Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(116)

Side by Side Diff: LayoutTests/crypto/generateKey.html

Issue 215153005: [refactor] Split up generateKey.html into multiple files, and test errors directly. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Re-upload with --similarity=20 Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 <!DOCTYPE html>
2 <html>
3 <head>
4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script>
6 </head>
7 <body>
8 <p id="description"></p>
9 <div id="console"></div>
10
11 <script>
12 description("Tests crypto.subtle.generateKey.");
13 jsTestIsAsync = true;
14
15 extractable = true;
16 keyUsages = ['encrypt', 'decrypt'];
17
18 // Invalid keyUsages
19 aesCbc = { name: 'aes-cbc', length: 1024 };
20 shouldThrow("crypto.subtle.generateKey(aesCbc, extractable, -1)");
21 shouldThrow("crypto.subtle.generateKey(aesCbc, extractable, null)");
22 shouldRejectPromiseWithNull("crypto.subtle.generateKey(aesCbc, extractable, ['bo o'])");
23
24 // ---------------------------------------------------
25 // AES-CBC normalization failures (AesKeyGenParams)
26 // ---------------------------------------------------
27
28 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc' }, extr actable, keyUsages)");
29 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc', length : 70000 }, extractable, keyUsages)");
30 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc', length : -3 }, extractable, keyUsages)");
31 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc', length : -Infinity }, extractable, keyUsages)");
32
33 // ---------------------------------------------------
34 // AES-CTR normalization failures (AesKeyGenParams)
35 // ---------------------------------------------------
36
37 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr' }, extr actable, keyUsages)");
38 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr', length : 70000 }, extractable, keyUsages)");
39 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr', length : -3 }, extractable, keyUsages)");
40 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr', length : -Infinity }, extractable, keyUsages)");
41
42 // ---------------------------------------------------
43 // AES-KW normalization failures (AesKeyGenParams)
44 // ---------------------------------------------------
45
46 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw' }, extra ctable, keyUsages)");
47 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw', length: 70000 }, extractable, keyUsages)");
48 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw', length: -3 }, extractable, keyUsages)");
49 shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw', length: -Infinity }, extractable, keyUsages)");
50
51 // ---------------------------------------------------
52 // HMAC normalization failures (HmacKeyParams)
53 // ---------------------------------------------------
54
55 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: -3}, extractable , keyUsages)");
56 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: ''}, length: 48}, extractable , keyUsages)");
57 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: 5000000000}, extractable , keyUsages)");
58 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: NaN}, extractable , keyUsages)");
59 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: Infinity}, extractable , keyUsages)");
60 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: -Infinity}, extractable , keyUsages)");
61 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: crypto}, extractable , keyUsages)");
62 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: undefined}, extractable , keyUsages)");
63
64 // The length property doesn't strictly need to be a number according to WebIDL.
65 // It just has to be convertable with ToNumber().
66 shouldAcceptPromise("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha- 256'}, length: '48'}, extractable , keyUsages)");
67 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: null}, extractable , keyUsages)");
68 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {nam e: 'sha-256'}, length: true}, extractable , keyUsages)");
69
70 // ---------------------------------------------------
71 // RSASSA-PKCS1-v1_5 normalization failures (RsaKeyGenParams)
72 // ---------------------------------------------------
73
74 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5 ', modulusLength: -30}, extractable , keyUsages)");
75 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5 ', modulusLength: NaN}, extractable , keyUsages)");
76 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5 '}, extractable , keyUsages)");
77 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5 ', modulusLength: 10}, extractable , keyUsages)");
78 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5 ', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
79 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5 ', modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
80
81 // ---------------------------------------------------
82 // RSAES-PKCS1-v1_5 normalization failures (RsaKeyGenParams)
83 // ---------------------------------------------------
84
85 // Note: these are the same tests as for RSASSA-PKCS1-v1_5 above.
86
87 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5' , modulusLength: -30}, extractable , keyUsages)");
88 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5' , modulusLength: NaN}, extractable , keyUsages)");
89 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5' }, extractable , keyUsages)");
90 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5' , modulusLength: 10}, extractable , keyUsages)");
91 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5' , modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
92 shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5' , modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
93
94 completeTestWhenAllTasksDone();
95 </script>
96
97 </body>
98 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698