OLD | NEW |
1 <!DOCTYPE html> | 1 <!DOCTYPE html> |
2 <html> | 2 <html> |
3 <head> | 3 <head> |
4 <script src="../resources/js-test.js"></script> | 4 <script src="../resources/js-test.js"></script> |
5 <script src="resources/common.js"></script> | 5 <script src="resources/common.js"></script> |
6 </head> | 6 </head> |
7 <body> | 7 <body> |
8 <p id="description"></p> | 8 <p id="description"></p> |
9 <div id="console"></div> | 9 <div id="console"></div> |
10 | 10 |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
54 logError(result); | 54 logError(result); |
55 testPassed("Promise rejected for exporting public key"); | 55 testPassed("Promise rejected for exporting public key"); |
56 return crypto.subtle.exportKey('raw', keyPair.privateKey); | 56 return crypto.subtle.exportKey('raw', keyPair.privateKey); |
57 }).then(failAndFinishJSTest, function(result) { | 57 }).then(failAndFinishJSTest, function(result) { |
58 logError(result); | 58 logError(result); |
59 testPassed("Promise rejected for exporting private key"); | 59 testPassed("Promise rejected for exporting private key"); |
60 | 60 |
61 debug("\nExporting public key to JWK..."); | 61 debug("\nExporting public key to JWK..."); |
62 return crypto.subtle.exportKey("jwk", keyPair.publicKey); | 62 return crypto.subtle.exportKey("jwk", keyPair.publicKey); |
63 }).then(function(result) { | 63 }).then(function(result) { |
64 jwkPublicKeyArray = result; | 64 jwkPublicKey = result; |
65 jwkPublicKey = JSON.parse(bytesToASCIIString(jwkPublicKeyArray)); | |
66 shouldBe("jwkPublicKey.alg", "'RSA-OAEP'"); | 65 shouldBe("jwkPublicKey.alg", "'RSA-OAEP'"); |
67 shouldBe("jwkPublicKey.ext", "true"); | 66 shouldBe("jwkPublicKey.ext", "true"); |
68 shouldBe("jwkPublicKey.key_ops", "['encrypt', 'wrapKey']"); | 67 shouldBe("jwkPublicKey.key_ops", "['encrypt', 'wrapKey']"); |
69 shouldBe("jwkPublicKey.use", "undefined"); | 68 shouldBe("jwkPublicKey.use", "undefined"); |
70 shouldBe("jwkPublicKey.kty", "'RSA'"); | 69 shouldBe("jwkPublicKey.kty", "'RSA'"); |
71 shouldBe("bytesToHexString(Base64URL.parse(jwkPublicKey.e))", "'010001'"); | 70 shouldBe("bytesToHexString(Base64URL.parse(jwkPublicKey.e))", "'010001'"); |
72 | 71 |
73 debug("\nImporting it back..."); | 72 debug("\nImporting it back..."); |
74 return crypto.subtle.importKey("jwk", jwkPublicKey, { name: "RSA-OAEP", hash
: {name: "sha-1"} }, extractable, ["encrypt", "wrapKey"]); | 73 return crypto.subtle.importKey("jwk", jwkPublicKey, { name: "RSA-OAEP", hash
: {name: "sha-1"} }, extractable, ["encrypt", "wrapKey"]); |
75 }).then(function(result) { | 74 }).then(function(result) { |
76 exportedPublicKey = result; | 75 exportedPublicKey = result; |
77 shouldBe("exportedPublicKey.type", "'public'"); | 76 shouldBe("exportedPublicKey.type", "'public'"); |
78 shouldBe("exportedPublicKey.algorithm.name", "'RSA-OAEP'"); | 77 shouldBe("exportedPublicKey.algorithm.name", "'RSA-OAEP'"); |
79 shouldBe("exportedPublicKey.algorithm.modulusLength", "512"); | 78 shouldBe("exportedPublicKey.algorithm.modulusLength", "512"); |
80 shouldBe("bytesToHexString(exportedPublicKey.algorithm.publicExponent)", "'0
10001'"); | 79 shouldBe("bytesToHexString(exportedPublicKey.algorithm.publicExponent)", "'0
10001'"); |
81 shouldBe("exportedPublicKey.algorithm.hash.name", "'SHA-1'"); | 80 shouldBe("exportedPublicKey.algorithm.hash.name", "'SHA-1'"); |
82 shouldBe("exportedPublicKey.extractable", "true"); | 81 shouldBe("exportedPublicKey.extractable", "true"); |
83 shouldBe("exportedPublicKey.usages", "['encrypt','wrapKey']"); | 82 shouldBe("exportedPublicKey.usages", "['encrypt','wrapKey']"); |
84 | 83 |
85 }).then(finishJSTest, failAndFinishJSTest); | 84 }).then(finishJSTest, failAndFinishJSTest); |
86 | 85 |
87 </script> | 86 </script> |
88 | 87 |
89 </body> | 88 </body> |
90 </html> | 89 </html> |
OLD | NEW |