| Index: LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html
|
| diff --git a/LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html b/LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html
|
| deleted file mode 100644
|
| index 2d077b5897820ea2f05ac00361688f20e9a824d8..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/crypto/subtle/rsa-ssa-generateKey-failures.html
|
| +++ /dev/null
|
| @@ -1,73 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| -<script src="../../resources/js-test.js"></script>
|
| -<script src="resources/common.js"></script>
|
| -</head>
|
| -<body>
|
| -<p id="description"></p>
|
| -<div id="console"></div>
|
| -
|
| -<script>
|
| -description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters.");
|
| -jsTestIsAsync = true;
|
| -
|
| -extractable = true;
|
| -keyUsages = ['sign', 'verify'];
|
| -
|
| -Promise.resolve(null).then(function() {
|
| - debug("\ngenerateKey() with a modulusLength -30...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() with modulusLength NaN...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() without modulusLength...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() without publicExponent...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() with publicExponent that is an integer...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() with publicExponent that is null...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() with modulusLength that is 10...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() with publicExponent that is 0 bytes long...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() with invalid hash name...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - debug("\ngenerateKey() without hash name...");
|
| - return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -}).then(finishJSTest, failAndFinishJSTest);
|
| -
|
| -</script>
|
| -
|
| -</body>
|
| -</html>
|
|
|