Chromium Code Reviews| Index: chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
| diff --git a/chrome/browser/metrics/variations/variations_seed_store_unittest.cc b/chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
| index 6f42c807bf3360a0ef55cdc61ad66638707468b4..4c7fedb2af2c44b3181b232e0367f795a53d2607 100644 |
| --- a/chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
| +++ b/chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
| @@ -121,6 +121,42 @@ TEST(VariationsSeedStoreTest, LoadSeed) { |
| EXPECT_TRUE(PrefHasDefaultValue(prefs, prefs::kVariationsSeedDate)); |
| EXPECT_TRUE(PrefHasDefaultValue(prefs, prefs::kVariationsSeedSignature)); |
| + // The below seed and signature pair were generated using the server's |
| + // private key. |
| + const std::string base64_seed_data = |
| + "CigxZDI5NDY0ZmIzZDc4ZmYxNTU2ZTViNTUxYzY0NDdjYmM3NGU1ZmQwEr0BCh9VTUEtVW5p" |
| + "Zm9ybWl0eS1UcmlhbC0xMC1QZXJjZW50GICckqUFOAFCB2RlZmF1bHRKCwoHZGVmYXVsdBAB" |
| + "SgwKCGdyb3VwXzAxEAFKDAoIZ3JvdXBfMDIQAUoMCghncm91cF8wMxABSgwKCGdyb3VwXzA0" |
| + "EAFKDAoIZ3JvdXBfMDUQAUoMCghncm91cF8wNhABSgwKCGdyb3VwXzA3EAFKDAoIZ3JvdXBf" |
| + "MDgQAUoMCghncm91cF8wORAB"; |
| + const std::string base64_seed_signature = |
| + "MEQCIDD1IVxjzWYncun+9IGzqYjZvqxxujQEayJULTlbTGA/AiAr0oVmEgVUQZBYq5VLOSvy" |
| + "96JkMYgzTkHPwbv7K/CmgA=="; |
| + const std::string base64_seed_signature_invalid = |
| + "AEQCIDD1IVxjzWYncun+9IGzqYjZvqxxujQEayJULTlbTGA/AiAr0oVmEgVUQZBYq5VLOSvy" |
| + "96JkMYgzTkHPwbv7K/CmgA=="; |
| + |
| + // Set seed and valid signature in prefs. |
| + prefs.SetString(prefs::kVariationsSeed, base64_seed_data); |
| + prefs.SetString(prefs::kVariationsSeedSignature, base64_seed_signature); |
| + |
| + // We need a real VariationsSeedStore to test invalid signatures. |
| + VariationsSeedStore seed_store_reel(&prefs); |
| + seed_store_reel.LoadSeed(&loaded_seed); |
| + // Valid signature, so we should get an empty string. |
| + EXPECT_EQ(seed_store_reel.GetBadSignature(), ""); |
|
grt (UTC plus 2)
2014/10/10 17:45:42
for EXPECT_EQ, the expected value should come firs
Georges Khalil
2014/10/10 20:19:31
Done.
|
| + |
| + prefs.SetString(prefs::kVariationsSeedSignature, |
| + base64_seed_signature_invalid); |
| + seed_store_reel.LoadSeed(&loaded_seed); |
| + // Invalid signature, so we should get the signature itself. |
| + EXPECT_EQ(seed_store_reel.GetBadSignature(), base64_seed_signature_invalid); |
| + |
| + prefs.SetString(prefs::kVariationsSeedSignature, std::string()); |
| + seed_store_reel.LoadSeed(&loaded_seed); |
| + // Empty signature, so we should get an empty string. |
| + EXPECT_EQ(seed_store_reel.GetBadSignature(), ""); |
| + |
| // Check that having no seed in prefs results in a return value of false. |
| prefs.ClearPref(prefs::kVariationsSeed); |
| EXPECT_FALSE(seed_store.LoadSeed(&loaded_seed)); |