| Index: content/child/webcrypto/test/aes_gcm_unittest.cc
|
| diff --git a/content/child/webcrypto/test/aes_gcm_unittest.cc b/content/child/webcrypto/test/aes_gcm_unittest.cc
|
| index 2e30d8d3ef5af7fbc38e2e01e07334778c207ee9..e2e355402dced0ed2f23b226d1d04186717fcf77 100644
|
| --- a/content/child/webcrypto/test/aes_gcm_unittest.cc
|
| +++ b/content/child/webcrypto/test/aes_gcm_unittest.cc
|
| @@ -111,10 +111,21 @@ TEST(WebCryptoAesGcmTest, GenerateKeyBadLength) {
|
| SCOPED_TRACE(i);
|
| EXPECT_EQ(Status::ErrorGenerateAesKeyLength(),
|
| GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true,
|
| - 0, &key));
|
| + blink::WebCryptoKeyUsageDecrypt, &key));
|
| }
|
| }
|
|
|
| +TEST(WebCryptoAesGcmTest, GenerateKeyEmptyUsage) {
|
| + if (!SupportsAesGcm()) {
|
| + LOG(WARNING) << "AES GCM not supported, skipping tests";
|
| + return;
|
| + }
|
| +
|
| + blink::WebCryptoKey key;
|
| + EXPECT_EQ(Status::ErrorCreateKeyEmptyUsages(),
|
| + GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(256), true, 0, &key));
|
| +}
|
| +
|
| TEST(WebCryptoAesGcmTest, ImportExportJwk) {
|
| // Some Linux test runners may not have a new enough version of NSS.
|
| if (!SupportsAesGcm()) {
|
|
|