Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(89)

Unified Diff: LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html

Issue 289073005: [webcrypto] Hook up parameter normalization for RSA-OAEP. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: rebase Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
diff --git a/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html b/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
index 72d318eabacab8729b5636e49a6d4fc1629844d6..189a61805be29ad6506baf0e2f9f5f17106135f1 100644
--- a/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
+++ b/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
@@ -16,27 +16,35 @@ extractable = true;
keyUsages = ['sign', 'verify'];
Promise.resolve(null).then(function() {
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages);
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages);
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5'}, extractable , keyUsages);
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages);
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages);
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
}).then(finishJSTest, failAndFinishJSTest);

Powered by Google App Engine
This is Rietveld 408576698