blob: e83c303ce834ff54d47f89499b70cb20a3774c16 [file] [log] [blame]
<!DOCTYPE html>
<html>
<head>
<script src="../../../resources/js-test.js"></script>
<script src="../resources/common.js"></script>
</head>
<body>
<p id="description"></p>
<div id="console"></div>
<script>
description("Tests generateKey() with bad RSASSA-PKCS1-v1_5 parameters.");
jsTestIsAsync = true;
extractable = true;
keyUsages = ['sign', 'verify'];
Promise.resolve(null).then(function() {
debug("\ngenerateKey() with a modulusLength -30...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: -30}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() with modulusLength NaN...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: NaN}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() without modulusLength...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() without publicExponent...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() with publicExponent that is an integer...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: 10}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() with publicExponent that is null...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: null}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() with modulusLength that is 10...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 10, publicExponent: new Uint8Array(0)}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() with publicExponent that is 0 bytes long...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}, modulusLength: 1024, publicExponent: new Uint8Array(0)}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() with invalid hash name...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'NOT-A-HASH'}, modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
debug("\ngenerateKey() without hash name...");
return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array(3)}, extractable , keyUsages);
}).then(failAndFinishJSTest, function(result) {
logError(result);
}).then(finishJSTest, failAndFinishJSTest);
</script>
</body>
</html>