Chromium Code Reviews| Index: LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html |
| diff --git a/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html b/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html |
| index 903b60827882ddab2ddf6a105582c544886dd947..902d052ede5435ca6fefed1dcbcb5ebea8647102 100644 |
| --- a/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html |
| +++ b/LayoutTests/crypto/rsa-ssa-generateKey-parseAlgorithm-failures.html |
| @@ -16,42 +16,52 @@ extractable = true; |
| keyUsages = ['sign', 'verify']; |
| Promise.resolve(null).then(function() { |
| + debug("\ngenerateKey() with negative modulusLength..."); |
|
eroman
2014/12/12 19:37:02
Same comment as earlier (mention exact length)
Paritosh Kumar
2014/12/15 08:21:27
Done.
|
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() with modulusLength that is NaN..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() without modulusLength..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() without publicExponent..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() with publicExponent that is an integer..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() with publicExponent that is null..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() with modulusLength that is 10..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() with publicExponent that is of 0 bytes..."); |
|
eroman
2014/12/12 19:37:02
"that is 0 bytes long"
Paritosh Kumar
2014/12/15 08:21:27
Done.
|
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() with invalid hash name..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |
| + debug("\ngenerateKey() without hash name..."); |
| return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); |
| }).then(failAndFinishJSTest, function(result) { |
| logError(result); |