Index: LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html |
diff --git a/LayoutTests/crypto/aes-ctr-parseAlgorithm-failures.html b/LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html |
similarity index 44% |
copy from LayoutTests/crypto/aes-ctr-parseAlgorithm-failures.html |
copy to LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html |
index d52f4546b26cdf018cab855f37076513c291b258..f69ac6544192c595922287895bba81aa021d92cb 100644 |
--- a/LayoutTests/crypto/aes-ctr-parseAlgorithm-failures.html |
+++ b/LayoutTests/crypto/rsa-es-generateKey-parseAlgorithm-failures.html |
@@ -9,50 +9,39 @@ |
<div id="console"></div> |
<script> |
-description("Tests bad algorithm inputs for AES-CTR"); |
- |
+description("Tests generateKey() with bad RSAES-PKCS1-v1_5 parameters"); |
jsTestIsAsync = true; |
-var keyData = hexStringToUint8Array("2b7e151628aed2a6abf7158809cf4f3c"); |
-var data = asciiToUint8Array("hello"); |
-var key = null; |
- |
-Promise.resolve(null).then(function(result) { |
- var usages = ['encrypt', 'decrypt']; |
- var extractable = false; |
- // FIXME: Should use aes-ctr here. |
- var algorithm = {name: 'aes-cbc'}; |
- |
- return crypto.subtle.importKey('raw', keyData, algorithm, extractable, usages); |
-}).then(function(result) { |
- key = result; |
+extractable = true; |
+keyUsages = ['encrypt', 'decrypt']; |
- return crypto.subtle.encrypt({name: 'AES-CTR', counter: null}, key, data); |
+Promise.resolve(null).then(function() { |
+ return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages); |
}).then(failAndFinishJSTest, function(result) { |
error = result; |
shouldBeNull("error"); |
- return crypto.subtle.encrypt({name: 'AES-CTR'}, key, data); |
+ return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages); |
}).then(failAndFinishJSTest, function(result) { |
error = result; |
shouldBeNull("error"); |
- return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(0)}, key, data); |
+ return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages); |
}).then(failAndFinishJSTest, function(result) { |
error = result; |
shouldBeNull("error"); |
- return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(16), length: 256}, key, data); |
+ return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages); |
}).then(failAndFinishJSTest, function(result) { |
error = result; |
shouldBeNull("error"); |
- return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(16), length: -3}, key, data); |
+ return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages); |
}).then(failAndFinishJSTest, function(result) { |
error = result; |
shouldBeNull("error"); |
- return crypto.subtle.encrypt({name: 'AES-CTR', counter: new Uint8Array(16), length: Infinity}, key, data); |
+ return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages); |
}).then(failAndFinishJSTest, function(result) { |
error = result; |
shouldBeNull("error"); |