Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(307)

Side by Side Diff: LayoutTests/crypto/ecdh-deriveBits-failures.html

Issue 801793003: Improve LayoutTest output for Errors (Closed) Base URL: https://chromium.googlesource.com/chromium/blink.git@master
Patch Set: Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script src="../resources/js-test.js"></script> 4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script> 5 <script src="resources/common.js"></script>
6 </head> 6 </head>
7 <body> 7 <body>
8 <p id="description"></p> 8 <p id="description"></p>
9 <div id="console"></div> 9 <div id="console"></div>
10 10
(...skipping 20 matching lines...) Expand all
31 }).then(function(result) { 31 }).then(function(result) {
32 keyPairs.ecdh.p384_1 = result; 32 keyPairs.ecdh.p384_1 = result;
33 33
34 return crypto.subtle.generateKey({name: "ecdsa", namedCurve: "P-256"}, tru e, ["sign"]); 34 return crypto.subtle.generateKey({name: "ecdsa", namedCurve: "P-256"}, tru e, ["sign"]);
35 }).then(function(result) { 35 }).then(function(result) {
36 keyPairs.ecdsa.p256_1 = result; 36 keyPairs.ecdsa.p256_1 = result;
37 }); 37 });
38 } 38 }
39 39
40 createTestKeys().then(function(result) { 40 createTestKeys().then(function(result) {
41 // Bad algorithm parameter (no algorithm name or public key) 41 debug("\nderiveBits() without algorithm name or public key...");
42 return crypto.subtle.deriveBits({}, keyPairs.ecdh.p256_1.privateKey, 256); 42 return crypto.subtle.deriveBits({}, keyPairs.ecdh.p256_1.privateKey, 256);
43 }).then(failAndFinishJSTest, function(result) { 43 }).then(failAndFinishJSTest, function(result) {
44 logError(result); 44 logError(result);
45 45
46 // Bad algorithm parameter (no public key) 46 debug("\nderiveBits() without public key...");
47 return crypto.subtle.deriveBits({name: 'ecdh'}, keyPairs.ecdh.p256_1.privateKe y, 256); 47 return crypto.subtle.deriveBits({name: 'ecdh'}, keyPairs.ecdh.p256_1.privateKe y, 256);
48 }).then(failAndFinishJSTest, function(result) { 48 }).then(failAndFinishJSTest, function(result) {
49 logError(result); 49 logError(result);
50 50
51 // Bad algorithm parameter (null) 51 debug("\nderiveBits() with algorithm that is null...");
52 return crypto.subtle.deriveBits(null, keyPairs.ecdh.p256_1.privateKey, 256); 52 return crypto.subtle.deriveBits(null, keyPairs.ecdh.p256_1.privateKey, 256);
53 }).then(failAndFinishJSTest, function(result) { 53 }).then(failAndFinishJSTest, function(result) {
54 logError(result); 54 logError(result);
55 55
56 // Bad algorithm parameter (not an object) 56 debug("\nderiveBits() with algorithm that is -1...");
57 return crypto.subtle.deriveBits(-1, keyPairs.ecdh.p256_1.privateKey, 256); 57 return crypto.subtle.deriveBits(-1, keyPairs.ecdh.p256_1.privateKey, 256);
58 }).then(failAndFinishJSTest, function(result) { 58 }).then(failAndFinishJSTest, function(result) {
59 logError(result); 59 logError(result);
60 60
61 // Bad algorithm parameter (public key is null) 61 debug("\nderiveBits() with public key that is null...");
62 return crypto.subtle.deriveBits({name: 'ecdh', public: null}, keyPairs.ecdh.p2 56_1.privateKey, 256); 62 return crypto.subtle.deriveBits({name: 'ecdh', public: null}, keyPairs.ecdh.p2 56_1.privateKey, 256);
63 }).then(failAndFinishJSTest, function(result) { 63 }).then(failAndFinishJSTest, function(result) {
64 logError(result); 64 logError(result);
65 65
66 // Bad algorithm parameter (public key is wrong type) 66 debug("\nderiveBits() with public key that is -1...");
67 return crypto.subtle.deriveBits({name: 'ecdh', public: -1}, keyPairs.ecdh.p256 _1.privateKey, 256); 67 return crypto.subtle.deriveBits({name: 'ecdh', public: -1}, keyPairs.ecdh.p256 _1.privateKey, 256);
68 }).then(failAndFinishJSTest, function(result) { 68 }).then(failAndFinishJSTest, function(result) {
69 logError(result); 69 logError(result);
70 70
71 // Bad algorithm parameter (public key is wrong type) 71 debug("\nderiveBits() with public key that is a string...");
72 return crypto.subtle.deriveBits({name: 'ecdh', public: "foo"}, keyPairs.ecdh.p 256_1.privateKey, 256); 72 return crypto.subtle.deriveBits({name: 'ecdh', public: "foo"}, keyPairs.ecdh.p 256_1.privateKey, 256);
73 }).then(failAndFinishJSTest, function(result) { 73 }).then(failAndFinishJSTest, function(result) {
74 logError(result); 74 logError(result);
75 75
76 // Bad algorithm parameter (public key is for wrong curve) 76 debug("\nderiveBits() with wrong curve public key...");
77 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p384_1.pu blicKey}, keyPairs.ecdh.p256_1.privateKey, 256); 77 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p384_1.pu blicKey}, keyPairs.ecdh.p256_1.privateKey, 256);
78 }).then(failAndFinishJSTest, function(result) { 78 }).then(failAndFinishJSTest, function(result) {
79 logError(result); 79 logError(result);
80 80
81 // Bad algorithm parameter (public key is not a public key) 81 debug("\nderiveBits() with a private key as the 'public' parameter");
82 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p256_2.pr ivateKey}, keyPairs.ecdh.p256_1.privateKey, 256); 82 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p256_2.pr ivateKey}, keyPairs.ecdh.p256_1.privateKey, 256);
83 }).then(failAndFinishJSTest, function(result) { 83 }).then(failAndFinishJSTest, function(result) {
84 logError(result); 84 logError(result);
85 85
86 // Bad algorithm parameter (public key is for ECDSA). 86 debug("\nderiveBits() with public key that is for ECDSA...");
87 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdsa.p256_1.p ublicKey}, keyPairs.ecdh.p256_1.privateKey, {test: 3}); 87 return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdsa.p256_1.p ublicKey}, keyPairs.ecdh.p256_1.privateKey, {test: 3});
88 }).then(failAndFinishJSTest, function(result) { 88 }).then(failAndFinishJSTest, function(result) {
89 logError(result); 89 logError(result);
90 }).then(finishJSTest, failAndFinishJSTest); 90 }).then(finishJSTest, failAndFinishJSTest);
91 91
92 </script> 92 </script>
93 93
94 </body> 94 </body>
95 </html> 95 </html>
OLDNEW
« no previous file with comments | « LayoutTests/crypto/digest-failures-expected.txt ('k') | LayoutTests/crypto/ecdh-deriveBits-failures-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698