OLD | NEW |
1 <!DOCTYPE html> | 1 <!DOCTYPE html> |
2 <html> | 2 <html> |
3 <head> | 3 <head> |
4 <script src="../resources/js-test.js"></script> | 4 <script src="../resources/js-test.js"></script> |
5 <script src="resources/common.js"></script> | 5 <script src="resources/common.js"></script> |
6 </head> | 6 </head> |
7 <body> | 7 <body> |
8 <p id="description"></p> | 8 <p id="description"></p> |
9 <div id="console"></div> | 9 <div id="console"></div> |
10 | 10 |
11 <script> | 11 <script> |
12 description("Test importing an RSA key for RSASSA-PKCS1-v1_5."); | 12 description("Test what happens when trying to encrypt a too large plain text wit
h RSA-OAEP."); |
13 | 13 |
14 jsTestIsAsync = true; | 14 jsTestIsAsync = true; |
15 | 15 |
16 var extractable = true; | |
17 | |
18 var publicKeyJSON = { | 16 var publicKeyJSON = { |
19 kty: "RSA", | 17 kty: "RSA", |
20 alg: "RS256", | 18 alg: "RSA-OAEP", |
21 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR
racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6
s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS
CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7
2KUp02mJDZiiyiglxML_i3-_CeecCw", | 19 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR
racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6
s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS
CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7
2KUp02mJDZiiyiglxML_i3-_CeecCw", |
22 e: "AQAB" | 20 e: "AQAB" |
23 }; | 21 }; |
24 | 22 |
25 var privateKeyJSON = { | 23 var privateKeyJSON = { |
26 kty: "RSA", | 24 kty: "RSA", |
27 alg: "RS256", | 25 alg: "RSA-OAEP", |
28 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR
racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6
s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS
CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7
2KUp02mJDZiiyiglxML_i3-_CeecCw", | 26 n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLR
racT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6
s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPS
CnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq7
2KUp02mJDZiiyiglxML_i3-_CeecCw", |
29 e: "AQAB", | 27 e: "AQAB", |
30 d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238ds
IWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_Lw
srMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3
hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM
3uoJghOMqGeocM0BpjdChHrPOlFvSQ", | 28 d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238ds
IWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_Lw
srMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3
hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM
3uoJghOMqGeocM0BpjdChHrPOlFvSQ", |
31 p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O
_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVL
viwposOnyyWqwM5AXp0", | 29 p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O
_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVL
viwposOnyyWqwM5AXp0", |
32 q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2G
ZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV
-cwzOPdcVAfVuZlxUMc", | 30 q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2G
ZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV
-cwzOPdcVAfVuZlxUMc", |
33 dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiD
HdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt
6F_fxow4Kb2xonGT0GGk", | 31 dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiD
HdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt
6F_fxow4Kb2xonGT0GGk", |
34 dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U
0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5
x-r9KwBZFC4FCG2hg_zE", | 32 dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U
0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5
x-r9KwBZFC4FCG2hg_zE", |
35 qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG
5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf
9-2QuKDoWeRdd7NsdxTk" | 33 qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG
5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf
9-2QuKDoWeRdd7NsdxTk" |
36 }; | 34 }; |
| 35 var encryptAlgorithm = {name: "RSA-OAEP", hash: "sha-1"}; |
| 36 var extractable = true; |
| 37 var nonExtractable = false; |
37 | 38 |
38 debug("Importing a public key..."); | 39 debug("Importing RSA keys..."); |
39 crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(publicKeyJSON)),
{name: "RSASSA-PKCS1-v1_5", hash: {name: "sha-256"}}, extractable, ["verify"]).
then(function(result) { | 40 crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(publicKeyJSON)),
{name:"rsa-oaep", hash:{name: "sha-1"}}, extractable, ["encrypt"]).then(functio
n(result) { |
40 publicKey = result; | 41 publicKey = result; |
41 shouldBe("publicKey.toString()", "'[object Key]'"); | 42 return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(priva
teKeyJSON)), {name:"rsa-oaep", hash:{name: "sha-1"}}, extractable, ["decrypt"]); |
42 shouldBe("publicKey.type", "'public'"); | 43 }, failAndFinishJSTest).then(function(result) { |
43 shouldBe("publicKey.usages", "['verify']"); | |
44 shouldBe("publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); | |
45 shouldBe("publicKey.algorithm.modulusLength", "2048"); | |
46 shouldBe("bytesToHexString(publicKey.algorithm.publicExponent)", "'010001'")
; | |
47 shouldBe("publicKey.algorithm.hash.name", "'SHA-256'"); | |
48 debug("\nImporting a private key..."); | |
49 return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(priva
teKeyJSON)), {name: "RSASSA-PKCS1-v1_5", hash: {name: "sha-256"}}, extractable,
["sign"]); | |
50 }).then(function(result) { | |
51 privateKey = result; | 44 privateKey = result; |
52 shouldBe("privateKey.toString()", "'[object Key]'"); | 45 |
53 shouldBe("privateKey.type", "'private'"); | 46 debug("Encrypting a 214 byte buffer with RSA-OAEP SHA-1, 2048 bit key..."); |
54 shouldBe("privateKey.usages", "['sign']"); | 47 return crypto.subtle.encrypt({name: "RSA-OAEP"}, publicKey, new Uint8Array(2
14)); |
55 shouldBe("privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); | 48 }, failAndFinishJSTest).then(function(result) { |
56 shouldBe("privateKey.algorithm.modulusLength", "2048"); | 49 testPassed("Succeeded"); |
57 shouldBe("bytesToHexString(privateKey.algorithm.publicExponent)", "'010001'"
); | 50 debug("Encrypting a 215 byte buffer..."); |
58 shouldBe("privateKey.algorithm.hash.name", "'SHA-256'"); | 51 return crypto.subtle.encrypt({name: "RSA-OAEP"}, publicKey, new Uint8Array(2
15)); |
59 }).then(finishJSTest, failAndFinishJSTest); | 52 }, failAndFinishJSTest).then(function(result) { |
| 53 testFailed("Succeeded"); |
| 54 }, function(result) { |
| 55 logError(result); |
| 56 testPassed("Rejected"); |
| 57 }).then(finishJSTest, failAndFinishJSTest); |
60 </script> | 58 </script> |
61 | 59 |
62 </body> | 60 </body> |
63 </html> | 61 </html> |
OLD | NEW |