| Index: LayoutTests/crypto/generateKey.html
|
| diff --git a/LayoutTests/crypto/generateKey.html b/LayoutTests/crypto/generateKey.html
|
| deleted file mode 100644
|
| index d6172e9e32ed5cd23a51033ed1d5d4133bb9b5b5..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/crypto/generateKey.html
|
| +++ /dev/null
|
| @@ -1,98 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| -<script src="../resources/js-test.js"></script>
|
| -<script src="resources/common.js"></script>
|
| -</head>
|
| -<body>
|
| -<p id="description"></p>
|
| -<div id="console"></div>
|
| -
|
| -<script>
|
| -description("Tests crypto.subtle.generateKey.");
|
| -jsTestIsAsync = true;
|
| -
|
| -extractable = true;
|
| -keyUsages = ['encrypt', 'decrypt'];
|
| -
|
| -// Invalid keyUsages
|
| -aesCbc = { name: 'aes-cbc', length: 1024 };
|
| -shouldThrow("crypto.subtle.generateKey(aesCbc, extractable, -1)");
|
| -shouldThrow("crypto.subtle.generateKey(aesCbc, extractable, null)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey(aesCbc, extractable, ['boo'])");
|
| -
|
| -// ---------------------------------------------------
|
| -// AES-CBC normalization failures (AesKeyGenParams)
|
| -// ---------------------------------------------------
|
| -
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc' }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc', length: 70000 }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc', length: -3 }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-cbc', length: -Infinity }, extractable, keyUsages)");
|
| -
|
| -// ---------------------------------------------------
|
| -// AES-CTR normalization failures (AesKeyGenParams)
|
| -// ---------------------------------------------------
|
| -
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr' }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr', length: 70000 }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr', length: -3 }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-ctr', length: -Infinity }, extractable, keyUsages)");
|
| -
|
| -// ---------------------------------------------------
|
| -// AES-KW normalization failures (AesKeyGenParams)
|
| -// ---------------------------------------------------
|
| -
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw' }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw', length: 70000 }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw', length: -3 }, extractable, keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({ name: 'aes-kw', length: -Infinity }, extractable, keyUsages)");
|
| -
|
| -// ---------------------------------------------------
|
| -// HMAC normalization failures (HmacKeyParams)
|
| -// ---------------------------------------------------
|
| -
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: -3}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: ''}, length: 48}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: 5000000000}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: NaN}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: Infinity}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: -Infinity}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: crypto}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: undefined}, extractable , keyUsages)");
|
| -
|
| -// The length property doesn't strictly need to be a number according to WebIDL.
|
| -// It just has to be convertable with ToNumber().
|
| -shouldAcceptPromise("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: '48'}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: null}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256'}, length: true}, extractable , keyUsages)");
|
| -
|
| -// ---------------------------------------------------
|
| -// RSASSA-PKCS1-v1_5 normalization failures (RsaKeyGenParams)
|
| -// ---------------------------------------------------
|
| -
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5'}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
|
| -
|
| -// ---------------------------------------------------
|
| -// RSAES-PKCS1-v1_5 normalization failures (RsaKeyGenParams)
|
| -// ---------------------------------------------------
|
| -
|
| -// Note: these are the same tests as for RSASSA-PKCS1-v1_5 above.
|
| -
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
|
| -shouldRejectPromiseWithNull("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
|
| -
|
| -completeTestWhenAllTasksDone();
|
| -</script>
|
| -
|
| -</body>
|
| -</html>
|
|
|