Index: content/child/webcrypto/test/ecdsa_unittest.cc |
diff --git a/content/child/webcrypto/test/ecdsa_unittest.cc b/content/child/webcrypto/test/ecdsa_unittest.cc |
index b81a9edc95d7a2f8cb4b036b0666738e9df1f219..5952fbfdb6b75bccaba7faedf8e0a1825a3ba632 100644 |
--- a/content/child/webcrypto/test/ecdsa_unittest.cc |
+++ b/content/child/webcrypto/test/ecdsa_unittest.cc |
@@ -64,8 +64,9 @@ TEST(WebCryptoEcdsaTest, GenerateKeyIsRandom) { |
blink::WebCryptoKey private_key; |
ASSERT_EQ(Status::Success(), |
- GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0, |
- &public_key, &private_key)); |
+ GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, |
+ blink::WebCryptoKeyUsageSign, &public_key, |
+ &private_key)); |
// Basic sanity checks on the generated key pair. |
EXPECT_EQ(blink::WebCryptoKeyTypePublic, public_key.type()); |
@@ -89,6 +90,18 @@ TEST(WebCryptoEcdsaTest, GenerateKeyIsRandom) { |
EXPECT_FALSE(CopiesExist(serialized_keys)); |
} |
+TEST(WebCryptoEcdsaTest, GenerateKeyEmptyUsage) { |
+ if (!SupportsEcdsa()) |
+ return; |
+ |
+ blink::WebCryptoNamedCurve named_curve = blink::WebCryptoNamedCurveP256; |
+ blink::WebCryptoKey public_key; |
+ blink::WebCryptoKey private_key; |
+ ASSERT_EQ(Status::ErrorCreateKeyEmptyUsages(), |
+ GenerateKeyPair(CreateEcdsaKeyGenAlgorithm(named_curve), true, 0, |
+ &public_key, &private_key)); |
+} |
+ |
// Verify that ECDSA signatures are probabilistic. Signing the same message two |
// times should yield different signatures. However both signatures should |
// verify correctly. |