Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(218)

Side by Side Diff: LayoutTests/crypto/generateKey.html

Issue 111603004: [webcrypto] Add AES-KW to the list of registered algorithms. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | LayoutTests/crypto/generateKey-expected.txt » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script src="../resources/js-test.js"></script> 4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script> 5 <script src="resources/common.js"></script>
6 </head> 6 </head>
7 <body> 7 <body>
8 <p id="description"></p> 8 <p id="description"></p>
9 <div id="console"></div> 9 <div id="console"></div>
10 10
(...skipping 21 matching lines...) Expand all
32 // --------------------------------------------------- 32 // ---------------------------------------------------
33 // AES-CTR normalization failures (AesKeyGenParams) 33 // AES-CTR normalization failures (AesKeyGenParams)
34 // --------------------------------------------------- 34 // ---------------------------------------------------
35 35
36 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr' }, extractable, keyUsag es)"); 36 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr' }, extractable, keyUsag es)");
37 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr', length: 70000 }, extra ctable, keyUsages)"); 37 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr', length: 70000 }, extra ctable, keyUsages)");
38 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr', length: -3 }, extracta ble, keyUsages)"); 38 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr', length: -3 }, extracta ble, keyUsages)");
39 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr', length: -Infinity }, e xtractable, keyUsages)"); 39 shouldThrow("crypto.subtle.generateKey({ name: 'aes-ctr', length: -Infinity }, e xtractable, keyUsages)");
40 40
41 // --------------------------------------------------- 41 // ---------------------------------------------------
42 // AES-KW normalization failures (AesKeyGenParams)
43 // ---------------------------------------------------
44
45 shouldThrow("crypto.subtle.generateKey({ name: 'aes-kw' }, extractable, keyUsage s)");
46 shouldThrow("crypto.subtle.generateKey({ name: 'aes-kw', length: 70000 }, extrac table, keyUsages)");
47 shouldThrow("crypto.subtle.generateKey({ name: 'aes-kw', length: -3 }, extractab le, keyUsages)");
48 shouldThrow("crypto.subtle.generateKey({ name: 'aes-kw', length: -Infinity }, ex tractable, keyUsages)");
49
50 // ---------------------------------------------------
42 // HMAC normalization failures (HmacKeyParams) 51 // HMAC normalization failures (HmacKeyParams)
43 // --------------------------------------------------- 52 // ---------------------------------------------------
44 53
45 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: -3}, extractable , keyUsages)"); 54 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: -3}, extractable , keyUsages)");
46 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: ''}, length: 48}, extractable , keyUsages)"); 55 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: ''}, length: 48}, extractable , keyUsages)");
47 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: 5000000000}, extractable , keyUsages)"); 56 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: 5000000000}, extractable , keyUsages)");
48 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: NaN}, extractable , keyUsages)"); 57 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: NaN}, extractable , keyUsages)");
49 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: Infinity}, extractable , keyUsages)"); 58 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: Infinity}, extractable , keyUsages)");
50 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: -Infinity}, extractable , keyUsages)"); 59 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: -Infinity}, extractable , keyUsages)");
51 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: crypto}, extractable , keyUsages)"); 60 shouldThrow("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, l ength: crypto}, extractable , keyUsages)");
(...skipping 25 matching lines...) Expand all
77 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages)"); 86 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages)");
78 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages)"); 87 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages)");
79 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages)"); 88 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages)");
80 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)"); 89 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)");
81 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)"); 90 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
82 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)"); 91 shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
83 </script> 92 </script>
84 93
85 </body> 94 </body>
86 </html> 95 </html>
OLDNEW
« no previous file with comments | « no previous file | LayoutTests/crypto/generateKey-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698