| Index: LayoutTests/crypto/subtle/hkdf-deriveBits-rfc5869-test-vectors.html
|
| diff --git a/LayoutTests/crypto/subtle/hkdf-deriveBits-rfc5869-test-vectors.html b/LayoutTests/crypto/subtle/hkdf-deriveBits-rfc5869-test-vectors.html
|
| deleted file mode 100644
|
| index 8519874e2c92d2b2100e79144959c642619fba5a..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/crypto/subtle/hkdf-deriveBits-rfc5869-test-vectors.html
|
| +++ /dev/null
|
| @@ -1,107 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| -<script src="../../resources/js-test.js"></script>
|
| -<script src="resources/common.js"></script>
|
| -</head>
|
| -<body>
|
| -<p id="description"></p>
|
| -<div id="console"></div>
|
| -
|
| -<script>
|
| -description("Tests deriveBits() using HKDF");
|
| -
|
| -jsTestIsAsync = true;
|
| -
|
| -// These test vectors are from Appendix A of RFC 5869
|
| -kHkdfTestVectors = [
|
| - {
|
| - algorithm: "SHA-256",
|
| - input: "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
| - salt: "000102030405060708090a0b0c",
|
| - info: "f0f1f2f3f4f5f6f7f8f9",
|
| - length: 42,
|
| - output: "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865"
|
| - },
|
| - {
|
| - algorithm: "SHA-256",
|
| - input: "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f",
|
| - salt: "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
|
| - info: "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
|
| - length: 82,
|
| - output: "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87"
|
| - },
|
| - {
|
| - algorithm: "SHA-256",
|
| - input: "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
| - salt: "",
|
| - info: "",
|
| - length: 42,
|
| - output: "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8"
|
| - },
|
| - {
|
| - algorithm: "SHA-1",
|
| - input: "0b0b0b0b0b0b0b0b0b0b0b",
|
| - salt: "000102030405060708090a0b0c",
|
| - info: "f0f1f2f3f4f5f6f7f8f9",
|
| - length: 42,
|
| - output: "085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896"
|
| - },
|
| - {
|
| - algorithm: "SHA-1",
|
| - input: "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f",
|
| - salt: "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
|
| - info: "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
|
| - length: 82,
|
| - output: "0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4"
|
| - },
|
| - {
|
| - algorithm: "SHA-1",
|
| - input: "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
| - salt: "",
|
| - info: "",
|
| - length: 42,
|
| - output: "0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918"
|
| - },
|
| - {
|
| - algorithm: "SHA-1",
|
| - input: "0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c",
|
| - salt: "",
|
| - info: "",
|
| - length: 42,
|
| - output: "2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48"
|
| - },
|
| -];
|
| -
|
| -var extractable = true;
|
| -function runTest(testCase)
|
| -{
|
| - return Promise.resolve(null).then(function() {
|
| - return crypto.subtle.importKey("raw", hexStringToUint8Array(testCase.input), "HKDF", extractable, ['deriveKey','deriveBits']);
|
| - }).then(function(result) {
|
| - key = result;
|
| -
|
| - shouldEvaluateAs("key.type", "secret");
|
| - shouldEvaluateAs("key.extractable", extractable);
|
| - shouldEvaluateAs("key.algorithm.name", "HKDF");
|
| - shouldEvaluateAs("key.usages.join(',')", "deriveKey,deriveBits");
|
| -
|
| - return crypto.subtle.deriveBits({name: "HKDF", hash: testCase.algorithm, salt: hexStringToUint8Array(testCase.salt), info: hexStringToUint8Array(testCase.info)}, key, testCase.length * 8);
|
| - }).then(function(result) {
|
| - var testDescription = "HKDF of [" + testCase.input + "]";
|
| - bytesShouldMatchHexString(testDescription, testCase.output, result);
|
| - });
|
| -}
|
| -
|
| -var lastPromise = Promise.resolve(null);
|
| -
|
| -kHkdfTestVectors.forEach(function(testCase) {
|
| - lastPromise = lastPromise.then(runTest.bind(null, testCase));
|
| -});
|
| -
|
| -lastPromise.then(finishJSTest, failAndFinishJSTest);
|
| -
|
| -</script>
|
| -
|
| -</body>
|
| -</html>
|
|
|