Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(284)

Unified Diff: LayoutTests/crypto/subtle/pbkdf2-deriveKey-failures.html

Issue 957713004: [WebCrypto] Split LayoutTests/crypto/subtle into per-algorithm directories (Closed) Base URL: https://chromium.googlesource.com/chromium/blink.git@master
Patch Set: Updated to latest master Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/crypto/subtle/pbkdf2-deriveKey-failures.html
diff --git a/LayoutTests/crypto/subtle/pbkdf2-deriveKey-failures.html b/LayoutTests/crypto/subtle/pbkdf2-deriveKey-failures.html
deleted file mode 100644
index ad9b8cf0058ea77e59b114d66b61ebf0c1d830e9..0000000000000000000000000000000000000000
--- a/LayoutTests/crypto/subtle/pbkdf2-deriveKey-failures.html
+++ /dev/null
@@ -1,123 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
-<script src="../../resources/js-test.js"></script>
-<script src="resources/common.js"></script>
-</head>
-<body>
-<p id="description"></p>
-<div id="console"></div>
-
-<script>
-description("Tests deriveKey() with various bad parameters for PBKDF2");
-
-jsTestIsAsync = true;
-
-var testCase = {
- password: "password",
- salt: "salt",
- c: 1,
- dkLen: 20,
- hash: "SHA-1",
- derived_key_full_length: "0c60c80f961f0e71f3a9b524af6012062fe037a6"
- };
-
-function importPbkdf2Key() {
- var key = null;
-
- debug("Importing the password...");
-
- var algorithm = {name: 'PBKDF2'};
-
- var password = asciiToUint8Array(testCase.password);
- var usages = ['deriveBits', 'deriveKey'];
- var extractable = false;
-
- // (1) Import the password
- return crypto.subtle.importKey('raw', password, algorithm, extractable, usages).then(function(result) {
- key = result;
- return key;
- });
-}
-
-var pbkdf2Key = null;
-
-var params = {
- name: 'PBKDF2',
- salt: asciiToUint8Array(testCase.salt),
- iterations: testCase.c,
- hash: {name: testCase.hash}
-};
-importPbkdf2Key().then(function(result) {
- pbkdf2Key = result;
-
- debug("\nDeriving an AES key with no length...");
- var derivedAlgorithm = {name: 'aes-cbc'};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an AES key with bad length...");
- var derivedAlgorithm = {name: 'aes-cbc', length: 120};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an AES key with unsupported length...");
- var derivedAlgorithm = {name: 'aes-cbc', length: 192};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an AES-CBC key with unsupported usage (sign)...");
- var derivedAlgorithm = {name: 'aes-cbc', length: 128};
- var extractable = true;
- var usages = ['sign']; // Not valid for AES-CBC.
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving a zero-length HMAC key...");
- var derivedAlgorithm = {name: 'HMAC', hash: "sha-1", length: 0};
- var extractable = true;
- var usages = ['sign'];
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an ECDH key...");
- var derivedAlgorithm = {name: 'ECDH', namedCurve: "P-256"};
- var extractable = true;
- var usages = ['deriveBits'];
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("\nDeriving an RSA-OAEP key...");
- var derivedAlgorithm = {name: 'RSA-OAEP', hash: "sha-1"};
- var extractable = true;
- var usages = ['encrypt'];
-
- return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
-}).then(failAndFinishJSTest, function(result) {
- logError(result);
-
- debug("");
-}).then(finishJSTest, failAndFinishJSTest);
-
-</script>
-
-</body>
-</html>

Powered by Google App Engine
This is Rietveld 408576698