Index: LayoutTests/crypto/hmac-export-key.html |
diff --git a/LayoutTests/crypto/hmac-export-key.html b/LayoutTests/crypto/hmac-export-key.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..7b7097d2a9a1cef6d362e9cda38633aaa55fcbdb |
--- /dev/null |
+++ b/LayoutTests/crypto/hmac-export-key.html |
@@ -0,0 +1,91 @@ |
+<!DOCTYPE html> |
+<html> |
+<head> |
+<script src="../resources/js-test.js"></script> |
+<script src="resources/common.js"></script> |
+</head> |
+<body> |
+<p id="description"></p> |
+<div id="console"></div> |
+ |
+<script> |
+description("Test exporting an AES key."); |
+ |
+jsTestIsAsync = true; |
+ |
+var extractable = true; |
+var nonExtractable = false; |
+ |
+var jwkKey = { |
+ "kty": "oct", |
+ "k": "ahjkn-_387fgnsibf23qsvahjkn-_387fgnsibf23qs" |
+}; |
+ |
+var jwkKeyAsArrayBuffer = asciiToUint8Array(JSON.stringify(jwkKey)); |
+ |
+debug("Importing a JWK key..."); |
+crypto.subtle.importKey("jwk", jwkKeyAsArrayBuffer, { name: "HMAC", hash: {name: "SHA-256"} }, extractable, ["sign", "verify"]).then(function(result) { |
+ key = result; |
+ |
+ return crypto.subtle.exportKey(null, key); |
+}).then(failAndFinishJSTest, function(result) { |
+ logError(result); |
+ return crypto.subtle.exportKey(undefined, key); |
+}).then(failAndFinishJSTest, function(result) { |
+ logError(result); |
+ return crypto.subtle.exportKey({}, key); |
+}).then(failAndFinishJSTest, function(result) { |
+ logError(result); |
+ return crypto.subtle.exportKey("", key); |
+}).then(failAndFinishJSTest, function(result) { |
+ logError(result); |
+ return crypto.subtle.exportKey("foobar", key); |
+}).then(failAndFinishJSTest, function(result) { |
+ logError(result); |
+ |
+ debug("Exporting the key as raw data..."); |
+ return crypto.subtle.exportKey("raw", key); |
+}, failAndFinishJSTest).then(function(result) { |
+ exportedData = result; |
+ shouldBe("bytesToHexString(new Uint8Array(exportedData))", "'6a18e49feff7f3b7e09ec89b7f6deab2f6a18e49feff7f3b7e09ec89b7f6deab'"); |
+ |
+ debug("Exporting the key as JWK..."); |
+ return crypto.subtle.exportKey("jwk", key); |
+}).then(function(result) { |
+ exportedJWK = JSON.parse(bytesToASCIIString(result)); |
+ shouldBe("exportedJWK.kty", "'oct'"); |
+ shouldBe("exportedJWK.k", "'ahjkn-_387fgnsibf23qsvahjkn-_387fgnsibf23qs'"); |
+ shouldBe("exportedJWK.alg", "'HS256'"); |
+ shouldBe("exportedJWK.ext", "true"); |
+ shouldBe("exportedJWK.use", "undefined"); |
+ shouldBe("exportedJWK.key_ops", "['sign', 'verify']"); |
+ |
+ debug("\nImporting a key that's not extractable..."); |
+ return crypto.subtle.importKey("jwk", jwkKeyAsArrayBuffer, { name: "HMAC", hash: {name: "SHA-256"} }, nonExtractable, ["sign", "verify"]); |
+}, failAndFinishJSTest).then(function(result) { |
+ key = result; |
+ |
+ debug("\nTrying to export as raw..."); |
+ return crypto.subtle.exportKey("raw", key); |
+}).then(function(result) { |
+ testFailed("Promise wasn't rejected"); |
+ finishJSTest(); |
+}, function(result) { |
+ logError(result); |
+ testPassed("Rejected, as expected"); |
+ |
+ debug("Trying to export as jwk..."); |
+ return crypto.subtle.exportKey("jwk", key); |
+}).then(function(result) { |
+ testFailed("Promise wasn't rejected"); |
+ finishJSTest(); |
+}, function(result) { |
+ logError(result); |
+ testPassed("Rejected, as expected"); |
+ |
+ finishJSTest(); |
+}); |
+</script> |
+ |
+</body> |
+</html> |