| OLD | NEW |
| (Empty) |
| 1 <!DOCTYPE html> | |
| 2 <html> | |
| 3 <head> | |
| 4 <script src="../resources/js-test.js"></script> | |
| 5 <script src="resources/common.js"></script> | |
| 6 </head> | |
| 7 <body> | |
| 8 <p id="description"></p> | |
| 9 <div id="console"></div> | |
| 10 | |
| 11 <script> | |
| 12 description("Tests generateKey() with bad RSAES-PKCS1-v1_5 parameters"); | |
| 13 jsTestIsAsync = true; | |
| 14 | |
| 15 extractable = true; | |
| 16 keyUsages = ['encrypt', 'decrypt']; | |
| 17 | |
| 18 Promise.resolve(null).then(function() { | |
| 19 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -
30}, extractable , keyUsages); | |
| 20 }).then(failAndFinishJSTest, function(result) { | |
| 21 logError(result); | |
| 22 | |
| 23 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: N
aN}, extractable , keyUsages); | |
| 24 }).then(failAndFinishJSTest, function(result) { | |
| 25 logError(result); | |
| 26 | |
| 27 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , k
eyUsages); | |
| 28 }).then(failAndFinishJSTest, function(result) { | |
| 29 logError(result); | |
| 30 | |
| 31 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0}, extractable , keyUsages); | |
| 32 }).then(failAndFinishJSTest, function(result) { | |
| 33 logError(result); | |
| 34 | |
| 35 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0, publicExponent: 10}, extractable , keyUsages); | |
| 36 }).then(failAndFinishJSTest, function(result) { | |
| 37 logError(result); | |
| 38 | |
| 39 return crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 1
0, publicExponent: null}, extractable , keyUsages); | |
| 40 }).then(failAndFinishJSTest, function(result) { | |
| 41 logError(result); | |
| 42 }).then(finishJSTest, failAndFinishJSTest); | |
| 43 | |
| 44 </script> | |
| 45 | |
| 46 </body> | |
| 47 </html> | |
| OLD | NEW |