| OLD | NEW | 
|---|
| 1 <!DOCTYPE html> | 1 <!DOCTYPE html> | 
| 2 <html> | 2 <html> | 
| 3 <head> | 3 <head> | 
| 4 <script src="../fast/js/resources/js-test-pre.js"></script> | 4 <script src="../fast/js/resources/js-test-pre.js"></script> | 
| 5 <script src="resources/common.js"></script> | 5 <script src="resources/common.js"></script> | 
| 6 </head> | 6 </head> | 
| 7 <body> | 7 <body> | 
| 8 <p id="description"></p> | 8 <p id="description"></p> | 
| 9 <div id="console"></div> | 9 <div id="console"></div> | 
| 10 | 10 | 
| 11 <script> | 11 <script> | 
| 12 description("Tests cypto.subtle.sign and crypto.subtle.verify"); | 12 description("Tests cypto.subtle.sign and crypto.subtle.verify"); | 
| 13 | 13 | 
| 14 jsTestIsAsync = true; | 14 jsTestIsAsync = true; | 
| 15 | 15 | 
| 16 importHmacSha1Key().then(function(key) { | 16 importHmacSha1Key().then(function(key) { | 
| 17     hmacSha1Key = key; | 17     hmacSha1Key = key; | 
| 18     hmacSha1 = {name: 'hmac', hash: {name: 'Sha-1'}}; | 18     hmacSha1 = {name: 'hmac', hash: {name: 'Sha-1'}}; | 
| 19 | 19 | 
| 20     // Pass invalid signature parameters to verify() | 20     data = asciiToArrayBuffer("hello"); | 
| 21     shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, null)"); |  | 
| 22     shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, 'a')"); |  | 
| 23     shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, [])"); |  | 
| 24 |  | 
| 25     var data = asciiToArrayBuffer("hello"); |  | 
| 26     var expectedSignature = asciiToArrayBuffer("signed HMAC:hello"); | 21     var expectedSignature = asciiToArrayBuffer("signed HMAC:hello"); | 
| 27 | 22 | 
| 28     var signPromise = crypto.subtle.sign(hmacSha1, hmacSha1Key).process(data).fi
    nish(); | 23     // Pass invalid signature parameters to verify() | 
| 29     var verifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, expectedSign
    ature).process(data).finish(); | 24     shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, null, data)"); | 
| 30     var badVerifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, asciiToAr
    rayBuffer("badsignature")).process(data).finish(); | 25     shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, 'a', data)"); | 
|  | 26     shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, [], data)"); | 
|  | 27 | 
|  | 28     var signPromise = crypto.subtle.sign(hmacSha1, hmacSha1Key, data); | 
|  | 29     var verifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, expectedSign
    ature, data); | 
|  | 30     var badVerifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, asciiToAr
    rayBuffer("badsignature"), data); | 
| 31 | 31 | 
| 32     Promise.every(signPromise, verifyPromise, badVerifyPromise).then(function(re
    sults) | 32     Promise.every(signPromise, verifyPromise, badVerifyPromise).then(function(re
    sults) | 
| 33     { | 33     { | 
| 34         signResult = results[0]; | 34         signResult = results[0]; | 
| 35         verifyResult1 = results[1]; | 35         verifyResult1 = results[1]; | 
| 36         verifyResult2 = results[2]; | 36         verifyResult2 = results[2]; | 
| 37 | 37 | 
| 38         shouldBe("signResult.byteLength", "17"); | 38         shouldBe("signResult.byteLength", "17"); | 
| 39         shouldBe("verifyResult1", "true"); | 39         shouldBe("verifyResult1", "true"); | 
| 40         shouldBe("verifyResult2", "false"); | 40         shouldBe("verifyResult2", "false"); | 
| 41 | 41 | 
| 42         finishJSTest(); | 42         finishJSTest(); | 
| 43     }); | 43     }); | 
| 44 }); | 44 }); | 
| 45 | 45 | 
| 46 </script> | 46 </script> | 
| 47 | 47 | 
| 48 <script src="../fast/js/resources/js-test-post.js"></script> | 48 <script src="../fast/js/resources/js-test-post.js"></script> | 
| 49 </body> | 49 </body> | 
| OLD | NEW | 
|---|