OLD | NEW |
1 <!DOCTYPE html> | 1 <!DOCTYPE html> |
2 <html> | 2 <html> |
3 <head> | 3 <head> |
4 <script src="../resources/js-test.js"></script> | 4 <script src="../resources/js-test.js"></script> |
5 <script src="resources/common.js"></script> | 5 <script src="resources/common.js"></script> |
6 </head> | 6 </head> |
7 <body> | 7 <body> |
8 <p id="description"></p> | 8 <p id="description"></p> |
9 <div id="console"></div> | 9 <div id="console"></div> |
10 | 10 |
11 <script> | 11 <script> |
12 description("Test generating an RSA key pair for RSASSA-PKCS1-v1_5."); | 12 description("Test that even when non-extractability is requested, the public key
is still extractable."); |
13 | 13 |
14 jsTestIsAsync = true; | 14 jsTestIsAsync = true; |
15 | 15 |
16 var algorithmKeyGen = { | 16 var algorithmKeyGen = { |
17 name: "RSASSA-PKCS1-v1_5", | 17 name: "RSA-OAEP", |
18 hash: {name: "sha-256"}, | 18 hash: {name: "sha-256"}, |
19 // RsaKeyGenParams | 19 // RsaKeyGenParams |
20 modulusLength: 2048, | 20 modulusLength: 2048, |
21 publicExponent: new Uint8Array([0x01, 0x00, 0x01]), // Equivalent to 65537 | 21 publicExponent: new Uint8Array([0x01, 0x00, 0x01]), // Equivalent to 65537 |
22 }; | 22 }; |
23 var extractable = true; | 23 var nonExtractable = false; |
24 | 24 |
25 debug("Generating a key pair..."); | 25 debug("Generating a key pair..."); |
26 crypto.subtle.generateKey(algorithmKeyGen, extractable, ["sign", "verify"]).then
(function(result) { | 26 crypto.subtle.generateKey(algorithmKeyGen, nonExtractable, []).then(function(res
ult) { |
27 keyPair = result; | 27 keyPair = result; |
28 shouldBe("keyPair.toString()", "'[object KeyPair]'"); | 28 shouldBe("keyPair.toString()", "'[object KeyPair]'"); |
29 shouldBe("keyPair.publicKey.type", "'public'"); | 29 shouldBe("keyPair.publicKey.type", "'public'"); |
30 shouldBe("keyPair.publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); | 30 shouldBe("keyPair.publicKey.extractable", "true"); |
31 shouldBe("keyPair.publicKey.algorithm.hash.name", "'SHA-256'"); | 31 shouldBe("keyPair.publicKey.algorithm.name", "'RSA-OAEP'"); |
32 shouldBe("keyPair.publicKey.algorithm.modulusLength", "2048"); | 32 shouldBe("keyPair.publicKey.algorithm.modulusLength", "2048"); |
33 shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'0
10001'"); | 33 shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'0
10001'"); |
34 shouldBe("keyPair.publicKey.usages", '["verify"]'); | 34 shouldBe("keyPair.publicKey.algorithm.hash.name", "'SHA-256'"); |
35 shouldBe("keyPair.privateKey.type", "'private'"); | 35 shouldBe("keyPair.privateKey.type", "'private'"); |
36 shouldBe("keyPair.privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); | 36 shouldBe("keyPair.privateKey.extractable", "false"); |
37 shouldBe("keyPair.privateKey.algorithm.hash.name", "'SHA-256'"); | 37 shouldBe("keyPair.privateKey.algorithm.name", "'RSA-OAEP'"); |
38 shouldBe("keyPair.privateKey.algorithm.modulusLength", "2048"); | 38 shouldBe("keyPair.privateKey.algorithm.modulusLength", "2048"); |
39 shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "'
010001'"); | 39 shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "'
010001'"); |
40 shouldBe("keyPair.privateKey.usages", '["sign"]'); | 40 shouldBe("keyPair.privateKey.algorithm.hash.name", "'SHA-256'"); |
41 | 41 }).then(finishJSTest, failAndFinishJSTest); |
42 debug("\nTesting that custom attributes on keys survive garbage collection..
."); | |
43 keyPair.publicKey.foo = "bar"; | |
44 gc(); | |
45 setTimeout(function() { | |
46 gc(); | |
47 setTimeout(function() { | |
48 shouldBe("keyPair.publicKey.foo", "'bar'"); | |
49 finishJSTest(); | |
50 }, 0); | |
51 }, 0); | |
52 }).catch(failAndFinishJSTest); | |
53 | 42 |
54 </script> | 43 </script> |
55 | 44 |
56 </body> | 45 </body> |
57 </html> | 46 </html> |
OLD | NEW |