chromium/third_party/blink/web_tests/crypto/subtle/pbkdf2/deriveKey-failures.html

<!DOCTYPE html>
<html>
<head>
<script src="../../../resources/js-test.js"></script>
<script src="../resources/common.js"></script>
</head>
<body>
<p id="description"></p>
<div id="console"></div>

<script>
description("Tests deriveKey() with various bad parameters for PBKDF2");

jsTestIsAsync = true;

var testCase = {
    password: "password",
    salt: "salt",
    c: 1,
    dkLen: 20,
    hash: "SHA-1",
    derived_key_full_length: "0c60c80f961f0e71f3a9b524af6012062fe037a6"
 };

function importPbkdf2Key() {
    var key = null;

    debug("Importing the password...");

    var algorithm = {name: 'PBKDF2'};

    var password = asciiToUint8Array(testCase.password);
    var usages = ['deriveBits', 'deriveKey'];
    var extractable = false;

    // (1) Import the password
    return crypto.subtle.importKey('raw', password, algorithm, extractable, usages).then(function(result) {
        key = result;
        return key;
    });
}

var pbkdf2Key = null;

var params = {
    name: 'PBKDF2',
    salt: asciiToUint8Array(testCase.salt),
    iterations: testCase.c,
    hash: {name: testCase.hash}
};
importPbkdf2Key().then(function(result) {
    pbkdf2Key = result;

    debug("\nDeriving an AES key with no length...");
    var derivedAlgorithm = {name: 'aes-cbc'};
    var extractable = true;
    var usages = ['encrypt'];

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("\nDeriving an AES key with bad length...");
    var derivedAlgorithm = {name: 'aes-cbc', length: 120};
    var extractable = true;
    var usages = ['encrypt'];

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("\nDeriving an AES key with unsupported length...");
    var derivedAlgorithm = {name: 'aes-cbc', length: 192};
    var extractable = true;
    var usages = ['encrypt'];

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("\nDeriving an AES-CBC key with unsupported usage (sign)...");
    var derivedAlgorithm = {name: 'aes-cbc', length: 128};
    var extractable = true;
    var usages = ['sign'];  // Not valid for AES-CBC.

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("\nDeriving a zero-length HMAC key...");
    var derivedAlgorithm = {name: 'HMAC', hash: "sha-1", length: 0};
    var extractable = true;
    var usages = ['sign'];

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("\nDeriving an ECDH key...");
    var derivedAlgorithm = {name: 'ECDH', namedCurve: "P-256"};
    var extractable = true;
    var usages = ['deriveBits'];

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("\nDeriving an RSA-OAEP key...");
    var derivedAlgorithm = {name: 'RSA-OAEP', hash: "sha-1"};
    var extractable = true;
    var usages = ['encrypt'];

    return crypto.subtle.deriveKey(params, pbkdf2Key, derivedAlgorithm, extractable, usages);
}).then(failAndFinishJSTest, function(result) {
    logError(result);

    debug("");
}).then(finishJSTest, failAndFinishJSTest);

</script>

</body>
</html>