From 570309d795d2e2a00fc2523ca80818b275b567e6 Mon Sep 17 00:00:00 2001 From: Divy Srivastava Date: Tue, 6 Jul 2021 17:46:04 +0530 Subject: feat(crypto): implement generateKey() and sign() (#9614) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Co-authored-by: Luca Casonato Co-authored-by: Bartek IwaƄczuk --- cli/tests/unit/webcrypto_test.ts | 58 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) create mode 100644 cli/tests/unit/webcrypto_test.ts (limited to 'cli') diff --git a/cli/tests/unit/webcrypto_test.ts b/cli/tests/unit/webcrypto_test.ts new file mode 100644 index 000000000..4361d3a10 --- /dev/null +++ b/cli/tests/unit/webcrypto_test.ts @@ -0,0 +1,58 @@ +import { assert, assertEquals, unitTest } from "./test_util.ts"; + +unitTest(async function testGenerateRSAKey() { + const subtle = window.crypto.subtle; + assert(subtle); + + const keyPair = await subtle.generateKey( + { + name: "RSA-PSS", + modulusLength: 2048, + publicExponent: new Uint8Array([1, 0, 1]), + hash: "SHA-256", + }, + true, + ["sign", "verify"], + ); + + assert(keyPair.privateKey); + assert(keyPair.publicKey); + assertEquals(keyPair.privateKey.extractable, true); + assert(keyPair.privateKey.usages.includes("sign")); +}); + +unitTest(async function testGenerateHMACKey() { + const key = await window.crypto.subtle.generateKey( + { + name: "HMAC", + hash: "SHA-512", + }, + true, + ["sign", "verify"], + ); + + assert(key); + assertEquals(key.extractable, true); + assert(key.usages.includes("sign")); +}); + +unitTest(async function testSignECDSA() { + const key = await window.crypto.subtle.generateKey( + { + name: "ECDSA", + namedCurve: "P-384", + }, + true, + ["sign", "verify"], + ); + + const encoder = new TextEncoder(); + const encoded = encoder.encode("Hello, World!"); + const signature = await window.crypto.subtle.sign( + { name: "ECDSA", hash: "SHA-384" }, + key.privateKey, + encoded, + ); + + assert(signature); +}); -- cgit v1.2.3