| Index: crypto/signature_verifier_unittest.cc | 
| diff --git a/crypto/signature_verifier_unittest.cc b/crypto/signature_verifier_unittest.cc | 
| index f6c42e0fdc7f208fe4f1c4cd71f381482ca2bf0b..b521bd7bcd295f6b0d8b3f7ef4dc3ecdc81866f9 100644 | 
| --- a/crypto/signature_verifier_unittest.cc | 
| +++ b/crypto/signature_verifier_unittest.cc | 
| @@ -258,6 +258,26 @@ TEST(SignatureVerifierTest, BasicTest) { | 
| ok = verifier.VerifyFinal(); | 
| EXPECT_FALSE(ok); | 
| } | 
| + | 
| +  // Test 5: import an invalid key. | 
| +  uint8_t bad_public_key_info[sizeof(public_key_info)]; | 
| +  memcpy(bad_public_key_info, public_key_info, sizeof(public_key_info)); | 
| +  bad_public_key_info[0] += 1;  // Corrupt part of the SPKI syntax. | 
| +  ok = verifier.VerifyInit(signature_algorithm, | 
| +                           sizeof(signature_algorithm), | 
| +                           signature, sizeof(signature), | 
| +                           bad_public_key_info, sizeof(bad_public_key_info)); | 
| +  EXPECT_FALSE(ok); | 
| + | 
| +  // Test 6: import a key with extra data. | 
| +  uint8_t long_public_key_info[sizeof(public_key_info) + 5]; | 
| +  memset(long_public_key_info, 0, sizeof(long_public_key_info)); | 
| +  memcpy(long_public_key_info, public_key_info, sizeof(public_key_info)); | 
| +  ok = verifier.VerifyInit(signature_algorithm, | 
| +                           sizeof(signature_algorithm), | 
| +                           signature, sizeof(signature), | 
| +                           long_public_key_info, sizeof(long_public_key_info)); | 
| +  EXPECT_FALSE(ok); | 
| } | 
|  | 
| ////////////////////////////////////////////////////////////////////// | 
|  |