Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(395)

Unified Diff: LayoutTests/crypto/aes-gcm-parseAlgorithm-failures.html

Issue 790373002: Address a FIXME. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | LayoutTests/crypto/aes-gcm-parseAlgorithm-failures-expected.txt » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: LayoutTests/crypto/aes-gcm-parseAlgorithm-failures.html
diff --git a/LayoutTests/crypto/aes-gcm-parseAlgorithm-failures.html b/LayoutTests/crypto/aes-gcm-parseAlgorithm-failures.html
index 6af0cdb1258ec5e66bb8d2f5b217b7ac28b32930..9668fc8af51c1efca332633eabcfa126127470a1 100644
--- a/LayoutTests/crypto/aes-gcm-parseAlgorithm-failures.html
+++ b/LayoutTests/crypto/aes-gcm-parseAlgorithm-failures.html
@@ -22,37 +22,55 @@ Promise.resolve(null).then(function(result) {
var extractable = false;
var algorithm = {name: 'aes-gcm'};
+ debug('\nImporting AES-GCM key...');
return crypto.subtle.importKey('raw', keyData, algorithm, extractable, usages);
}).then(function(result) {
key = result;
+ debug('\nencrypt() without iv...');
return crypto.subtle.encrypt({name: 'AES-gcm'}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+ debug('\nencrypt() with iv that is a number...');
return crypto.subtle.encrypt({name: 'AES-gcm', iv: 3}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+ debug('\nencrypt() with iv that is a string...');
return crypto.subtle.encrypt({name: 'AES-gcm', iv: 'foo'}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+ debug('\nencrypt() with additionalData that is a string...');
return crypto.subtle.encrypt({name: 'AeS-gcm', iv: new Uint8Array(16), additionalData: '5'}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+ debug('\nencrypt() with tagLength that is a string...');
return crypto.subtle.encrypt({name: 'AES-gcm', iv: new Uint8Array(16), additionalData: new Uint8Array(1), tagLength: 'foo'}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+ debug('\nencrypt() with negative tagLength...');
return crypto.subtle.encrypt({name: 'AES-gcm', iv: new Uint8Array(16), additionalData: new Uint8Array(1), tagLength: -1}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+ debug('\nencrypt() with tagLength larger than an octet...');
return crypto.subtle.encrypt({name: 'AES-gcm', iv: new Uint8Array(16), additionalData: new Uint8Array(1), tagLength: 8000}, key, data);
}).then(failAndFinishJSTest, function(result) {
logError(result);
+
+ debug('\nencrypt() with tagLength that is 0...');
+ return crypto.subtle.encrypt({name: 'AES-gcm', iv: new Uint8Array(16), additionalData: new Uint8Array(1), tagLength: 0}, key, data);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ debug('\nencrypt() with tagLength that is 130...');
jww 2014/12/11 03:42:20 Is it worth throwing in a negative value test, jus
eroman 2014/12/11 03:44:13 There is already a test for -1 on line 55, do you
+ return crypto.subtle.encrypt({name: 'AES-gcm', iv: new Uint8Array(16), additionalData: new Uint8Array(1), tagLength: 130}, key, data);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
}).then(finishJSTest, failAndFinishJSTest);
</script>
« no previous file with comments | « no previous file | LayoutTests/crypto/aes-gcm-parseAlgorithm-failures-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698