| Index: LayoutTests/crypto/subtle/pbkdf2-deriveBits.html
|
| diff --git a/LayoutTests/crypto/subtle/pbkdf2-deriveBits.html b/LayoutTests/crypto/subtle/pbkdf2-deriveBits.html
|
| deleted file mode 100644
|
| index cf54ad4676cba22425d005c7c062664bb90ceba3..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/crypto/subtle/pbkdf2-deriveBits.html
|
| +++ /dev/null
|
| @@ -1,134 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| -<script src="../../resources/js-test.js"></script>
|
| -<script src="resources/common.js"></script>
|
| -</head>
|
| -<body>
|
| -<p id="description"></p>
|
| -<div id="console"></div>
|
| -
|
| -<script>
|
| -description("Tests importKey/deriveBits for PBKDF2");
|
| -
|
| -jsTestIsAsync = true;
|
| -
|
| -// -------------------------------------------------
|
| -// Successful password import and bits derivation
|
| -// -------------------------------------------------
|
| -
|
| -var kPbkdf2SuccessVectors = [
|
| - // Non-ascii password
|
| - {
|
| - password: [200, 201, 202, 203, 204, 205, 206, 207],
|
| - salt: "salt",
|
| - c: 20,
|
| - dkLen: 16,
|
| - hash: "SHA-1",
|
| - derived_key: "a7950c143ec64e2b8d4bb1db8677188b"
|
| - },
|
| -
|
| - // Empty salt
|
| - {
|
| - password: "pass\0word",
|
| - salt: "",
|
| - c: 20,
|
| - dkLen: 16,
|
| - hash: "SHA-1",
|
| - derived_key: "7deaf8b4a801011c1cd27f36e3bfc962"
|
| - },
|
| -
|
| - // SHA-256
|
| - {
|
| - password: "password",
|
| - salt: "salt",
|
| - c: 20,
|
| - dkLen: 16,
|
| - hash: "SHA-256",
|
| - derived_key: "83eb100b6a3a975f0fe3ffcdc2419852"
|
| - },
|
| -
|
| - // SHA-512
|
| - {
|
| - password: "password",
|
| - salt: "salt",
|
| - c: 20,
|
| - dkLen: 16,
|
| - hash: "SHA-512",
|
| - derived_key: "e4dfce3830983830c50c351a0b0f79e1"
|
| - },
|
| -
|
| - // Empty password.
|
| - {
|
| - password: [],
|
| - salt: "salt",
|
| - c: 20,
|
| - dkLen: 16,
|
| - hash: "SHA-384",
|
| - derived_key: "750261780a187897a9978371599db5d1"
|
| - },
|
| -
|
| - // Derive zero bytes.
|
| - {
|
| - password: "password",
|
| - salt: "salt",
|
| - c: 4096,
|
| - dkLen: 0,
|
| - hash: "SHA-512",
|
| - derived_key: ""
|
| - },
|
| -];
|
| -
|
| -function runPbkdf2SuccessTestCase(testCase)
|
| -{
|
| - var algorithm = {name: 'PBKDF2'};
|
| -
|
| - var key = null;
|
| - var password = null;
|
| - if (typeof testCase.password === 'string')
|
| - password = asciiToUint8Array(testCase.password);
|
| - else if (Array.isArray(testCase.password))
|
| - password = new Uint8Array(testCase.password);
|
| -
|
| - var usages = ['deriveBits', 'deriveKey'];
|
| - var extractable = false;
|
| -
|
| - var params = {
|
| - name: 'PBKDF2',
|
| - salt: asciiToUint8Array(testCase.salt),
|
| - iterations: testCase.c,
|
| - hash: {name: testCase.hash}
|
| - };
|
| - // (1) Import the password
|
| - return crypto.subtle.importKey('raw', password, algorithm, extractable, usages).then(function(result) {
|
| - key = result;
|
| - // shouldBe() can only resolve variables in global context.
|
| - tmpKey = key;
|
| - shouldEvaluateAs("tmpKey.type", "secret");
|
| - shouldEvaluateAs("tmpKey.extractable", false);
|
| - shouldEvaluateAs("tmpKey.algorithm.name", "PBKDF2");
|
| - shouldEvaluateAs("tmpKey.usages.join(',')", "deriveKey,deriveBits");
|
| -
|
| - // (2) Derive bits
|
| - return crypto.subtle.deriveBits(params, key, testCase.dkLen*8);
|
| - }).then(function(result) {
|
| - bytesShouldMatchHexString("deriveBits", testCase.derived_key, result);
|
| - return crypto.subtle.deriveBits(params, key, 0);
|
| - }).then(function(result) {
|
| - derivedBits = result;
|
| - shouldBe("derivedBits.byteLength", "0");
|
| - });
|
| -}
|
| -
|
| -var lastPromise = Promise.resolve(null);
|
| -
|
| -kPbkdf2SuccessVectors.forEach(function(test) {
|
| - lastPromise = lastPromise.then(runPbkdf2SuccessTestCase.bind(null, test));
|
| -});
|
| -
|
| -lastPromise.then(finishJSTest, failAndFinishJSTest);
|
| -
|
| -</script>
|
| -
|
| -</body>
|
| -</html>
|
|
|