Use the MAYBE/DISABLED pattern in RSATest.BlindingCacheConcurrency. Change-Id: Ia3565c117eb952a106bc5f1ab7d5231708854483 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/39606 Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: Adam Langley <agl@google.com>
diff --git a/crypto/rsa_extra/rsa_test.cc b/crypto/rsa_extra/rsa_test.cc index 0df21c0..76cf50a 100644 --- a/crypto/rsa_extra/rsa_test.cc +++ b/crypto/rsa_extra/rsa_test.cc
@@ -1118,9 +1118,13 @@ } } -#if defined(OPENSSL_X86_64) // This test might be excessively slow on slower CPUs. -TEST(RSATest, BlindingCacheConcurrency) { +#if defined(OPENSSL_X86_64) +#define MAYBE_BlindingCacheConcurrency BlindingCacheConcurrency +#else +#define MAYBE_BlindingCacheConcurrency DISABLED_BlindingCacheConcurrency +#endif +TEST(RSATest, MAYBE_BlindingCacheConcurrency) { bssl::UniquePtr<RSA> rsa( RSA_private_key_from_bytes(kKey1, sizeof(kKey1) - 1)); ASSERT_TRUE(rsa); @@ -1154,6 +1158,5 @@ thread.join(); } } -#endif // X86_64 #endif // THREADS