Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1304)

Side by Side Diff: LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html

Issue 289073005: [webcrypto] Hook up parameter normalization for RSA-OAEP. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: rebase Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script src="../resources/js-test.js"></script> 4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script> 5 <script src="resources/common.js"></script>
6 </head> 6 </head>
7 <body> 7 <body>
8 <p id="description"></p> 8 <p id="description"></p>
9 <div id="console"></div> 9 <div id="console"></div>
10 10
11 <script> 11 <script>
12 description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters."); 12 description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters.");
13 jsTestIsAsync = true; 13 jsTestIsAsync = true;
14 14
15 extractable = true; 15 extractable = true;
16 keyUsages = ['sign', 'verify']; 16 keyUsages = ['sign', 'verify'];
17 17
18 Promise.resolve(null).then(function() { 18 Promise.resolve(null).then(function() {
19 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages); 19 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's ha-1'}, modulusLength: -30}, extractable , keyUsages);
20 }).then(failAndFinishJSTest, function(result) { 20 }).then(failAndFinishJSTest, function(result) {
21 logError(result); 21 logError(result);
22 22
23 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages); 23 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's ha-1'}, modulusLength: NaN}, extractable , keyUsages);
24 }).then(failAndFinishJSTest, function(result) { 24 }).then(failAndFinishJSTest, function(result) {
25 logError(result); 25 logError(result);
26 26
27 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5'}, extractable , keyUsages); 27 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's ha-1'}}, extractable , keyUsages);
28 }).then(failAndFinishJSTest, function(result) { 28 }).then(failAndFinishJSTest, function(result) {
29 logError(result); 29 logError(result);
30 30
31 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages); 31 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's ha-1'}, modulusLength: 10}, extractable , keyUsages);
32 }).then(failAndFinishJSTest, function(result) { 32 }).then(failAndFinishJSTest, function(result) {
33 logError(result); 33 logError(result);
34 34
35 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages); 35 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's ha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
36 }).then(failAndFinishJSTest, function(result) { 36 }).then(failAndFinishJSTest, function(result) {
37 logError(result); 37 logError(result);
38 38
39 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages); 39 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's ha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages);
40 }).then(failAndFinishJSTest, function(result) {
41 logError(result);
42
43 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'N OT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
44 }).then(failAndFinishJSTest, function(result) {
45 logError(result);
46
47 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
40 }).then(failAndFinishJSTest, function(result) { 48 }).then(failAndFinishJSTest, function(result) {
41 logError(result); 49 logError(result);
42 }).then(finishJSTest, failAndFinishJSTest); 50 }).then(finishJSTest, failAndFinishJSTest);
43 51
44 </script> 52 </script>
45 53
46 </body> 54 </body>
47 </html> 55 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698