -2442,7 +2442,7 @@ TEST_F(SharedCryptoTest, MAYBE(ImportRsaPrivateKeyJwkIncorrectOptionalEmpty)) { |
&key)); |
} |
-TEST_F(SharedCryptoTest, MAYBE(GenerateKeyPairRsa)) { |
+TEST_F(SharedCryptoTest, GenerateKeyPairRsa) { |
// Note: using unrealistic short key lengths here to avoid bogging down tests. |
// Successful WebCryptoAlgorithmIdRsaSsaPkcs1v1_5 key generation (sha256) |
@@ -2626,7 +2626,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateKeyPairRsa)) { |
ExportKey(blink::WebCryptoKeyFormatSpki, private_key, &output)); |
} |
-TEST_F(SharedCryptoTest, MAYBE(GenerateKeyPairRsaBadModulusLength)) { |
+TEST_F(SharedCryptoTest, GenerateKeyPairRsaBadModulusLength) { |
const unsigned int kBadModulusBits[] = { |
0, |
248, // Too small. |
@@ -2661,7 +2661,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateKeyPairRsaBadModulusLength)) { |
// exponents of 3 and 65537 are supported. While both OpenSSL and NSS can |
// support other values, OpenSSL hangs when given invalid exponents, so use a |
// whitelist to validate the parameters. |
-TEST_F(SharedCryptoTest, MAYBE(GenerateKeyPairRsaBadExponent)) { |
+TEST_F(SharedCryptoTest, GenerateKeyPairRsaBadExponent) { |
const unsigned int modulus_length = 1024; |
const char* const kPublicExponents[] = { |
@@ -4230,7 +4230,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateAesKeyBadUsages)) { |
// Generate an RSA-SSA key pair with invalid usages. RSA-SSA supports: |
// 'sign', 'verify' |
-TEST_F(SharedCryptoTest, MAYBE(GenerateRsaSsaBadUsages)) { |
+TEST_F(SharedCryptoTest, GenerateRsaSsaBadUsages) { |
blink::WebCryptoKeyUsageMask bad_usages[] = { |
blink::WebCryptoKeyUsageDecrypt, |
blink::WebCryptoKeyUsageVerify | blink::WebCryptoKeyUsageDecrypt, |
@@ -4262,7 +4262,7 @@ TEST_F(SharedCryptoTest, MAYBE(GenerateRsaSsaBadUsages)) { |
// Generate an RSA-SSA key pair. The public and private keys should select the |
// key usages which are applicable, and not have the exact same usages as was |
// specified to GenerateKey |
-TEST_F(SharedCryptoTest, MAYBE(GenerateRsaSsaKeyPairIntersectUsages)) { |
+TEST_F(SharedCryptoTest, GenerateRsaSsaKeyPairIntersectUsages) { |
const unsigned int modulus_length = 256; |
const std::vector<uint8_t> public_exponent = HexStringToBytes("010001"); |