Index: LayoutTests/crypto/generateKey.html |
diff --git a/LayoutTests/crypto/generateKey.html b/LayoutTests/crypto/generateKey.html |
index ae1949211a71279f1939afe6e530c343d6908873..33085a760cf5693ff71740a674916dff9aebcf31 100644 |
--- a/LayoutTests/crypto/generateKey.html |
+++ b/LayoutTests/crypto/generateKey.html |
@@ -11,8 +11,6 @@ |
<script> |
description("Tests cypto.subtle.generateKey."); |
-jsTestIsAsync = true; |
- |
extractable = true; |
keyUsages = ['encrypt', 'decrypt']; |
@@ -73,61 +71,6 @@ shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5'}, extractable , |
shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10}, extractable , keyUsages)"); |
shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: 10}, extractable , keyUsages)"); |
shouldThrow("crypto.subtle.generateKey({name: 'RSAES-PKCS1-v1_5', modulusLength: 10, publicExponent: null}, extractable , keyUsages)"); |
- |
-// Note that fractional numbers are truncated, so this length should be |
-// interpreted as 1024. |
-crypto.subtle.generateKey({name: 'aes-cbc', length: 1024.9}, extractable, ['decrypt', 'encrypt']).then(function(result) { |
- key = result; |
- shouldBe("key.type", "'private'") |
- shouldBe("key.extractable", "true") |
- shouldBe("key.algorithm.name", "'AES-CBC'") |
- shouldBe("key.algorithm.length", "1024") |
- shouldBe("key.usages.join(',')", "'encrypt,decrypt'") |
- |
- return crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256' }}, false, ['sign']); |
-}).then(function(result) { |
- key = result; |
- shouldBe("key.type", "'private'") |
- shouldBe("key.extractable", "false") |
- shouldBe("key.algorithm.name", "'HMAC'") |
- shouldBe("key.algorithm.hash.name", "'SHA-256'") |
- shouldBe("key.algorithm.length", "null") |
- shouldBe("key.usages.join(',')", "'sign'") |
- |
- return crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-256' }, length:48 }, false, ['sign']); |
-}).then(function(result) { |
- key = result; |
- shouldBe("key.type", "'private'") |
- shouldBe("key.extractable", "false") |
- shouldBe("key.algorithm.name", "'HMAC'") |
- shouldBe("key.algorithm.hash.name", "'SHA-256'") |
- shouldBe("key.algorithm.length", "48") |
- shouldBe("key.usages.join(',')", "'sign'") |
- |
- return crypto.subtle.generateKey({name: 'RSASSA-PKCS1-v1_5', modulusLength: 10, publicExponent: new Uint8Array([0])}, false, ['sign']); |
-}).then(function(result) { |
- keyPair = result; |
- |
- shouldBeDefined("keyPair.publicKey"); |
- shouldBeDefined("keyPair.privateKey"); |
- |
- shouldBe("keyPair.publicKey.type", "'public'"); |
- shouldBe("keyPair.publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); |
- |
- shouldBe("keyPair.privateKey.type", "'private'"); |
- shouldBe("keyPair.privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); |
- |
- // KeyPair should return the same Key wrapper |
- keyPair.publicKey.foo = "bar"; |
- shouldBe("keyPair.publicKey.foo", "'bar'"); |
- if (window.gc) { |
- window.gc(); |
- window.gc(); |
- } |
- shouldBe("keyPair.publicKey.foo", "'bar'"); |
- |
-}).then(finishJSTest, failAndFinishJSTest); |
- |
</script> |
<script src="../fast/js/resources/js-test-post.js"></script> |