Index: content/child/webcrypto/test/rsa_oaep_unittest.cc |
diff --git a/content/child/webcrypto/test/rsa_oaep_unittest.cc b/content/child/webcrypto/test/rsa_oaep_unittest.cc |
index f6bec71e4588506ad5f9618d7409f7698982e530..972ffaa943ab6058a932137a5e2da34193783225 100644 |
--- a/content/child/webcrypto/test/rsa_oaep_unittest.cc |
+++ b/content/child/webcrypto/test/rsa_oaep_unittest.cc |
@@ -47,7 +47,7 @@ TEST(WebCryptoRsaOaepTest, ImportPkcs8WithRsaEncryption) { |
return; |
} |
- blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey private_key; |
ASSERT_EQ(Status::Success(), |
ImportKey(blink::WebCryptoKeyFormatPkcs8, |
CryptoData(HexStringToBytes(kPrivateKeyPkcs8DerHex)), |
@@ -67,7 +67,7 @@ TEST(WebCryptoRsaOaepTest, ImportPublicJwkWithNoAlg) { |
scoped_ptr<base::DictionaryValue> jwk(CreatePublicKeyJwkDict()); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::Success(), |
ImportKeyJwkFromDict(*jwk.get(), |
CreateRsaHashedImportAlgorithm( |
@@ -87,7 +87,7 @@ TEST(WebCryptoRsaOaepTest, ImportPublicJwkWithMatchingAlg) { |
scoped_ptr<base::DictionaryValue> jwk(CreatePublicKeyJwkDict()); |
jwk->SetString("alg", "RSA-OAEP"); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::Success(), |
ImportKeyJwkFromDict(*jwk.get(), |
CreateRsaHashedImportAlgorithm( |
@@ -107,7 +107,7 @@ TEST(WebCryptoRsaOaepTest, ImportPublicJwkWithMismatchedAlgFails) { |
scoped_ptr<base::DictionaryValue> jwk(CreatePublicKeyJwkDict()); |
jwk->SetString("alg", "RSA-OAEP-512"); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::ErrorJwkAlgorithmInconsistent(), |
ImportKeyJwkFromDict(*jwk.get(), |
CreateRsaHashedImportAlgorithm( |
@@ -128,7 +128,7 @@ TEST(WebCryptoRsaOaepTest, ImportPublicJwkWithMismatchedTypeFails) { |
jwk->SetString("kty", "oct"); |
jwk->SetString("alg", "RSA-OAEP"); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::ErrorJwkUnexpectedKty("RSA"), |
ImportKeyJwkFromDict(*jwk.get(), |
CreateRsaHashedImportAlgorithm( |
@@ -160,7 +160,7 @@ TEST(WebCryptoRsaOaepTest, ExportPublicJwk) { |
jwk->SetString("alg", test_data.expected_jwk_alg); |
// Import the key in a known-good format |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::Success(), |
ImportKeyJwkFromDict( |
*jwk.get(), |
@@ -210,8 +210,8 @@ TEST(WebCryptoRsaOaepTest, EncryptDecryptKnownAnswerTest) { |
blink::WebCryptoAlgorithm import_algorithm = CreateRsaHashedImportAlgorithm( |
blink::WebCryptoAlgorithmIdRsaOaep, digest_algorithm.id()); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
- blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
+ blink::WebCryptoKey private_key; |
ASSERT_NO_FATAL_FAILURE(ImportRsaKeyPair(public_key_der, |
private_key_der, |
@@ -256,7 +256,7 @@ TEST(WebCryptoRsaOaepTest, EncryptWithLargeMessageFails) { |
scoped_ptr<base::DictionaryValue> jwk(CreatePublicKeyJwkDict()); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::Success(), |
ImportKeyJwkFromDict(*jwk.get(), |
CreateRsaHashedImportAlgorithm( |
@@ -323,7 +323,7 @@ TEST(WebCryptoRsaOaepTest, EncryptWithLargeDigestFails) { |
