Cover more branches in fx_crypt_sha.cpp.

Should get us to 100% coverage, hopefully.

Change-Id: I2f12e1a3136603e417f1296beaad98afdd0607ee
Reviewed-on: https://pdfium-review.googlesource.com/c/pdfium/+/62010
Commit-Queue: Tom Sepez <tsepez@chromium.org>
Reviewed-by: Lei Zhang <thestig@chromium.org>
diff --git a/core/fdrm/fx_crypt_unittest.cpp b/core/fdrm/fx_crypt_unittest.cpp
index 9b16771..4d5336d 100644
--- a/core/fdrm/fx_crypt_unittest.cpp
+++ b/core/fdrm/fx_crypt_unittest.cpp
@@ -542,6 +542,20 @@
   }
 }
 
+TEST(FXCRYPT, Sha384Empty) {
+  static const char kInput[] = "";
+  static const uint8_t kExpected[48] = {
+      0x38, 0xb0, 0x60, 0xa7, 0x51, 0xac, 0x96, 0x38, 0x4c, 0xd9, 0x32, 0x7e,
+      0xb1, 0xb1, 0xe3, 0x6a, 0x21, 0xfd, 0xb7, 0x11, 0x14, 0xbe, 0x07, 0x43,
+      0x4c, 0x0c, 0xc7, 0xbf, 0x63, 0xf6, 0xe1, 0xda, 0x27, 0x4e, 0xde, 0xbf,
+      0xe7, 0x6f, 0x65, 0xfb, 0xd5, 0x1a, 0xd2, 0xf1, 0x48, 0x98, 0xb9, 0x5b};
+  uint8_t actual[48];
+  CRYPT_SHA384Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+                       actual);
+  for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+    EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}
+
 // Verified against echo -n "..." | openssl sha384
 TEST(FXCRYPT, Sha384Test) {
   static const char kInput[] =
@@ -558,6 +572,40 @@
     EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
 }
 
+// Verified against echo -n "..." | openssl sha384
+TEST(FXCRYPT, Sha384Pad112) {
+  static const char kInput[] =
+      "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+      "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
+  static const uint8_t kExpected[48] = {
+      0x18, 0x7d, 0x4e, 0x07, 0xcb, 0x30, 0x61, 0x03, 0xc6, 0x99, 0x67, 0xbf,
+      0x54, 0x4d, 0x0d, 0xfb, 0xe9, 0x04, 0x25, 0x77, 0x59, 0x9c, 0x73, 0xc3,
+      0x30, 0xab, 0xc0, 0xcb, 0x64, 0xc6, 0x12, 0x36, 0xd5, 0xed, 0x56, 0x5e,
+      0xe1, 0x91, 0x19, 0xd8, 0xc3, 0x17, 0x79, 0xa3, 0x8f, 0x79, 0x1f, 0xcd};
+  uint8_t actual[48];
+  EXPECT_EQ(112u, strlen(kInput));
+  CRYPT_SHA384Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+                       actual);
+  for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+    EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}
+
+TEST(FXCRYPT, Sha512Empty) {
+  static const char kInput[] = "";
+  static const uint8_t kExpected[64] = {
+      0xcf, 0x83, 0xe1, 0x35, 0x7e, 0xef, 0xb8, 0xbd, 0xf1, 0x54, 0x28,
+      0x50, 0xd6, 0x6d, 0x80, 0x07, 0xd6, 0x20, 0xe4, 0x05, 0x0b, 0x57,
+      0x15, 0xdc, 0x83, 0xf4, 0xa9, 0x21, 0xd3, 0x6c, 0xe9, 0xce, 0x47,
+      0xd0, 0xd1, 0x3c, 0x5d, 0x85, 0xf2, 0xb0, 0xff, 0x83, 0x18, 0xd2,
+      0x87, 0x7e, 0xec, 0x2f, 0x63, 0xb9, 0x31, 0xbd, 0x47, 0x41, 0x7a,
+      0x81, 0xa5, 0x38, 0x32, 0x7a, 0xf9, 0x27, 0xda, 0x3e};
+  uint8_t actual[64];
+  CRYPT_SHA512Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+                       actual);
+  for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+    EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}
+
 // Verified against echo -n "..." | openssl sha512
 TEST(FXCRYPT, Sha512Test) {
   static const char kInput[] =
@@ -575,3 +623,23 @@
   for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
     EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
 }
+
+// Verified against echo -n "..." | openssl sha512
+TEST(FXCRYPT, Sha512Pad112) {
+  static const char kInput[] =
+      "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+      "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
+  static const uint8_t kExpected[64] = {
+      0xc0, 0x1d, 0x08, 0x0e, 0xfd, 0x49, 0x27, 0x76, 0xa1, 0xc4, 0x3b,
+      0xd2, 0x3d, 0xd9, 0x9d, 0x0a, 0x2e, 0x62, 0x6d, 0x48, 0x1e, 0x16,
+      0x78, 0x2e, 0x75, 0xd5, 0x4c, 0x25, 0x03, 0xb5, 0xdc, 0x32, 0xbd,
+      0x05, 0xf0, 0xf1, 0xba, 0x33, 0xe5, 0x68, 0xb8, 0x8f, 0xd2, 0xd9,
+      0x70, 0x92, 0x9b, 0x71, 0x9e, 0xcb, 0xb1, 0x52, 0xf5, 0x8f, 0x13,
+      0x0a, 0x40, 0x7c, 0x88, 0x30, 0x60, 0x4b, 0x70, 0xca};
+  uint8_t actual[64];
+  EXPECT_EQ(112u, strlen(kInput));
+  CRYPT_SHA512Generate(reinterpret_cast<const uint8_t*>(kInput), strlen(kInput),
+                       actual);
+  for (size_t i = 0; i < FX_ArraySize(kExpected); ++i)
+    EXPECT_EQ(kExpected[i], actual[i]) << " at byte " << i;
+}