OLD | NEW |
| (Empty) |
1 <!DOCTYPE html> | |
2 <html> | |
3 <head> | |
4 <script src="../resources/js-test.js"></script> | |
5 <script src="resources/common.js"></script> | |
6 </head> | |
7 <body> | |
8 <p id="description"></p> | |
9 <div id="console"></div> | |
10 | |
11 <script> | |
12 description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters."); | |
13 jsTestIsAsync = true; | |
14 | |
15 extractable = true; | |
16 keyUsages = ['sign', 'verify']; | |
17 | |
18 Promise.resolve(null).then(function() { | |
19 debug("\ngenerateKey() with a modulusLength -30..."); | |
20 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: -30}, extractable , keyUsages); | |
21 }).then(failAndFinishJSTest, function(result) { | |
22 logError(result); | |
23 | |
24 debug("\ngenerateKey() with modulusLength NaN..."); | |
25 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: NaN}, extractable , keyUsages); | |
26 }).then(failAndFinishJSTest, function(result) { | |
27 logError(result); | |
28 | |
29 debug("\ngenerateKey() without modulusLength..."); | |
30 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}}, extractable , keyUsages); | |
31 }).then(failAndFinishJSTest, function(result) { | |
32 logError(result); | |
33 | |
34 debug("\ngenerateKey() without publicExponent..."); | |
35 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10}, extractable , keyUsages); | |
36 }).then(failAndFinishJSTest, function(result) { | |
37 logError(result); | |
38 | |
39 debug("\ngenerateKey() with publicExponent that is an integer..."); | |
40 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages); | |
41 }).then(failAndFinishJSTest, function(result) { | |
42 logError(result); | |
43 | |
44 debug("\ngenerateKey() with publicExponent that is null..."); | |
45 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages); | |
46 }).then(failAndFinishJSTest, function(result) { | |
47 logError(result); | |
48 | |
49 debug("\ngenerateKey() with modulusLength that is 10..."); | |
50 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , key
Usages); | |
51 }).then(failAndFinishJSTest, function(result) { | |
52 logError(result); | |
53 | |
54 debug("\ngenerateKey() with publicExponent that is 0 bytes long..."); | |
55 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 's
ha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , k
eyUsages); | |
56 }).then(failAndFinishJSTest, function(result) { | |
57 logError(result); | |
58 | |
59 debug("\ngenerateKey() with invalid hash name..."); | |
60 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'N
OT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable
, keyUsages); | |
61 }).then(failAndFinishJSTest, function(result) { | |
62 logError(result); | |
63 | |
64 debug("\ngenerateKey() without hash name..."); | |
65 return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength:
10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); | |
66 }).then(failAndFinishJSTest, function(result) { | |
67 logError(result); | |
68 }).then(finishJSTest, failAndFinishJSTest); | |
69 | |
70 </script> | |
71 | |
72 </body> | |
73 </html> | |
OLD | NEW |