| OLD | NEW |
| (Empty) |
| 1 <!DOCTYPE html> | |
| 2 <html> | |
| 3 <head> | |
| 4 <script src="../resources/js-test.js"></script> | |
| 5 <script src="resources/common.js"></script> | |
| 6 </head> | |
| 7 <body> | |
| 8 <p id="description"></p> | |
| 9 <div id="console"></div> | |
| 10 | |
| 11 <script> | |
| 12 description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters."); | |
| 13 jsTestIsAsync = true; | |
| 14 | |
| 15 extractable = true; | |
| 16 keyUsages = ['sign', 'verify']; | |
| 17 | |
| 18 Promise.resolve(null).then(function() { | |
| 19 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: -30}, extractable , keyUsages); | |
| 20 }).then(failAndFinishJSTest, function(result) { | |
| 21 logError(result); | |
| 22 | |
| 23 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: NaN}, extractable , keyUsages); | |
| 24 }).then(failAndFinishJSTest, function(result) { | |
| 25 logError(result); | |
| 26 | |
| 27 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}}, extractable , keyUsages); | |
| 28 }).then(failAndFinishJSTest, function(result) { | |
| 29 logError(result); | |
| 30 | |
| 31 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10}, extractable , keyUsages); | |
| 32 }).then(failAndFinishJSTest, function(result) { | |
| 33 logError(result); | |
| 34 | |
| 35 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages); | |
| 36 }).then(failAndFinishJSTest, function(result) { | |
| 37 logError(result); | |
| 38 | |
| 39 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages); | |
| 40 }).then(failAndFinishJSTest, function(result) { | |
| 41 logError(result); | |
| 42 | |
| 43 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , key
Usages); | |
| 44 }).then(failAndFinishJSTest, function(result) { | |
| 45 logError(result); | |
| 46 | |
| 47 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , k
eyUsages); | |
| 48 }).then(failAndFinishJSTest, function(result) { | |
| 49 logError(result); | |
| 50 | |
| 51 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'N
OT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable
, keyUsages); | |
| 52 }).then(failAndFinishJSTest, function(result) { | |
| 53 logError(result); | |
| 54 | |
| 55 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength:
10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); | |
| 56 }).then(failAndFinishJSTest, function(result) { | |
| 57 logError(result); | |
| 58 }).then(finishJSTest, failAndFinishJSTest); | |
| 59 | |
| 60 </script> | |
| 61 | |
| 62 </body> | |
| 63 </html> | |
| OLD | NEW |