Index: LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-generateKey-failures.html |
diff --git a/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-generateKey-failures.html b/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-generateKey-failures.html |
deleted file mode 100644 |
index 2d077b5897820ea2f05ac00361688f20e9a824d8..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-generateKey-failures.html |
+++ /dev/null |
@@ -1,73 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
-<head> |
-<script src="../../resources/js-test.js"></script> |
-<script src="resources/common.js"></script> |
-</head> |
-<body> |
-<p id="description"></p> |
-<div id="console"></div> |
- |
-<script> |
-description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters."); |
-jsTestIsAsync = true; |
- |
-extractable = true; |
-keyUsages = ['sign', 'verify']; |
- |
-Promise.resolve(null).then(function() { |
- debug("\ngenerateKey() with a modulusLength -30..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() with modulusLength NaN..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() without modulusLength..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() without publicExponent..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() with publicExponent that is an integer..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() with publicExponent that is null..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() with modulusLength that is 10..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() with publicExponent that is 0 bytes long..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() with invalid hash name..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("\ngenerateKey() without hash name..."); |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
-}).then(finishJSTest, failAndFinishJSTest); |
- |
-</script> |
- |
-</body> |
-</html> |