OLD | NEW |
(Empty) | |
| 1 <!DOCTYPE html> |
| 2 <html> |
| 3 <head> |
| 4 <script src="../resources/js-test.js"></script> |
| 5 <script src="resources/common.js"></script> |
| 6 </head> |
| 7 <body> |
| 8 <p id="description"></p> |
| 9 <div id="console"></div> |
| 10 |
| 11 <script> |
| 12 description("Test importing a JWK key for HMAC."); |
| 13 |
| 14 jsTestIsAsync = true; |
| 15 |
| 16 var nonExtractable = false; |
| 17 var extractable = true; |
| 18 |
| 19 var hmacKey = { |
| 20 "kty": "oct", |
| 21 "alg": "HS256", |
| 22 "use": "sig", |
| 23 "ext": false, |
| 24 "k": "ahjkn-_387fgnsibf23qsvahjkn-_387fgnsibf23qs" |
| 25 }; |
| 26 |
| 27 var hmacKeyAsArrayBuffer = asciiToUint8Array(JSON.stringify(hmacKey)); |
| 28 |
| 29 debug("Importing a key...\n"); |
| 30 crypto.subtle.importKey("jwk", hmacKeyAsArrayBuffer, {name: "HMAC", hash: {name:
"SHA-256"}}, nonExtractable, ["sign", "verify"]).then(function(result) { |
| 31 key = result; |
| 32 |
| 33 shouldBe("key.type", "'secret'"); |
| 34 shouldBe("key.extractable", "false"); |
| 35 shouldBe("key.algorithm.name", "'HMAC'"); |
| 36 shouldBe("key.algorithm.length", "256"); |
| 37 shouldBe("key.usages", '["sign", "verify"]'); |
| 38 |
| 39 debug("\nUsing the key to sign message 'foo'..."); |
| 40 return crypto.subtle.sign(key.algorithm, key, asciiToUint8Array('foo')); |
| 41 }).then(function(result) { |
| 42 signature = result; |
| 43 shouldBe("bytesToHexString(new Uint8Array(signature))", "'e03736fe098892b2a2
da77812431f7c014d32e2fd69f3bcff883ac923a8fa2da'"); |
| 44 |
| 45 debug("\nVerifying the signature..."); |
| 46 return crypto.subtle.verify(key.algorithm, key, result, asciiToUint8Array('f
oo')); |
| 47 }).then(function(result) { |
| 48 verificationResult = result; |
| 49 shouldBe("verificationResult", "true"); |
| 50 }).then(finishJSTest, failAndFinishJSTest); |
| 51 </script> |
| 52 |
| 53 </body> |
| 54 </html> |
OLD | NEW |