| Index: LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html
|
| diff --git a/LayoutTests/crypto/aes-ctr-parseAlgorithm-failures.html b/LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html
|
| similarity index 44%
|
| copy from LayoutTests/crypto/aes-ctr-parseAlgorithm-failures.html
|
| copy to LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html
|
| index d52f4546b26cdf018cab855f37076513c291b258..f69ac6544192c595922287895bba81aa021d92cb 100644
|
| --- a/LayoutTests/crypto/aes-ctr-parseAlgorithm-failures.html
|
| +++ b/LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html
|
| @@ -9,50 +9,39 @@
|
| <div id="console"></div>
|
|
|
| <script>
|
| -description("Tests bad algorithm inputs for AES-CTR");
|
| -
|
| +description("Tests generateKey() with bad RSAES-PKCS1-v1_5 parameters");
|
| jsTestIsAsync = true;
|
|
|
| -var keyData = hexStringToUint8Array("2b7e151628aed2a6abf7158809cf4f3c");
|
| -var data = asciiToUint8Array("hello");
|
| -var key = null;
|
| -
|
| -Promise.resolve(null).then(function(result) {
|
| - var usages = ['encrypt', 'decrypt'];
|
| - var extractable = false;
|
| - // FIXME: Should use aes-ctr here.
|
| - var algorithm = {name: 'aes-cbc'};
|
| -
|
| - return crypto.subtle.importKey('raw', keyData, algorithm, extractable, usages);
|
| -}).then(function(result) {
|
| - key = result;
|
| +extractable = true;
|
| +keyUsages = ['encrypt', 'decrypt'];
|
|
|
| - return crypto.subtle.encrypt({name: 'AES-CTR', counter: null}, key, data);
|
| +Promise.resolve(null).then(function() {
|
| + return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| error = result;
|
| shouldBeNull("error");
|
|
|
| - return crypto.subtle.encrypt({name: 'AES-CTR'}, key, data);
|
| + return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| error = result;
|
| shouldBeNull("error");
|
|
|
| - return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(0)}, key, data);
|
| + return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| error = result;
|
| shouldBeNull("error");
|
|
|
| - return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(16), length: 256}, key, data);
|
| + return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| error = result;
|
| shouldBeNull("error");
|
|
|
| - return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(16), length: -3}, key, data);
|
| + return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| error = result;
|
| shouldBeNull("error");
|
|
|
| - return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(16), length: Infinity}, key, data);
|
| + return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| error = result;
|
| shouldBeNull("error");
|
|
|