OLD | NEW |
(Empty) | |
| 1 Tests deriveKey() with various bad parameters for PBKDF2 |
| 2 |
| 3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
". |
| 4 |
| 5 |
| 6 Importing the password... |
| 7 |
| 8 Deriving an AES key with no length... |
| 9 error is: TypeError: AesDerivedKeyParams: length: Missing required property |
| 10 |
| 11 Deriving an AES key with bad length... |
| 12 error is: OperationError: AES key length must be 128 or 256 bits |
| 13 |
| 14 Deriving an AES key with unsupported length... |
| 15 error is: OperationError: 192-bit AES keys are not supported |
| 16 |
| 17 Deriving an AES-CBC key with unsupported usage (sign)... |
| 18 error is: SyntaxError: Cannot create a key using the specified key usages. |
| 19 |
| 20 Deriving a zero-length HMAC key... |
| 21 error is: TypeError: HMAC key length must not be zero |
| 22 |
| 23 Deriving an ECDH key... |
| 24 error is: NotSupportedError: ECDH: Unsupported operation: get key length |
| 25 |
| 26 Deriving an RSA-OAEP key... |
| 27 error is: NotSupportedError: RSA-OAEP: Unsupported operation: get key length |
| 28 |
| 29 PASS successfullyParsed is true |
| 30 |
| 31 TEST COMPLETE |
| 32 |
OLD | NEW |