| Index: content/child/webcrypto/test/ecdsa_unittest.cc
|
| diff --git a/content/child/webcrypto/test/ecdsa_unittest.cc b/content/child/webcrypto/test/ecdsa_unittest.cc
|
| index b81a9edc95d7a2f8cb4b036b0666738e9df1f219..5952fbfdb6b75bccaba7faedf8e0a1825a3ba632 100644
|
| --- a/content/child/webcrypto/test/ecdsa_unittest.cc
|
| +++ b/content/child/webcrypto/test/ecdsa_unittest.cc
|
| @@ -64,8 +64,9 @@ TEST(WebCryptoEcdsaTest, GenerateKeyIsRandom) {
|
| blink::WebCryptoKey private_key;
|
|
|
| ASSERT_EQ(Status::Success(),
|
| - GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0,
|
| - &public_key, &private_key));
|
| + GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true,
|
| + blink::WebCryptoKeyUsageSign, &public_key,
|
| + &private_key));
|
|
|
| // Basic sanity checks on the generated key pair.
|
| EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type());
|
| @@ -89,6 +90,18 @@ TEST(WebCryptoEcdsaTest, GenerateKeyIsRandom) {
|
| EXPECT_FALSE(CopiesExist(serialized_keys));
|
| }
|
|
|
| +TEST(WebCryptoEcdsaTest, GenerateKeyEmptyUsage) {
|
| + if (!SupportsEcdsa())
|
| + return;
|
| +
|
| + blink::WebCryptoNamedCurve named_curve = blink::WebCryptoNamedCurveP256;
|
| + blink::WebCryptoKey public_key;
|
| + blink::WebCryptoKey private_key;
|
| + ASSERT_EQ(Status::ErrorCreateKeyEmptyUsages(),
|
| + GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0,
|
| + &public_key, &private_key));
|
| +}
|
| +
|
| // Verify that ECDSA signatures are probabilistic. Signing the same message two
|
| // times should yield different signatures. However both signatures should
|
| // verify correctly.
|
|
|