scoped_ptr<base::DictionaryValue> jwk(CreatePublicKeyJwkDict()); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::Success(), |
ImportKeyJwkFromDict(*jwk.get(), |
CreateRsaHashedImportAlgorithm( |
@@ -353,7 +353,7 @@ TEST(WebCryptoRsaOaepTest, DecryptWithLargeMessageFails) { |
return; |
} |
- blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey private_key; |
ASSERT_EQ(Status::Success(), |
ImportKey(blink::WebCryptoKeyFormatPkcs8, |
CryptoData(HexStringToBytes(kPrivateKeyPkcs8DerHex)), |
@@ -387,8 +387,8 @@ TEST(WebCryptoRsaOaepTest, WrapUnwrapRawKey) { |
blink::WebCryptoAlgorithm import_algorithm = CreateRsaHashedImportAlgorithm( |
blink::WebCryptoAlgorithmIdRsaOaep, blink::WebCryptoAlgorithmIdSha1); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
- blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
+ blink::WebCryptoKey private_key; |
ASSERT_NO_FATAL_FAILURE(ImportRsaKeyPair( |
HexStringToBytes(kPublicKeySpkiDerHex), |
@@ -432,7 +432,7 @@ TEST(WebCryptoRsaOaepTest, WrapUnwrapRawKey) { |
EXPECT_BYTES_EQ_HEX(key_hex, decrypted_key); |
// Now attempt to unwrap the key, which should also decrypt the data. |
- blink::WebCryptoKey unwrapped_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey unwrapped_key; |
ASSERT_EQ(Status::Success(), |
UnwrapKey(blink::WebCryptoKeyFormatRaw, |
CryptoData(wrapped_key), |
@@ -505,8 +505,8 @@ TEST(WebCryptoRsaOaepTest, WrapUnwrapJwkSymKey) { |
"37f3e1972c45a477e66db95c9609bb27f862700ef93379930786cf751b"; |
blink::WebCryptoAlgorithm import_algorithm = CreateRsaHashedImportAlgorithm( |
blink::WebCryptoAlgorithmIdRsaOaep, blink::WebCryptoAlgorithmIdSha1); |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
- blink::WebCryptoKey private_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
+ blink::WebCryptoKey private_key; |
ASSERT_NO_FATAL_FAILURE(ImportRsaKeyPair( |
HexStringToBytes(kPublicKey2048SpkiDerHex), |
@@ -551,7 +551,7 @@ TEST(WebCryptoRsaOaepTest, WrapUnwrapJwkSymKey) { |
decrypted_jwk, "A128CBC", key_hex, blink::WebCryptoKeyUsageEncrypt)); |
// Now attempt to unwrap the key, which should also decrypt the data. |
- blink::WebCryptoKey unwrapped_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey unwrapped_key; |
ASSERT_EQ(Status::Success(), |
UnwrapKey(blink::WebCryptoKeyFormatJwk, |
CryptoData(wrapped_key), |
@@ -598,7 +598,7 @@ TEST(WebCryptoRsaOaepTest, ImportExportJwkRsaPublicKey) { |
test.hash); |
// Import the spki to create a public key |
- blink::WebCryptoKey public_key = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key; |
ASSERT_EQ(Status::Success(), |
ImportKey(blink::WebCryptoKeyFormatSpki, |
CryptoData(HexStringToBytes(kPublicKeySpkiDerHex)), |
@@ -618,7 +618,7 @@ TEST(WebCryptoRsaOaepTest, ImportExportJwkRsaPublicKey) { |
test.usage)); |
// Import the JWK back in to create a new key |
- blink::WebCryptoKey public_key2 = blink::WebCryptoKey::createNull(); |
+ blink::WebCryptoKey public_key2; |
ASSERT_EQ(Status::Success(), |
ImportKey(blink::WebCryptoKeyFormatJwk, |
CryptoData(jwk), |