Index: content/child/webcrypto/test/aes_gcm_unittest.cc |
diff --git a/content/child/webcrypto/test/aes_gcm_unittest.cc b/content/child/webcrypto/test/aes_gcm_unittest.cc |
index 03464145f88948b2b593812faf88486eebcdaada..2c2046fc1258c56f1f345826c01abdcb4d622fe2 100644 |
--- a/content/child/webcrypto/test/aes_gcm_unittest.cc |
+++ b/content/child/webcrypto/test/aes_gcm_unittest.cc |
@@ -113,11 +113,22 @@ TEST(WebCryptoAesGcmTest, GenerateKeyBadLength) { |
for (size_t i = 0; i < arraysize(kKeyLen); ++i) { |
SCOPED_TRACE(i); |
EXPECT_EQ(Status::ErrorGenerateKeyLength(), |
- GenerateSecretKey( |
- CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, 0, &key)); |
+ GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, |
+ blink::WebCryptoKeyUsageDecrypt, &key)); |
} |
} |
+TEST(WebCryptoAesGcmTest, GenerateKeyEmptyUsage) { |
+ if (!SupportsAesGcm()) { |
+ LOG(WARNING) << "AES GCM not supported, skipping tests"; |
+ return; |
+ } |
+ |
+ blink::WebCryptoKey key; |
+ EXPECT_EQ(Status::ErrorCreateKeyEmptyUsages(), |
+ GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(256), true, 0, &key)); |
+} |
+ |
TEST(WebCryptoAesGcmTest, ImportExportJwk) { |
// Some Linux test runners may not have a new enough version of NSS. |
if (!SupportsAesGcm()) { |