1 if (self.importScripts) {
2 importScripts('../../resources/js-test.js');
3 importScripts('common.js');
6 function shouldEvaluateAsSilent(expressionToEval, expectedResult)
8 var result = eval(expressionToEval);
9 if (result !== expectedResult) {
10 testFailed(expressionToEval + " evaluated to " + result + " instead of " + expectedResult);
14 function doPostMessage(data)
17 self.postMessage(data);
19 self.postMessage(data, '*');
22 function notifySuccess()
24 doPostMessage("TEST_FINISHED");
27 function notifyFailure(details)
29 doPostMessage("FAIL:" + details);
32 function testGenerateRsaKey()
34 var extractable = false;
35 var usages = ['encrypt', 'decrypt'];
36 // Note that the modulus length is unusually small in order to speed up
37 // the test (1024 or 2048 would be more typical).
38 var algorithm = {name: "RSAES-PKCS1-v1_5", modulusLength: 256, publicExponent: hexStringToUint8Array("010001")};
40 return crypto.subtle.generateKey(algorithm, extractable, usages).then(function(result) {
41 publicKey = result.publicKey;
42 privateKey = result.privateKey;
44 shouldEvaluateAsSilent("publicKey.type", "public");
45 shouldEvaluateAsSilent("publicKey.extractable", true);
46 shouldEvaluateAsSilent("publicKey.algorithm.name", algorithm.name);
47 shouldEvaluateAsSilent("publicKey.algorithm.modulusLength", algorithm.modulusLength);
48 shouldEvaluateAsSilent("bytesToHexString(publicKey.algorithm.publicExponent)", "010001");
50 shouldEvaluateAsSilent("privateKey.type", "private");
51 shouldEvaluateAsSilent("privateKey.extractable", false);
52 shouldEvaluateAsSilent("privateKey.algorithm.name", algorithm.name);
53 shouldEvaluateAsSilent("privateKey.algorithm.modulusLength", algorithm.modulusLength);
54 shouldEvaluateAsSilent("bytesToHexString(privateKey.algorithm.publicExponent)", "010001");
58 // Very similar to "hmac-sign-verify.html".
61 var importAlgorithm = {name: 'HMAC', hash: {name: "SHA-256"}};
62 var algorithm = {name: 'HMAC'};
68 key: "9779d9120642797f1747025d5b22b7ac607cab08e1758f2f3a46c8be1e25c53b8c6a8f58ffefa176",
69 message: "b1689c2591eaf3c9e66070f8a77954ffb81749f1b00346f9dfe0b2ee905dcc288baf4a92de3f4001dd9f44c468c3d07d6c6ee82faceafc97c2fc0fc0601719d2dcd0aa2aec92d1b0ae933c65eb06a03c9c935c2bad0459810241347ab87e9f11adb30415424c6c7f5f22a003b8ab8de54f6ded0e3ab9245fa79568451dfa258e",
70 mac: "769f00d3e6a6cc1fb426a14a4f76c6462e6149726e0dee0ec0cf97a16605ac8b"
73 var keyData = hexStringToUint8Array(testCase.key);
74 var usages = ['sign', 'verify'];
75 var extractable = true;
78 return crypto.subtle.importKey('raw', keyData, importAlgorithm, extractable, usages).then(function(result) {
81 // shouldBe() can only resolve variables in global context.
83 shouldEvaluateAsSilent("tmpKey.type", "secret");
84 shouldEvaluateAsSilent("tmpKey.extractable", true);
85 shouldEvaluateAsSilent("tmpKey.algorithm.name", "HMAC");
86 shouldEvaluateAsSilent("tmpKey.algorithm.hash.name", testCase.hash);
87 shouldEvaluateAsSilent("tmpKey.algorithm.length", keyData.length * 8);
88 shouldEvaluateAsSilent("tmpKey.usages.join(',')", "sign,verify");
91 var signPromise = crypto.subtle.sign(algorithm, key, hexStringToUint8Array(testCase.message));
94 var verifyPromise = crypto.subtle.verify(algorithm, key, hexStringToUint8Array(testCase.mac), hexStringToUint8Array(testCase.message));
96 // (4) Verify truncated mac (by stripping 1 byte off of it).
