Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(418)

Unified Diff: LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html

Issue 859023002: [WebCrypto] Renamed rsa-ssa-* tests to rsassa-pkcs1-v1_5-* (Closed) Base URL: https://chromium.googlesource.com/chromium/blink.git@master
Patch Set: Updated to latest master Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures-expected.txt » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html
diff --git a/LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html b/LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html
deleted file mode 100644
index 2d077b5897820ea2f05ac00361688f20e9a824d8..0000000000000000000000000000000000000000
--- a/LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html
+++ /dev/null
@@ -1,73 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="../../resources/js-test.js"></script>
-<script src="resources/common.js"></script>
-</head>
-<body>
-<p id="description"></p>
-<div id="console"></div>
-
-<script>
-description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters.");
-jsTestIsAsync = true;
-
-extractable = true;
-keyUsages = ['sign', 'verify'];
-
-Promise.resolve(null).then(function() {
- debug("\ngenerateKey() with a modulusLength -30...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() with modulusLength NaN...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() without modulusLength...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() without publicExponent...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() with publicExponent that is an integer...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() with publicExponent that is null...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() with modulusLength that is 10...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() with publicExponent that is 0 bytes long...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() with invalid hash name...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\ngenerateKey() without hash name...");
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-}).then(finishJSTest, failAndFinishJSTest);
-
-</script>
-
-</body>
-</html>
« no previous file with comments | « no previous file | LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698