| OLD | NEW |
| 1 <!DOCTYPE html> | 1 <!DOCTYPE html> |
| 2 <html> | 2 <html> |
| 3 <head> | 3 <head> |
| 4 <script src="../resources/js-test.js"></script> | 4 <script src="../resources/js-test.js"></script> |
| 5 <script src="resources/common.js"></script> | 5 <script src="resources/common.js"></script> |
| 6 </head> | 6 </head> |
| 7 <body> | 7 <body> |
| 8 <p id="description"></p> | 8 <p id="description"></p> |
| 9 <div id="console"></div> | 9 <div id="console"></div> |
| 10 | 10 |
| 11 <script> | 11 <script> |
| 12 description("Tests generateKey() with bad RSAES-PKCS1-v1_5 parameters"); | 12 description("Tests generateKey() with bad RSAES-PKCS1-v1_5 parameters"); |
| 13 jsTestIsAsync = true; | 13 jsTestIsAsync = true; |
| 14 | 14 |
| 15 extractable = true; | 15 extractable = true; |
| 16 keyUsages = ['encrypt', 'decrypt']; | 16 keyUsages = ['encrypt', 'decrypt']; |
| 17 | 17 |
| 18 Promise.resolve(null).then(function() { | 18 Promise.resolve(null).then(function() { |
| 19 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -
30}, extractable , keyUsages); | 19 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -
30}, extractable , keyUsages); |
| 20 }).then(failAndFinishJSTest, function(result) { | 20 }).then(failAndFinishJSTest, function(result) { |
| 21 error = result; | 21 logError(result); |
| 22 shouldBeNull("error"); | |
| 23 | 22 |
| 24 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: N
aN}, extractable , keyUsages); | 23 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: N
aN}, extractable , keyUsages); |
| 25 }).then(failAndFinishJSTest, function(result) { | 24 }).then(failAndFinishJSTest, function(result) { |
| 26 error = result; | 25 logError(result); |
| 27 shouldBeNull("error"); | |
| 28 | 26 |
| 29 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , k
eyUsages); | 27 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , k
eyUsages); |
| 30 }).then(failAndFinishJSTest, function(result) { | 28 }).then(failAndFinishJSTest, function(result) { |
| 31 error = result; | 29 logError(result); |
| 32 shouldBeNull("error"); | |
| 33 | 30 |
| 34 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0}, extractable , keyUsages); | 31 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0}, extractable , keyUsages); |
| 35 }).then(failAndFinishJSTest, function(result) { | 32 }).then(failAndFinishJSTest, function(result) { |
| 36 error = result; | 33 logError(result); |
| 37 shouldBeNull("error"); | |
| 38 | 34 |
| 39 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0, publicExponent: 10}, extractable , keyUsages); | 35 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0, publicExponent: 10}, extractable , keyUsages); |
| 40 }).then(failAndFinishJSTest, function(result) { | 36 }).then(failAndFinishJSTest, function(result) { |
| 41 error = result; | 37 logError(result); |
| 42 shouldBeNull("error"); | |
| 43 | 38 |
| 44 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0, publicExponent: null}, extractable , keyUsages); | 39 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0, publicExponent: null}, extractable , keyUsages); |
| 45 }).then(failAndFinishJSTest, function(result) { | 40 }).then(failAndFinishJSTest, function(result) { |
| 46 error = result; | 41 logError(result); |
| 47 shouldBeNull("error"); | |
| 48 }).then(finishJSTest, failAndFinishJSTest); | 42 }).then(finishJSTest, failAndFinishJSTest); |
| 49 | 43 |
| 50 </script> | 44 </script> |
| 51 | 45 |
| 52 </body> | 46 </body> |
| 53 </html> | 47 </html> |
| OLD | NEW |