97 var expectedMac = hexStringToUint8Array(testCase.mac);
98 var verifyTruncatedPromise = crypto.subtle.verify(algorithm, key, expectedMac.subarray(0, expectedMac.byteLength - 1), hexStringToUint8Array(testCase.message));
100 var exportKeyPromise = crypto.subtle.exportKey('raw', key);
102 return Promise.all([signPromise, verifyPromise, verifyTruncatedPromise, exportKeyPromise]);
103 }).then(function(result) {
106 shouldEvaluateAsSilent("bytesToHexString(mac)", testCase.mac);
109 verifyResult = result[1];
110 shouldEvaluateAsSilent("verifyResult", true);
112 // verifyTruncatedPromise
113 verifyResult = result[2];
114 shouldEvaluateAsSilent("verifyResult", false);
117 exportedKeyData = result[3];
118 shouldEvaluateAsSilent("bytesToHexString(exportedKeyData)", testCase.key);
122 // Very similar to aes-gcm-encrypt-decrypt.hml
123 function testAesGcm()
126 "key": "ae7972c025d7f2ca3dd37dcc3d41c506671765087c6b61b8",
127 "iv": "984c1379e6ba961c828d792d",
128 "plainText": "d30b02c343487105219d6fa080acc743",
129 "cipherText": "c4489fa64a6edf80e7e6a3b8855bc37c",
130 "additionalData": "edd8f630f9bbc31b0acf122998f15589d6e6e3e1a3ec89e0c6a6ece751610ebbf57fdfb9d82028ff1d9faebe37a268c1",
131 "authenticationTag": "772ee7de0f91a981c36c93a35c88"
135 var keyData = hexStringToUint8Array(testCase.key);
136 var iv = hexStringToUint8Array(testCase.iv);
137 var additionalData = hexStringToUint8Array(testCase.additionalData);
138 var tag = hexStringToUint8Array(testCase.authenticationTag);
139 var usages = ['encrypt', 'decrypt'];
140 var extractable = false;
142 var tagLengthBits = tag.byteLength * 8;
144 var algorithm = {name: 'aes-gcm', iv: iv, additionalData: additionalData, tagLength: tagLengthBits};
146 // (1) Import the key
147 return crypto.subtle.importKey('raw', keyData, algorithm, extractable, usages).then(function(result) {
150 // shouldBe() can only resolve variables in global context.
152 shouldEvaluateAsSilent("tmpKey.type", "secret");
153 shouldEvaluateAsSilent("tmpKey.extractable", false);
154 shouldEvaluateAsSilent("tmpKey.algorithm.name", "AES-GCM");
155 shouldEvaluateAsSilent("tmpKey.usages.join(',')", "encrypt,decrypt");
158 var encryptPromise1 = crypto.subtle.encrypt(algorithm, key, hexStringToUint8Array(testCase.plainText));
159 var encryptPromise2 = crypto.subtle.encrypt(algorithm, key, hexStringToUint8Array(testCase.plainText));
162 var decryptPromise1 = crypto.subtle.decrypt(algorithm, key, hexStringToUint8Array(testCase.cipherText + testCase.authenticationTag));
163 var decryptPromise2 = crypto.subtle.decrypt(algorithm, key, hexStringToUint8Array(testCase.cipherText + testCase.authenticationTag));
165 return Promise.all([encryptPromise1, encryptPromise2, decryptPromise1, decryptPromise2]);
166 }).then(function(result) {
167 // encryptPromise1, encryptPromise2
168 for (var i = 0; i < 2; ++i) {
169 cipherText = result[i];
170 shouldEvaluateAsSilent("bytesToHexString(cipherText)", testCase.cipherText + testCase.authenticationTag);
173 // decryptPromise1, decryptPromise2
174 for (var i = 0; i < 2; ++i) {
175 plainText = result[2 + i];
176 shouldEvaluateAsSilent("bytesToHexString(plainText)", testCase.plainText);
183 testGenerateRsaKey(),
187 ]).then(notifySuccess, notifyFailure);