Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(317)

Side by Side Diff: LayoutTests/crypto/rsa-oaep-plaintext-length.html

Issue 310513004: Import WebKit RSA-OAEP LayoutTests. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Add another test Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 <!DOCTYPE html> 1 <!DOCTYPE html>
2 <html> 2 <html>
3 <head> 3 <head>
4 <script src="../resources/js-test.js"></script> 4 <script src="../resources/js-test.js"></script>
5 <script src="resources/common.js"></script> 5 <script src="resources/common.js"></script>
6 </head> 6 </head>
7 <body> 7 <body>
8 <p id="description"></p> 8 <p id="description"></p>
9 <div id="console"></div> 9 <div id="console"></div>
10 10
11 <script> 11 <script>
12 description("Test importing an RSA key for RSASSA-PKCS1-v1_5."); 12 description("Test what happens when trying to encrypt a too large plain text wit h RSA-OAEP.");
13 13
14 jsTestIsAsync = true; 14 jsTestIsAsync = true;
15 15
16 var extractable = true;
17
18 var publicKeyJSON = { 16 var publicKeyJSON = {
19 kty: "RSA", 17 kty: "RSA",
20 alg: "RS256", 18 alg: "RSA-OAEP",
21 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6 s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7 2KUp02mJDZiiyiglxML_i3-_CeecCw", 19 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6 s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7 2KUp02mJDZiiyiglxML_i3-_CeecCw",
22 e: "AQAB" 20 e: "AQAB"
23 }; 21 };
24 22
25 var privateKeyJSON = { 23 var privateKeyJSON = {
26 kty: "RSA", 24 kty: "RSA",
27 alg: "RS256", 25 alg: "RSA-OAEP",
28 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6 s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7 2KUp02mJDZiiyiglxML_i3-_CeecCw", 26 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6 s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7 2KUp02mJDZiiyiglxML_i3-_CeecCw",
29 e: "AQAB", 27 e: "AQAB",
30 d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238ds IWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_Lw srMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3 hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM 3uoJghOMqGeocM0BpjdChHrPOlFvSQ", 28 d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238ds IWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_Lw srMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3 hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM 3uoJghOMqGeocM0BpjdChHrPOlFvSQ",
31 p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O _ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVL viwposOnyyWqwM5AXp0", 29 p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O _ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVL viwposOnyyWqwM5AXp0",
32 q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2G ZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV -cwzOPdcVAfVuZlxUMc", 30 q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2G ZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV -cwzOPdcVAfVuZlxUMc",
33 dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiD HdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt 6F_fxow4Kb2xonGT0GGk", 31 dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiD HdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt 6F_fxow4Kb2xonGT0GGk",
34 dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U 0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5 x-r9KwBZFC4FCG2hg_zE", 32 dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U 0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5 x-r9KwBZFC4FCG2hg_zE",
35 qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG 5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf 9-2QuKDoWeRdd7NsdxTk" 33 qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG 5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf 9-2QuKDoWeRdd7NsdxTk"
36 }; 34 };
35 var encryptAlgorithm = {name: "RSA-OAEP", hash: "sha-1"};
36 var extractable = true;
37 var nonExtractable = false;
37 38
38 debug("Importing a public key..."); 39 debug("Importing RSA keys...");
39 crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(publicKeyJSON)), {name: "RSASSA-PKCS1-v1_5", hash: {name: "sha-256"}}, extractable, ["verify"]). then(function(result) { 40 crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(publicKeyJSON)), {name:"rsa-oaep", hash:{name: "sha-1"}}, extractable, ["encrypt"]).then(functio n(result) {
40 publicKey = result; 41 publicKey = result;
41 shouldBe("publicKey.toString()", "'[object Key]'"); 42 return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(priva teKeyJSON)), {name:"rsa-oaep", hash:{name: "sha-1"}}, extractable, ["decrypt"]);
42 shouldBe("publicKey.type", "'public'"); 43 }, failAndFinishJSTest).then(function(result) {
43 shouldBe("publicKey.usages", "['verify']");
44 shouldBe("publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
45 shouldBe("publicKey.algorithm.modulusLength", "2048");
46 shouldBe("bytesToHexString(publicKey.algorithm.publicExponent)", "'010001'") ;
47 shouldBe("publicKey.algorithm.hash.name", "'SHA-256'");
48 debug("\nImporting a private key...");
49 return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(priva teKeyJSON)), {name: "RSASSA-PKCS1-v1_5", hash: {name: "sha-256"}}, extractable, ["sign"]);
50 }).then(function(result) {
51 privateKey = result; 44 privateKey = result;
52 shouldBe("privateKey.toString()", "'[object Key]'"); 45
53 shouldBe("privateKey.type", "'private'"); 46 debug("Encrypting a 214 byte buffer with RSA-OAEP SHA-1, 2048 bit key...");
54 shouldBe("privateKey.usages", "['sign']"); 47 return crypto.subtle.encrypt({name: "RSA-OAEP"}, publicKey, new Uint8Array(2 14));
55 shouldBe("privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 48 }, failAndFinishJSTest).then(function(result) {
56 shouldBe("privateKey.algorithm.modulusLength", "2048"); 49 testPassed("Succeeded");
57 shouldBe("bytesToHexString(privateKey.algorithm.publicExponent)", "'010001'" ); 50 debug("Encrypting a 215 byte buffer...");
58 shouldBe("privateKey.algorithm.hash.name", "'SHA-256'"); 51 return crypto.subtle.encrypt({name: "RSA-OAEP"}, publicKey, new Uint8Array(2 15));
59 }).then(finishJSTest, failAndFinishJSTest); 52 }, failAndFinishJSTest).then(function(result) {
53 testFailed("Succeeded");
54 }, function(result) {
55 logError(result);
56 testPassed("Rejected");
57 }).then(finishJSTest, failAndFinishJSTest);
60 </script> 58 </script>
61 59
62 </body> 60 </body>
63 </html> 61 </html>
OLDNEW
« no previous file with comments | « LayoutTests/crypto/rsa-oaep-key-manipulation-expected.txt ('k') | LayoutTests/crypto/rsa-oaep-plaintext-length-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698