Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 <!DOCTYPE html> | 1 <!DOCTYPE html> |
| 2 <html> | 2 <html> |
| 3 <head> | 3 <head> |
| 4 <script src="../resources/js-test.js"></script> | 4 <script src="../resources/js-test.js"></script> |
| 5 <script src="resources/common.js"></script> | 5 <script src="resources/common.js"></script> |
| 6 </head> | 6 </head> |
| 7 <body> | 7 <body> |
| 8 <p id="description"></p> | 8 <p id="description"></p> |
| 9 <div id="console"></div> | 9 <div id="console"></div> |
| 10 | 10 |
| (...skipping 21 matching lines...) Expand all Loading... | |
| 32 keyPairs.ecdh.p384_1 = result; | 32 keyPairs.ecdh.p384_1 = result; |
| 33 | 33 |
| 34 return crypto.subtle.generateKey({name: "ecdsa", namedCurve: "P-256"}, tru e, ["sign"]); | 34 return crypto.subtle.generateKey({name: "ecdsa", namedCurve: "P-256"}, tru e, ["sign"]); |
| 35 }).then(function(result) { | 35 }).then(function(result) { |
| 36 keyPairs.ecdsa.p256_1 = result; | 36 keyPairs.ecdsa.p256_1 = result; |
| 37 }); | 37 }); |
| 38 } | 38 } |
| 39 | 39 |
| 40 createTestKeys().then(function(result) { | 40 createTestKeys().then(function(result) { |
| 41 // Bad algorithm parameter (no algorithm name or public key) | 41 // Bad algorithm parameter (no algorithm name or public key) |
| 42 debug("\nderiveBits() without algorithm name or public key..."); | |
| 42 return crypto.subtle.deriveBits({}, keyPairs.ecdh.p256_1.privateKey, 256); | 43 return crypto.subtle.deriveBits({}, keyPairs.ecdh.p256_1.privateKey, 256); |
| 43 }).then(failAndFinishJSTest, function(result) { | 44 }).then(failAndFinishJSTest, function(result) { |
| 44 logError(result); | 45 logError(result); |
| 45 | 46 |
| 46 // Bad algorithm parameter (no public key) | 47 // Bad algorithm parameter (no public key) |
| 48 debug("\nderiveBits() without public key..."); | |
| 47 return crypto.subtle.deriveBits({name: 'ecdh'}, keyPairs.ecdh.p256_1.privateKe y, 256); | 49 return crypto.subtle.deriveBits({name: 'ecdh'}, keyPairs.ecdh.p256_1.privateKe y, 256); |
| 48 }).then(failAndFinishJSTest, function(result) { | 50 }).then(failAndFinishJSTest, function(result) { |
| 49 logError(result); | 51 logError(result); |
| 50 | 52 |
| 51 // Bad algorithm parameter (null) | 53 // Bad algorithm parameter (null) |
| 54 debug("\nderiveBits() with algorithm name that is null..."); | |
|
eroman
2014/12/12 19:37:02
"with algorithm that is null"
(the name would be
Paritosh Kumar
2014/12/15 08:21:27
Done.
| |
| 52 return crypto.subtle.deriveBits(null, keyPairs.ecdh.p256_1.privateKey, 256); | 55 return crypto.subtle.deriveBits(null, keyPairs.ecdh.p256_1.privateKey, 256); |
| 53 }).then(failAndFinishJSTest, function(result) { | 56 }).then(failAndFinishJSTest, function(result) { |
| 54 logError(result); | 57 logError(result); |
| 55 | 58 |
| 56 // Bad algorithm parameter (not an object) | 59 // Bad algorithm parameter (not an object) |
| 60 debug("\nderiveBits() with algorithm name that is -1..."); | |
|
eroman
2014/12/12 19:37:02
replace "algorithm name" --> "algorithm"
Paritosh Kumar
2014/12/15 08:21:27
Done.
