| Index: chrome/browser/metrics/variations/variations_seed_store_unittest.cc
|
| diff --git a/chrome/browser/metrics/variations/variations_seed_store_unittest.cc b/chrome/browser/metrics/variations/variations_seed_store_unittest.cc
|
| index 6f42c807bf3360a0ef55cdc61ad66638707468b4..4c7fedb2af2c44b3181b232e0367f795a53d2607 100644
|
| --- a/chrome/browser/metrics/variations/variations_seed_store_unittest.cc
|
| +++ b/chrome/browser/metrics/variations/variations_seed_store_unittest.cc
|
| @@ -121,6 +121,42 @@ TEST(VariationsSeedStoreTest, LoadSeed) {
|
| EXPECT_TRUE(PrefHasDefaultValue(prefs, prefs::kVariationsSeedDate));
|
| EXPECT_TRUE(PrefHasDefaultValue(prefs, prefs::kVariationsSeedSignature));
|
|
|
| + // The below seed and signature pair were generated using the server's
|
| + // private key.
|
| + const std::string base64_seed_data =
|
| + "CigxZDI5NDY0ZmIzZDc4ZmYxNTU2ZTViNTUxYzY0NDdjYmM3NGU1ZmQwEr0BCh9VTUEtVW5p"
|
| + "Zm9ybWl0eS1UcmlhbC0xMC1QZXJjZW50GICckqUFOAFCB2RlZmF1bHRKCwoHZGVmYXVsdBAB"
|
| + "SgwKCGdyb3VwXzAxEAFKDAoIZ3JvdXBfMDIQAUoMCghncm91cF8wMxABSgwKCGdyb3VwXzA0"
|
| + "EAFKDAoIZ3JvdXBfMDUQAUoMCghncm91cF8wNhABSgwKCGdyb3VwXzA3EAFKDAoIZ3JvdXBf"
|
| + "MDgQAUoMCghncm91cF8wORAB";
|
| + const std::string base64_seed_signature =
|
| + "MEQCIDD1IVxjzWYncun+9IGzqYjZvqxxujQEayJULTlbTGA/AiAr0oVmEgVUQZBYq5VLOSvy"
|
| + "96JkMYgzTkHPwbv7K/CmgA==";
|
| + const std::string base64_seed_signature_invalid =
|
| + "AEQCIDD1IVxjzWYncun+9IGzqYjZvqxxujQEayJULTlbTGA/AiAr0oVmEgVUQZBYq5VLOSvy"
|
| + "96JkMYgzTkHPwbv7K/CmgA==";
|
| +
|
| + // Set seed and valid signature in prefs.
|
| + prefs.SetString(prefs::kVariationsSeed, base64_seed_data);
|
| + prefs.SetString(prefs::kVariationsSeedSignature, base64_seed_signature);
|
| +
|
| + // We need a real VariationsSeedStore to test invalid signatures.
|
| + VariationsSeedStore seed_store_reel(&prefs);
|
| + seed_store_reel.LoadSeed(&loaded_seed);
|
| + // Valid signature, so we should get an empty string.
|
| + EXPECT_EQ(seed_store_reel.GetBadSignature(), "");
|
| +
|
| + prefs.SetString(prefs::kVariationsSeedSignature,
|
| + base64_seed_signature_invalid);
|
| + seed_store_reel.LoadSeed(&loaded_seed);
|
| + // Invalid signature, so we should get the signature itself.
|
| + EXPECT_EQ(seed_store_reel.GetBadSignature(), base64_seed_signature_invalid);
|
| +
|
| + prefs.SetString(prefs::kVariationsSeedSignature, std::string());
|
| + seed_store_reel.LoadSeed(&loaded_seed);
|
| + // Empty signature, so we should get an empty string.
|
| + EXPECT_EQ(seed_store_reel.GetBadSignature(), "");
|
| +
|
| // Check that having no seed in prefs results in a return value of false.
|
| prefs.ClearPref(prefs::kVariationsSeed);
|
| EXPECT_FALSE(seed_store.LoadSeed(&loaded_seed));
|
|
|