Index: LayoutTests/crypto/generateKey.html |
diff --git a/LayoutTests/crypto/generateKey.html b/LayoutTests/crypto/generateKey.html |
index 6a14aaaca64f59e856fe82d56baca19259c5f809..ae1949211a71279f1939afe6e530c343d6908873 100644 |
--- a/LayoutTests/crypto/generateKey.html |
+++ b/LayoutTests/crypto/generateKey.html |
@@ -61,6 +61,19 @@ shouldThrow("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength |
shouldThrow("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)"); |
shouldThrow("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)"); |
+// --------------------------------------------------- |
+// RSAES-PKCS1-v1_5 normalization failures (RsaKeyGenParams) |
+// --------------------------------------------------- |
+ |
+// Note: these are the same tests as for RSASSA-PKCS1-v1_5 above. |
+ |
+shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages)"); |
+shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages)"); |
+shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages)"); |
+shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)"); |
+shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)"); |
+shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)"); |
+ |
// Note that fractional numbers are truncated, so this length should be |
// interpreted as 1024. |
crypto.subtle.generateKey({name: 'aes-cbc', length: 1024.9}, extractable, ['decrypt', 'encrypt']).then(function(result) { |