Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(387)

Side by Side Diff: LayoutTests/crypto/sign-verify-badParameters.html

Issue 222003006: [webcrypto] Don't throw any extra WebIDL exceptions from WebCrypto methods. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Rebase Created 6 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script src="../resources/js-test.js"></script> 4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script> 5 <script src="resources/common.js"></script>
6 </head> 6 </head>
7 <body> 7 <body>
8 <p id="description"></p> 8 <p id="description"></p>
9 <div id="console"></div> 9 <div id="console"></div>
10 10
(...skipping 12 matching lines...) Expand all
23 return crypto.subtle.importKey('raw', keyData, importAlgorithm, extractable, usages); 23 return crypto.subtle.importKey('raw', keyData, importAlgorithm, extractable, usages);
24 } 24 }
25 25
26 data = asciiToUint8Array("hello"); 26 data = asciiToUint8Array("hello");
27 hmac = {name: 'HMAC', hash: {name: 'sha-1'}}; 27 hmac = {name: 'HMAC', hash: {name: 'sha-1'}};
28 28
29 importHmacKey().then(function(result) { 29 importHmacKey().then(function(result) {
30 key = result; 30 key = result;
31 31
32 // Pass invalid signature parameters to verify() 32 // Pass invalid signature parameters to verify()
33 shouldThrow("crypto.subtle.verify(hmac, key, null, data)"); 33 return crypto.subtle.verify(hmac, key, null, data);
34 shouldThrow("crypto.subtle.verify(hmac, key, 'a', data)"); 34 }).then(failAndFinishJSTest, function(result) {
35 shouldThrow("crypto.subtle.verify(hmac, key, [], data)"); 35 error = result;
36 shouldBeNull("error");
37
38 // Pass invalid signature parameters to verify()
39 return crypto.subtle.verify(hmac, key, 'a', data);
40 }).then(failAndFinishJSTest, function(result) {
41 error = result;
42 shouldBeNull("error");
43
44 // Pass invalid signature parameters to verify()
45 return crypto.subtle.verify(hmac, key, [], data);
46 }).then(failAndFinishJSTest, function(result) {
47 error = result;
48 shouldBeNull("error");
36 49
37 // Operation does not support signing. 50 // Operation does not support signing.
38 return crypto.subtle.sign({name: 'sha-1'}, key, data); 51 return crypto.subtle.sign({name: 'sha-1'}, key, data);
39 }).then(failAndFinishJSTest, function(result) { 52 }).then(failAndFinishJSTest, function(result) {
40 error = result; 53 error = result;
41 shouldBeNull("error"); 54 shouldBeNull("error");
42 55
43 // Operation doesn't support signing (also given an invalid key, but the 56 // Operation doesn't support signing (also given an invalid key, but the
44 // first failure takes priority) 57 // first failure takes priority)
45 return crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, key, data); 58 return crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, key, data);
46 }).then(failAndFinishJSTest, function(result) { 59 }).then(failAndFinishJSTest, function(result) {
47 error = result; 60 error = result;
48 shouldBeNull("error"); 61 shouldBeNull("error");
49 }).then(finishJSTest, failAndFinishJSTest); 62 }).then(finishJSTest, failAndFinishJSTest);
50 63
51 </script> 64 </script>
52 65
53 </body> 66 </body>
54 </html> 67 </html>
OLDNEW
« no previous file with comments | « LayoutTests/crypto/importKey-badParameters-expected.txt ('k') | LayoutTests/crypto/sign-verify-badParameters-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698