Index: chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
diff --git a/chrome/browser/metrics/variations/variations_seed_store_unittest.cc b/chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
index 6f42c807bf3360a0ef55cdc61ad66638707468b4..407723e525993b70f0c89d0bf310921a449b94c6 100644 |
--- a/chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
+++ b/chrome/browser/metrics/variations/variations_seed_store_unittest.cc |
@@ -121,6 +121,44 @@ TEST(VariationsSeedStoreTest, LoadSeed) { |
EXPECT_TRUE(PrefHasDefaultValue(prefs, prefs::kVariationsSeedDate)); |
EXPECT_TRUE(PrefHasDefaultValue(prefs, prefs::kVariationsSeedSignature)); |
+ // The below seed and signature pair were generated using the server's |
grt (UTC plus 2)
2014/10/14 01:28:30
how about moving this new test into its own "GetIn
Georges Khalil
2014/10/14 13:51:09
Done.
|
+ // private key. |
+ const std::string base64_seed_data = |
+ "CigxZDI5NDY0ZmIzZDc4ZmYxNTU2ZTViNTUxYzY0NDdjYmM3NGU1ZmQwEr0BCh9VTUEtVW5p" |
+ "Zm9ybWl0eS1UcmlhbC0xMC1QZXJjZW50GICckqUFOAFCB2RlZmF1bHRKCwoHZGVmYXVsdBAB" |
+ "SgwKCGdyb3VwXzAxEAFKDAoIZ3JvdXBfMDIQAUoMCghncm91cF8wMxABSgwKCGdyb3VwXzA0" |
+ "EAFKDAoIZ3JvdXBfMDUQAUoMCghncm91cF8wNhABSgwKCGdyb3VwXzA3EAFKDAoIZ3JvdXBf" |
+ "MDgQAUoMCghncm91cF8wORAB"; |
+ const std::string base64_seed_signature = |
+ "MEQCIDD1IVxjzWYncun+9IGzqYjZvqxxujQEayJULTlbTGA/AiAr0oVmEgVUQZBYq5VLOSvy" |
+ "96JkMYgzTkHPwbv7K/CmgA=="; |
+ const std::string base64_seed_signature_invalid = |
+ "AEQCIDD1IVxjzWYncun+9IGzqYjZvqxxujQEayJULTlbTGA/AiAr0oVmEgVUQZBYq5VLOSvy" |
+ "96JkMYgzTkHPwbv7K/CmgA=="; |
+ |
+ // Set seed and valid signature in prefs. |
+ prefs.SetString(prefs::kVariationsSeed, base64_seed_data); |
+ prefs.SetString(prefs::kVariationsSeedSignature, base64_seed_signature); |
+ |
+ // We need a real VariationsSeedStore to test invalid signatures. |
+ VariationsSeedStore seed_store_reel(&prefs); |
+ seed_store_reel.LoadSeed(&loaded_seed); |
+ std::string invalid_signature; |
+ // Valid signature, so we should get an empty string. |
grt (UTC plus 2)
2014/10/14 01:28:30
update comment
Georges Khalil
2014/10/14 13:51:09
Done.
|
+ EXPECT_EQ(false, seed_store_reel.GetInvalidSignature(&invalid_signature)); |
grt (UTC plus 2)
2014/10/14 01:28:30
EXPECT_FALSE
Georges Khalil
2014/10/14 13:51:09
Done.
|
+ |
+ prefs.SetString(prefs::kVariationsSeedSignature, |
+ base64_seed_signature_invalid); |
+ seed_store_reel.LoadSeed(&loaded_seed); |
+ // Invalid signature, so we should get the signature itself. |
+ EXPECT_EQ(true, seed_store_reel.GetInvalidSignature(&invalid_signature)); |
grt (UTC plus 2)
2014/10/14 01:28:30
EXPECT_FALSE
Georges Khalil
2014/10/14 13:51:09
Done.
|
+ EXPECT_EQ(invalid_signature, base64_seed_signature_invalid); |
+ |
+ prefs.SetString(prefs::kVariationsSeedSignature, std::string()); |
+ seed_store_reel.LoadSeed(&loaded_seed); |
+ // Empty signature, not considered invalid |
+ EXPECT_EQ(false, seed_store_reel.GetInvalidSignature(&invalid_signature)); |
grt (UTC plus 2)
2014/10/14 01:28:30
EXPECT_TRUE
Georges Khalil
2014/10/14 13:51:09
Done.
|
+ |
// Check that having no seed in prefs results in a return value of false. |
prefs.ClearPref(prefs::kVariationsSeed); |
EXPECT_FALSE(seed_store.LoadSeed(&loaded_seed)); |