Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(227)

Unified Diff: LayoutTests/crypto/jwk-import-use-values.html

Issue 298023002: [webcrypto] Import WebKit's webcrypto tests. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: remove FIXME for unrecognized jwk usages (supported now) Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/crypto/jwk-import-use-values.html
diff --git a/LayoutTests/crypto/jwk-import-use-values.html b/LayoutTests/crypto/jwk-import-use-values.html
new file mode 100644
index 0000000000000000000000000000000000000000..aea210121819e18106744caa3ae0988baf8891b0
--- /dev/null
+++ b/LayoutTests/crypto/jwk-import-use-values.html
@@ -0,0 +1,123 @@
+<!DOCTYPE html>
+<html>
+<head>
+<script src="../resources/js-test.js"></script>
+<script src="resources/common.js"></script>
+</head>
+<body>
+<p id="description"></p>
+<div id="console"></div>
+
+<script>
+description("Test importing keys with various uses from JWK.");
+
+jsTestIsAsync = true;
+
+var extractable = true;
+
+var aesKeyAsJSON = {
+ "alg": "A192CBC",
+ "ext": true,
+ "kty": "oct",
+ "k": "jnOw99oOZFLIEPMrgJB55WL46tJSLGt7"
+};
+
+var hmacKeyAsJSON = {
+ "alg": "HS256",
+ "ext": true,
+ "kty": "oct",
+ "k": "ahjkn-_387fgnsibf23qsvahjkn-_387fgnsibf23qs"
+};
+
+function testWithAESCBC(expectedUsages, jwkUsages, importUsages)
+{
+ if (jwkUsages.key_ops) {
+ aesKeyAsJSON.key_ops = jwkUsages.key_ops;
+ delete aesKeyAsJSON.use;
+ } else {
+ delete aesKeyAsJSON.key_ops;
+ aesKeyAsJSON.use = jwkUsages.use;
+ }
+
+ return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(aesKeyAsJSON)), {name: "AES-CBC"}, extractable, importUsages).then(function(result) {
+ key = result;
+ debug(JSON.stringify(jwkUsages) + ":");
+ shouldBe("key.usages", JSON.stringify(expectedUsages));
+ debug("");
+ }, function(result) {
+ debug(JSON.stringify(jwkUsages) + ":");
+ debug("Failed importing with " + importUsages + ": " + result);
+ });
+}
+
+function testWithHMAC(expectedUsages, jwkUsages, importUsages)
+{
+ if (jwkUsages.key_ops) {
+ hmacKeyAsJSON.key_ops = jwkUsages.key_ops;
+ delete hmacKeyAsJSON.use;
+ } else {
+ delete hmacKeyAsJSON.key_ops;
+ hmacKeyAsJSON.use = jwkUsages.use;
+ }
+
+ return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(hmacKeyAsJSON)), {name: 'hmac', hash: {name: 'sha-256'}}, extractable, importUsages).then(function(result) {
+ key = result;
+ debug(JSON.stringify(jwkUsages) + ":");
+ shouldBe("key.usages", JSON.stringify(expectedUsages));
+ debug("");
+ }, function(result) {
+ debug(JSON.stringify(jwkUsages) + ":");
+ debug("Failed importing with " + importUsages + ": " + result);
+ });
+}
+
+debug("");
+
+
+Promise.all([
+ // Duplicates are allowed. See http://crbug.com/378074.
+ testWithAESCBC(["encrypt"], {key_ops: ["encrypt", "encrypt"]}, ["encrypt"]),
+
+ testWithAESCBC(["encrypt"], {key_ops: ["encrypt"]}, ["encrypt"]),
+ testWithAESCBC(null, {key_ops: ["encrypt"]}, ["decrypt"]),
+
+ testWithAESCBC(["decrypt"], {key_ops: ["decrypt"]}, ["decrypt"]),
+ testWithAESCBC(null, {key_ops: ["decrypt"]}, ["encrypt"]),
+
+ testWithAESCBC(["encrypt", "decrypt"], {key_ops: ["encrypt", "decrypt"]}, ["encrypt", "decrypt"]),
+ testWithAESCBC(["encrypt"], {key_ops: ["encrypt", "decrypt"]}, ["encrypt"]),
+ testWithAESCBC(null, {key_ops: ["encrypt", "decrypt"]}, ["unwrapKey"]),
+
+ testWithAESCBC(["wrapKey"], {key_ops: ["wrapKey"]}, ["wrapKey"]),
+ testWithAESCBC(null, {key_ops: ["wrapKey"]}, ["unwrapKey"]),
+
+ testWithAESCBC(["unwrapKey"], {key_ops: ["unwrapKey"]}, ["unwrapKey"]),
+ testWithAESCBC(["wrapKey", "unwrapKey"], {key_ops: ["wrapKey", "unwrapKey"]}, ["unwrapKey", "wrapKey"]),
+ testWithAESCBC(["encrypt", "decrypt", "wrapKey"], {key_ops: ["encrypt", "decrypt", "wrapKey"]}, ["decrypt", "encrypt", "wrapKey"]),
+
+ testWithAESCBC(["encrypt", "decrypt", "wrapKey", "unwrapKey"], {use: "enc"}, ["decrypt", "encrypt", "unwrapKey", "wrapKey"]),
+ testWithAESCBC(["encrypt", "decrypt", "unwrapKey"], {use: "enc"}, ["decrypt", "encrypt", "unwrapKey"]),
+ testWithAESCBC(["encrypt", "decrypt", "unwrapKey"], {use: "enc"}, ["decrypt", "encrypt", "unwrapKey"]),
+
+ testWithHMAC(["sign"], {key_ops: ["sign"]}, ["sign"]),
+ testWithHMAC(null, {key_ops: ["sign"]}, ["verify"]),
+
+ testWithHMAC(["verify"], {key_ops: ["verify"]}, ["verify"]),
+ testWithHMAC(null, {key_ops: ["verify"]}, ["sign"]),
+
+ testWithHMAC(["sign", "verify"], {use: "sig"}, ["sign", "verify"]),
+ testWithHMAC(["sign"], {use: "sig"}, ["sign"]),
+
+ // Unknown key_ops strings are ignored.
+ testWithAESCBC(["decrypt"], {key_ops: ["'encrypt'", "decrypt"]}, ["decrypt"]),
+ testWithAESCBC(["decrypt"], {key_ops: ["encrypt ", "foo", "decrypt"]}, ["decrypt"]),
+ testWithAESCBC(["decrypt"], {key_ops: ["Encrypt", "decrypt"]}, ["decrypt"]),
+ testWithAESCBC(null, {key_ops: ["'encrypt'", "decrypt"]}, ["encrypt"]),
+ testWithAESCBC(null, {key_ops: ["encrypt "]}, ["encrypt"]),
+ testWithAESCBC(null, {key_ops: ["Encrypt"]}, ["encrypt"]),
+
+]).then(finishJSTest, failAndFinishJSTest);
+</script>
+
+</body>
+</html>
« no previous file with comments | « LayoutTests/crypto/jwk-export-use-values-expected.txt ('k') | LayoutTests/crypto/jwk-import-use-values-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698