| |
| 57 return crypto.subtle.deriveBits(-1, keyPairs.ecdh.p256_1.privateKey, 256); | 61 return crypto.subtle.deriveBits(-1, keyPairs.ecdh.p256_1.privateKey, 256); |
| 58 }).then(failAndFinishJSTest, function(result) { | 62 }).then(failAndFinishJSTest, function(result) { |
| 59 logError(result); | 63 logError(result); |
| 60 | 64 |
| 61 // Bad algorithm parameter (public key is null) | 65 // Bad algorithm parameter (public key is null) |
| 66 debug("\nderiveBits() with public key that is null..."); | |
| 62 return crypto.subtle.deriveBits({name: 'ecdh', public: null}, keyPairs.ecdh.p2 56_1.privateKey, 256); | 67 return crypto.subtle.deriveBits({name: 'ecdh', public: null}, keyPairs.ecdh.p2 56_1.privateKey, 256); |
| 63 }).then(failAndFinishJSTest, function(result) { | 68 }).then(failAndFinishJSTest, function(result) { |
| 64 logError(result); | 69 logError(result); |
| 65 | 70 |
| 66 // Bad algorithm parameter (public key is wrong type) | 71 // Bad algorithm parameter (public key is wrong type) |
| 72 debug("\nderiveBits() with public key that is -1..."); | |
| 67 return crypto.subtle.deriveBits({name: 'ecdh', public: -1}, keyPairs.ecdh.p256 _1.privateKey, 256); | 73 return crypto.subtle.deriveBits({name: 'ecdh', public: -1}, keyPairs.ecdh.p256 _1.privateKey, 256); |
| 68 }).then(failAndFinishJSTest, function(result) { | 74 }).then(failAndFinishJSTest, function(result) { |
| 69 logError(result); | 75 logError(result); |
| 70 | 76 |
| 71 // Bad algorithm parameter (public key is wrong type) | 77 // Bad algorithm parameter (public key is wrong type) |
| 78 debug("\nderiveBits() with public key that is a string..."); | |
| 72 return crypto.subtle.deriveBits({name: 'ecdh', public: "foo"}, keyPairs.ecdh.p 256_1.privateKey, 256); | 79 return crypto.subtle.deriveBits({name: 'ecdh', public: "foo"}, keyPairs.ecdh.p 256_1.privateKey, 256); |
| 73 }).then(failAndFinishJSTest, function(result) { | 80 }).then(failAndFinishJSTest, function(result) { |
| 74 logError(result); | 81 logError(result); |
| 75 | 82 |
| 76 // Bad algorithm parameter (public key is for wrong curve) | 83 // Bad algorithm parameter (public key is for wrong curve) |
| 84 debug("\nderiveBits() with wrong curve public key..."); | |
| 77 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p384_1.pu blicKey}, keyPairs.ecdh.p256_1.privateKey, 256); | 85 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p384_1.pu blicKey}, keyPairs.ecdh.p256_1.privateKey, 256); |
| 78 }).then(failAndFinishJSTest, function(result) { | 86 }).then(failAndFinishJSTest, function(result) { |
| 79 logError(result); | 87 logError(result); |
| 80 | 88 |
| 81 // Bad algorithm parameter (public key is not a public key) | 89 // Bad algorithm parameter (public key is not a public key) |
| 90 debug("\nderiveBits() with private key as public key..."); | |
|
eroman
2014/12/12 19:37:02
This is a bit hard to read. How about:
deriveBits
| |
| 82 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p256_2.pr ivateKey}, keyPairs.ecdh.p256_1.privateKey, 256); | 91 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p256_2.pr ivateKey}, keyPairs.ecdh.p256_1.privateKey, 256); |
| 83 }).then(failAndFinishJSTest, function(result) { | 92 }).then(failAndFinishJSTest, function(result) { |
| 84 logError(result); | 93 logError(result); |
| 85 | 94 |
| 86 // Bad algorithm parameter (public key is for ECDSA). | 95 // Bad algorithm parameter (public key is for ECDSA). |
| 96 debug("\nderiveBits() with public key that is for ECDSA..."); | |
| 87 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdsa.p256_1.p ublicKey}, keyPairs.ecdh.p256_1.privateKey, {test: 3}); | 97 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdsa.p256_1.p ublicKey}, keyPairs.ecdh.p256_1.privateKey, {test: 3}); |
| 88 }).then(failAndFinishJSTest, function(result) { | 98 }).then(failAndFinishJSTest, function(result) { |
| 89 logError(result); | 99 logError(result); |
| 90 }).then(finishJSTest, failAndFinishJSTest); | 100 }).then(finishJSTest, failAndFinishJSTest); |
| 91 | 101 |
| 92 </script> | 102 </script> |
| 93 | 103 |
| 94 </body> | 104 </body> |
| 95 </html> | 105 </html> |
| OLD | NEW |