Index: content/child/webcrypto/test/ecdsa_unittest.cc |
diff --git a/content/child/webcrypto/test/ecdsa_unittest.cc b/content/child/webcrypto/test/ecdsa_unittest.cc |
index dc90cfcb98663ab7f4f09cd5e59b8cbc7ef842db..0ffbb8823a65c27d1415af1d2c83f198f71bc118 100644 |
--- a/content/child/webcrypto/test/ecdsa_unittest.cc |
+++ b/content/child/webcrypto/test/ecdsa_unittest.cc |
@@ -85,9 +85,8 @@ |
blink::WebCryptoKey private_key; |
ASSERT_EQ(Status::Success(), |
- GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, |
- blink::WebCryptoKeyUsageSign, &public_key, |
- &private_key)); |
+ GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0, |
+ &public_key, &private_key)); |
// Basic sanity checks on the generated key pair. |
EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
@@ -109,18 +108,6 @@ |
// Ensure all entries in the key sample set are unique. This is a simplistic |
// estimate of whether the generated keys appear random. |
EXPECT_FALSE(CopiesExist(serialized_keys)); |
-} |
- |
-TEST(WebCryptoEcdsaTest, GenerateKeyEmptyUsage) { |
- if (!SupportsEcdsa()) |
- return; |
- |
- blink::WebCryptoNamedCurve named_curve = blink::WebCryptoNamedCurveP256; |
- blink::WebCryptoKey public_key; |
- blink::WebCryptoKey private_key; |
- ASSERT_EQ(Status::ErrorCreateKeyEmptyUsages(), |
- GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0, |
- &public_key, &private_key)); |
} |
// Verify that ECDSA signatures are probabilistic. Signing the same message two |