Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(199)

Side by Side Diff: LayoutTests/crypto/resources/common.js

Issue 179353002: [webcrypto] Add the KeyAlgorithm interface. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: rebase yet again (another conflict) Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « LayoutTests/crypto/importKey-expected.txt ('k') | LayoutTests/crypto/sign-verify.html » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // The following key pair is comprised of the SPKI (public key) and PKCS#8
2 // (private key) representations of the key pair provided in Example 1 of the
3 // NIST test vectors at ftp://ftp.rsa.com/pub/rsalabs/tmp/pkcs1v15sign-vectors.t xt
4 var kPublicKeySpkiDerHex = "30819f300d06092a864886f70d010101050003818d0030818902 818100a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ff edb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671 ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f2 0d0ce8cffb2249bd9a21370203010001";
5 var kPrivateKeyPkcs8DerHex = "30820275020100300d06092a864886f70d0101010500048202 5f3082025b02010002818100a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e6 1f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508 096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e138 6b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137020301000102818033a5042a90b27d4f5451" +
6 "ca9bbbd0b44771a101af884340aef9885f2a4bbe92e894a724 ac3c568c8f97853ad07c0266c8c6a3ca0929f1e8f11231884429fc4d9ae55fee896a10ce707c3ed7 e734e44727a39574501a532683109c2abacaba283c31b4bd2f53c3ee37e352cee34f9e503bd80c06 22ad79c6dcee883547c6a3b325024100e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e 86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443 024100b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f1 9d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd024028fa13938655be1f8a159c baca5a72ea190c30089e19cd274a556f36c4f6e19f554b34c077790427bbdd8dd3ede2448328f385 d81b30e8e43b2fffa02786197902401a8b38f398fa712049898d7fb79ee0a77668791299cdfa09ef c0e507acb21ed74301ef5bfd48be455eaeb6e1678255827580a8e4e8e14151d1510a82a3f2e72902 4027156aba4126d24a81f3a528cbfb27f56886f840a9f6e86e17a44b94fe9319584b8e22fdde1e5a 2e3bd8aa5ba8d8584194eb2190acf832b847f13a3d24a79f4d";
7
1 function importTestKeys() 8 function importTestKeys()
2 { 9 {
3 var keyFormat = "raw";
4 var data = asciiToUint8Array("16 bytes of key!"); 10 var data = asciiToUint8Array("16 bytes of key!");
5 var extractable = true; 11 var extractable = true;
6 var keyUsages = ['wrapKey', 'unwrapKey', 'encrypt', 'decrypt', 'sign', 'veri fy']; 12 var keyUsages = ['wrapKey', 'unwrapKey', 'encrypt', 'decrypt', 'sign', 'veri fy'];
7 13
8 var hmacPromise = crypto.subtle.importKey(keyFormat, data, {name: 'hmac', ha sh: {name: 'sha-1'}}, extractable, keyUsages); 14 var hmacPromise = crypto.subtle.importKey('raw', data, {name: 'hmac', hash: {name: 'sha-1'}}, extractable, keyUsages);
9 var aesCbcPromise = crypto.subtle.importKey(keyFormat, data, {name: 'AES-CBC '}, extractable, keyUsages); 15 var aesCbcPromise = crypto.subtle.importKey('raw', data, {name: 'AES-CBC'}, extractable, keyUsages);
10 var aesCbcJustDecrypt = crypto.subtle.importKey(keyFormat, data, {name: 'AES -CBC'}, false, ['decrypt']); 16 var aesCbcJustDecrypt = crypto.subtle.importKey('raw', data, {name: 'AES-CBC '}, false, ['decrypt']);
11 // FIXME: use AES-CTR key type once it's implemented 17 // FIXME: use AES-CTR key type once it's implemented
12 var aesCtrPromise = crypto.subtle.importKey(keyFormat, data, {name: 'AES-CBC '}, extractable, keyUsages); 18 var aesCtrPromise = crypto.subtle.importKey('raw', data, {name: 'AES-CBC'}, extractable, keyUsages);
13 var aesGcmPromise = crypto.subtle.importKey(keyFormat, data, {name: 'AES-GCM '}, extractable, keyUsages); 19 var aesGcmPromise = crypto.subtle.importKey('raw', data, {name: 'AES-GCM'}, extractable, keyUsages);
20 var rsaSsaSha1PublicPromise = crypto.subtle.importKey('spki', hexStringToUin t8Array(kPublicKeySpkiDerHex), {name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'} }, extractable, keyUsages);
21 var rsaSsaSha1PrivatePromise = crypto.subtle.importKey('pkcs8', hexStringToU int8Array(kPrivateKeyPkcs8DerHex), {name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha -1'}}, extractable, keyUsages);
14 22
15 return Promise.all([hmacPromise, aesCbcPromise, aesCbcJustDecrypt, aesCtrPro mise, aesGcmPromise]).then(function(results) { 23 return Promise.all([hmacPromise, aesCbcPromise, aesCbcJustDecrypt, aesCtrPro mise, aesGcmPromise, rsaSsaSha1PublicPromise, rsaSsaSha1PrivatePromise]).then(fu nction(results) {
16 return { 24 return {
17 hmacSha1: results[0], 25 hmacSha1: results[0],
18 aesCbc: results[1], 26 aesCbc: results[1],
19 aesCbcJustDecrypt: results[2], 27 aesCbcJustDecrypt: results[2],
20 aesCtr: results[3], 28 aesCtr: results[3],
21 aesGcm: results[4], 29 aesGcm: results[4],
30 rsaSsaSha1Public: results[5],
31 rsaSsaSha1Private: results[6],
22 }; 32 };
23 }); 33 });
24 } 34 }
25 35
26 // Verifies that the given "bytes" holds the same value as "expectedHexString". 36 // Verifies that the given "bytes" holds the same value as "expectedHexString".
27 // "bytes" can be anything recognized by "bytesToHexString()". 37 // "bytes" can be anything recognized by "bytesToHexString()".
28 function bytesShouldMatchHexString(testDescription, expectedHexString, bytes) 38 function bytesShouldMatchHexString(testDescription, expectedHexString, bytes)
29 { 39 {
30 expectedHexString = "[" + expectedHexString.toLowerCase() + "]"; 40 expectedHexString = "[" + expectedHexString.toLowerCase() + "]";
31 var actualHexString = "[" + bytesToHexString(bytes) + "]"; 41 var actualHexString = "[" + bytesToHexString(bytes) + "]";
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after
141 debug("PASS: '" + code + "' accepted with " + result); 151 debug("PASS: '" + code + "' accepted with " + result);
142 } 152 }
143 153
144 function rejectCallback(result) 154 function rejectCallback(result)
145 { 155 {
146 debug("FAIL: '" + code + "' rejected with " + result); 156 debug("FAIL: '" + code + "' rejected with " + result);
147 } 157 }
148 158
149 addTask(promise.then(acceptCallback, rejectCallback)); 159 addTask(promise.then(acceptCallback, rejectCallback));
150 } 160 }
OLDNEW
« no previous file with comments | « LayoutTests/crypto/importKey-expected.txt ('k') | LayoutTests/crypto/sign-verify.html » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698