| Index: LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
|
| diff --git a/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html b/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
|
| index 72d318eabacab8729b5636e49a6d4fc1629844d6..189a61805be29ad6506baf0e2f9f5f17106135f1 100644
|
| --- a/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
|
| +++ b/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html
|
| @@ -16,27 +16,35 @@ extractable = true;
|
| keyUsages = ['sign', 'verify'];
|
|
|
| Promise.resolve(null).then(function() {
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages);
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| logError(result);
|
|
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages);
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| logError(result);
|
|
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5'}, extractable , keyUsages);
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| logError(result);
|
|
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages);
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| logError(result);
|
|
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| logError(result);
|
|
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages);
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages);
|
| +}).then(failAndFinishJSTest, function(result) {
|
| + logError(result);
|
| +
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
|
| +}).then(failAndFinishJSTest, function(result) {
|
| + logError(result);
|
| +
|
| + return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
|
| }).then(failAndFinishJSTest, function(result) {
|
| logError(result);
|
| }).then(finishJSTest, failAndFinishJSTest);
|
|
|