Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(157)

Side by Side Diff: LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-with-leading-zeroes-in-exponent.html

Issue 333063004: Speed up slow tests by reducing RSA modulus size (from 2048 --> 512). (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Add more tests Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script src="../resources/js-test.js"></script> 4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script> 5 <script src="resources/common.js"></script>
6 </head> 6 </head>
7 <body> 7 <body>
8 <p id="description"></p> 8 <p id="description"></p>
9 <div id="console"></div> 9 <div id="console"></div>
10 10
11 <script> 11 <script>
12 description("Test generating an RSA key pair for RSASSA-PKCS1-v1_5 when exponent has leading zeroes."); 12 description("Test generating an RSA key pair for RSASSA-PKCS1-v1_5 when exponent has leading zeroes.");
13 13
14 jsTestIsAsync = true; 14 jsTestIsAsync = true;
15 15
16 var algorithmKeyGen = { 16 var algorithmKeyGen = {
17 name: "RSASSA-PKCS1-v1_5", 17 name: "RSASSA-PKCS1-v1_5",
18 hash: {name: "sha-256"}, 18 hash: {name: "sha-256"},
19 // RsaKeyGenParams 19 // RsaKeyGenParams
20 modulusLength: 2048, 20 modulusLength: 512,
21 publicExponent: new Uint8Array([0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x 01]), // Equivalent to 65537 21 publicExponent: new Uint8Array([0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x 01]), // Equivalent to 65537
22 }; 22 };
23 var extractable = true; 23 var extractable = true;
24 24
25 debug("Generating a key pair..."); 25 debug("Generating a key pair...");
26 crypto.subtle.generateKey(algorithmKeyGen, extractable, ["sign", "verify"]).then (function(result) { 26 crypto.subtle.generateKey(algorithmKeyGen, extractable, ["sign", "verify"]).then (function(result) {
27 keyPair = result; 27 keyPair = result;
28 shouldBe("keyPair.toString()", "'[object KeyPair]'"); 28 shouldBe("keyPair.toString()", "'[object KeyPair]'");
29 shouldBe("keyPair.publicKey.type", "'public'"); 29 shouldBe("keyPair.publicKey.type", "'public'");
30 shouldBe("keyPair.publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 30 shouldBe("keyPair.publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
31 shouldBe("keyPair.publicKey.algorithm.modulusLength", "2048"); 31 shouldBe("keyPair.publicKey.algorithm.modulusLength", "512");
32 shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'0 10001'"); 32 shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'0 10001'");
33 shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "' 010001'"); 33 shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "' 010001'");
34 shouldBe("keyPair.publicKey.usages", '["verify"]'); 34 shouldBe("keyPair.publicKey.usages", '["verify"]');
35 35
36 shouldBe("keyPair.privateKey.type", "'private'"); 36 shouldBe("keyPair.privateKey.type", "'private'");
37 shouldBe("keyPair.privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 37 shouldBe("keyPair.privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
38 shouldBe("keyPair.privateKey.algorithm.modulusLength", "2048"); 38 shouldBe("keyPair.privateKey.algorithm.modulusLength", "512");
39 shouldBe("keyPair.privateKey.usages", '["sign"]'); 39 shouldBe("keyPair.privateKey.usages", '["sign"]');
40 }).then(finishJSTest, failAndFinishJSTest); 40 }).then(finishJSTest, failAndFinishJSTest);
41 </script> 41 </script>
42 42
43 </body> 43 </body>
44 </html> 44 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698