Index: content/child/webcrypto/test/aes_gcm_unittest.cc |
diff --git a/content/child/webcrypto/test/aes_gcm_unittest.cc b/content/child/webcrypto/test/aes_gcm_unittest.cc |
index 2e30d8d3ef5af7fbc38e2e01e07334778c207ee9..e2e355402dced0ed2f23b226d1d04186717fcf77 100644 |
--- a/content/child/webcrypto/test/aes_gcm_unittest.cc |
+++ b/content/child/webcrypto/test/aes_gcm_unittest.cc |
@@ -111,10 +111,21 @@ TEST(WebCryptoAesGcmTest, GenerateKeyBadLength) { |
SCOPED_TRACE(i); |
EXPECT_EQ(Status::ErrorGenerateAesKeyLength(), |
GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(kKeyLen[i]), true, |
- 0, &key)); |
+ blink::WebCryptoKeyUsageDecrypt, &key)); |
} |
} |
+TEST(WebCryptoAesGcmTest, GenerateKeyEmptyUsage) { |
+ if (!SupportsAesGcm()) { |
+ LOG(WARNING) << "AES GCM not supported, skipping tests"; |
+ return; |
+ } |
+ |
+ blink::WebCryptoKey key; |
+ EXPECT_EQ(Status::ErrorCreateKeyEmptyUsages(), |
+ GenerateSecretKey(CreateAesGcmKeyGenAlgorithm(256), true, 0, &key)); |
+} |
+ |
TEST(WebCryptoAesGcmTest, ImportExportJwk) { |
// Some Linux test runners may not have a new enough version of NSS. |
if (!SupportsAesGcm()) { |