| Index: content/child/webcrypto/test/aes_gcm_unittest.cc
|
| diff --git a/content/child/webcrypto/test/aes_gcm_unittest.cc b/content/child/webcrypto/test/aes_gcm_unittest.cc
|
| index 03464145f88948b2b593812faf88486eebcdaada..c5e2a3207c0e0dd43d8ec9b4e2ba335dd1e4c64a 100644
|
| --- a/content/child/webcrypto/test/aes_gcm_unittest.cc
|
| +++ b/content/child/webcrypto/test/aes_gcm_unittest.cc
|
| @@ -114,10 +114,22 @@ TEST(WebCryptoAesGcmTest, GenerateKeyBadLength) {
|
| SCOPED_TRACE(i);
|
| EXPECT_EQ(Status::ErrorGenerateKeyLength(),
|
| GenerateSecretKey(
|
| - CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, 0, &key));
|
| + CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true,
|
| + blink::WebCryptoKeyUsageDecrypt, &key));
|
| }
|
| }
|
|
|
| +TEST(WebCryptoAesGcmTest, GenerateKeyEmptyUsage) {
|
| + if (!SupportsAesGcm()) {
|
| + LOG(WARNING) << "AES GCM not supported, skipping tests";
|
| + return;
|
| + }
|
| +
|
| + blink::WebCryptoKey key;
|
| + EXPECT_EQ(Status::ErrorCreateKeyBadUsages(),
|
| + GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(256), true, 0, &key));
|
| +}
|
| +
|
| TEST(WebCryptoAesGcmTest, ImportExportJwk) {
|
| // Some Linux test runners may not have a new enough version of NSS.
|
| if (!SupportsAesGcm()) {
|
|
|