Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(24)

Unified Diff: LayoutTests/crypto/ecdh-deriveKey-failures.html

Issue 806913006: [WebCrypto] Move LayoutTests from crypto to crypto/subtle (Closed) Base URL: https://chromium.googlesource.com/chromium/blink.git@master
Patch Set: Update path for deserialize legacy tests Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/crypto/ecdh-deriveKey-failures.html
diff --git a/LayoutTests/crypto/ecdh-deriveKey-failures.html b/LayoutTests/crypto/ecdh-deriveKey-failures.html
deleted file mode 100644
index 518162a31f6568ddb542eb48ac5e952cd326a921..0000000000000000000000000000000000000000
--- a/LayoutTests/crypto/ecdh-deriveKey-failures.html
+++ /dev/null
@@ -1,258 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="../resources/js-test.js"></script>
-<script src="resources/common.js"></script>
-</head>
-<body>
-<p id="description"></p>
-<div id="console"></div>
-
-<script>
-description("Tests deriveKey() with various bad parameters for ECDH");
-
-jsTestIsAsync = true;
-
-// The test data uses a public key and private key (from different key pairs) for the P-521 curve.
-var privateKeyJwk = {
- "kty":"EC",
- "crv":"P-521",
- "d":"AI_Zu5xisuK-IIz85dTSoqaQSTxN1I88l05myJJ0ZYFMdQ2VmjFOIUTonKGG97yOGmikyid-6F48d7iI1zF6VRk7",
- "x":"ACw6DX7wqwHVO-JzyOet0B-r10YVLv5R5q_IfiWCzclg0u_x57NCtOcFCFpM2ZnS22tyYjZb0gBHGcgUE_I-h-6s",
- "y":"Actm2tCHBPOKLZMpJV3DaVOluln9zBsE2I0g6iV73I4M-liqA1rLSJN8q-vcSQtZF0JvzwuvGkGuTbvT_DaRQ2pf"
- };
-
-var publicKeyJwk = {
- "kty":"EC",
- "crv":"P-521",
- "x":"ADRllQ0B7icrnJ7ib2r-CXvymGFiC_3f6_o0SzLMBIggM8ndQm9l768SToMy1hUo64JsofGSQ37P4CRqT_QeivBD",
- "y":"ALKEzew1Xe4Sv86lZVqb2xxZ0l7WrE3DPJ93fUtSPih5iH8jg0GPDKMVoA5ffFmqPwbdgS2BK18PBFIT7QDGb2Zx"
-};
-
-var privateKey384Jwk = {
- "kty": "EC",
- "crv": "P-384",
- "d": "pJLOj6kAhMIn4aMveXTTnp_2en6HBew0GbNftgdYK-vUYeCxUgrHbsLdTptj665x",
- "x": "5V_ubEnY1SP1znv5wEJc5P9lBwi33lz7CVkBUjl5p_BCYC2zCFRzU2mBO1w_Xvho",
- "y": "KPWcxdxQmJKpiNOKjiUZ3j0MT9D72wmT448YUGwXYGxeJCSSRvHOlJg6U2HFvpg-"
-};
-
-function importEcKeys() {
- var keys = {};
-
- debug("Importing the private key...");
-
- return crypto.subtle.importKey("jwk", privateKeyJwk, {name: 'ECDH', namedCurve: "P-521"}, false, ["deriveKey"]).then(function(result) {
- keys.private = result;
-
- debug("Importing the public key...");
- return crypto.subtle.importKey("jwk", publicKeyJwk, {name: 'ECDH', namedCurve: "P-521"}, false, []);
- }).then(function(result) {
- keys.public = result;
-
- // Same as keys.private but with deriveBits instead of deriveKey.
- return crypto.subtle.importKey("jwk", privateKeyJwk, {name: 'ECDH', namedCurve: "P-521"}, false, ["deriveBits"]);
- }).then(function(result) {
- keys.privateNoDeriveKey = result;
-
- // Import a P-384 private key.
- return crypto.subtle.importKey("jwk", privateKey384Jwk, {name: 'ECDH', namedCurve: "P-384"}, false, ["deriveKey"]);
- }).then(function(result) {
- keys.private384 = result;
-
- // Import the private key as ECDSA.
- return crypto.subtle.importKey("jwk", publicKeyJwk, {name: 'ECDSA', namedCurve: "P-521"}, false, ["verify"]);
- }).then(function(result) {
- keys.publicEcdsa = result;
-
- // Import an AES key
- return crypto.subtle.importKey("raw", new Uint8Array(16), "aes-cbc", true, ["encrypt"]);
- }).then(function(result) {
- keys.aes = result;
-
- return keys;
- });
-}
-
-var ecKeys = null;
-
-importEcKeys().then(function(result) {
- ecKeys = result;
-
- debug("\nDeriving an AES key with no length...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'aes-cbc'};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an AES key with bad length...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'aes-cbc', length: 120};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an AES key with unsupported length...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'aes-cbc', length: 192};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(function(failAndFinishJSTest, result) {
- logError(result);
-
- debug("\nDeriving an AES-CBC key with unsupported usage (sign)...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'aes-cbc', length: 128};
- var extractable = true;
- var usages = ['sign']; // Not valid for AES-CBC.
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving using an ECDH key that has deriveBits but NOT deriveKey... usage");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'aes-cbc', length: 128};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.privateNoDeriveKey, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving using public instead of private key...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'aes-cbc', length: 128};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.public, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving using private instead of public key...");
- var algorithm = {name: 'ecdh', public: ecKeys.private};
- var derivedAlgorithm = {name: 'aes-cbc', length: 128};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key larger than the field size of P-521...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1", length: 1024};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a zero-length HMAC key...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1", length: 0};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key larger than field size of P-521, by requesting an HMAC SHA-512 key with no length...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-512"};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key using mismatched curves on public/private keys...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1"};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private384, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key using a public EC key for different algorithm (ECDSA)...");
- var algorithm = {name: 'ecdh', public: ecKeys.publicEcdsa};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1"};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key using an AES key for public key...");
- var algorithm = {name: 'ecdh', public: ecKeys.aes};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1"};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key without specifying the \"public\" parameter...");
- var algorithm = {name: 'ecdh'};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1"};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a key having specified a bogus \"public\" parameter...");
- var algorithm = {name: 'ecdh', public: -1};
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1"};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an ECDH key using ECDH...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'ECDH', namedCurve: "P-256"};
- var extractable = true;
- var usages = ['deriveBits'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an RSA-OAEP key using ECDH...");
- var algorithm = {name: 'ecdh', public: ecKeys.public};
- var derivedAlgorithm = {name: 'RSA-OAEP', hash: "sha-1"};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(algorithm, ecKeys.private, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("");
-}).then(finishJSTest, failAndFinishJSTest);
-
-</script>
-
-</body>
-</html>
« no previous file with comments | « LayoutTests/crypto/ecdh-deriveKey-aes-expected.txt ('k') | LayoutTests/crypto/ecdh-deriveKey-failures-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698