| OLD | NEW |
| (Empty) |
| 1 <!DOCTYPE html> | |
| 2 <html> | |
| 3 <head> | |
| 4 <script src="../resources/js-test.js"></script> | |
| 5 <script src="resources/common.js"></script> | |
| 6 </head> | |
| 7 <body> | |
| 8 <p id="description"></p> | |
| 9 <div id="console"></div> | |
| 10 | |
| 11 <script> | |
| 12 description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters."); | |
| 13 jsTestIsAsync = true; | |
| 14 | |
| 15 extractable = true; | |
| 16 keyUsages = ['sign', 'verify']; | |
| 17 | |
| 18 Promise.resolve(null).then(function() { | |
| 19 debug("\ngenerateKey() with a modulusLength -30..."); | |
| 20 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: -30}, extractable , keyUsages); | |
| 21 }).then(failAndFinishJSTest, function(result) { | |
| 22 logError(result); | |
| 23 | |
| 24 debug("\ngenerateKey() with modulusLength NaN..."); | |
| 25 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: NaN}, extractable , keyUsages); | |
| 26 }).then(failAndFinishJSTest, function(result) { | |
| 27 logError(result); | |
| 28 | |
| 29 debug("\ngenerateKey() without modulusLength..."); | |
| 30 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}}, extractable , keyUsages); | |
| 31 }).then(failAndFinishJSTest, function(result) { | |
| 32 logError(result); | |
| 33 | |
| 34 debug("\ngenerateKey() without publicExponent..."); | |
| 35 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10}, extractable , keyUsages); | |
| 36 }).then(failAndFinishJSTest, function(result) { | |
| 37 logError(result); | |
| 38 | |
| 39 debug("\ngenerateKey() with publicExponent that is an integer..."); | |
| 40 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages); | |
| 41 }).then(failAndFinishJSTest, function(result) { | |
| 42 logError(result); | |
| 43 | |
| 44 debug("\ngenerateKey() with publicExponent that is null..."); | |
| 45 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages); | |
| 46 }).then(failAndFinishJSTest, function(result) { | |
| 47 logError(result); | |
| 48 | |
| 49 debug("\ngenerateKey() with modulusLength that is 10..."); | |
| 50 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , key
Usages); | |
| 51 }).then(failAndFinishJSTest, function(result) { | |
| 52 logError(result); | |
| 53 | |
| 54 debug("\ngenerateKey() with publicExponent that is 0 bytes long..."); | |
| 55 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , k
eyUsages); | |
| 56 }).then(failAndFinishJSTest, function(result) { | |
| 57 logError(result); | |
| 58 | |
| 59 debug("\ngenerateKey() with invalid hash name..."); | |
| 60 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'N
OT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable
, keyUsages); | |
| 61 }).then(failAndFinishJSTest, function(result) { | |
| 62 logError(result); | |
| 63 | |
| 64 debug("\ngenerateKey() without hash name..."); | |
| 65 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength:
10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); | |
| 66 }).then(failAndFinishJSTest, function(result) { | |
| 67 logError(result); | |
| 68 }).then(finishJSTest, failAndFinishJSTest); | |
| 69 | |
| 70 </script> | |
| 71 | |
| 72 </body> | |
| 73 </html> | |
| OLD | NEW |