| Index: LayoutTests/crypto/generateKey.html
|
| diff --git a/LayoutTests/crypto/generateKey.html b/LayoutTests/crypto/generateKey.html
|
| index 6a14aaaca64f59e856fe82d56baca19259c5f809..ae1949211a71279f1939afe6e530c343d6908873 100644
|
| --- a/LayoutTests/crypto/generateKey.html
|
| +++ b/LayoutTests/crypto/generateKey.html
|
| @@ -61,6 +61,19 @@ shouldThrow("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength
|
| shouldThrow("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
|
| shouldThrow("crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
|
|
|
| +// ---------------------------------------------------
|
| +// RSAES-PKCS1-v1_5 normalization failures (RsaKeyGenParams)
|
| +// ---------------------------------------------------
|
| +
|
| +// Note: these are the same tests as for RSASSA-PKCS1-v1_5 above.
|
| +
|
| +shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: -30}, extractable , keyUsages)");
|
| +shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: NaN}, extractable , keyUsages)");
|
| +shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , keyUsages)");
|
| +shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)");
|
| +shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)");
|
| +shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)");
|
| +
|
| // Note that fractional numbers are truncated, so this length should be
|
| // interpreted as 1024.
|
| crypto.subtle.generateKey({name: 'aes-cbc', length: 1024.9}, extractable, ['decrypt', 'encrypt']).then(function(result) {
|
|
|