Title: [201685] trunk/LayoutTests
Revision
201685
Author
[email protected]
Date
2016-06-04 13:59:57 -0700 (Sat, 04 Jun 2016)

Log Message

Modern IDB: Add -private.html variants of crypto/subtle IndexedDB tests.
https://bugs.webkit.org/show_bug.cgi?id=153323

Reviewed by Darin Adler.

* crypto/subtle/resources/rsa-indexeddb-non-exportable.js: Copied from LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable.html.
* crypto/subtle/resources/rsa-indexeddb.js: Copied from LayoutTests/crypto/subtle/rsa-indexeddb.html.

* crypto/subtle/rsa-indexeddb-non-exportable-private-expected.txt: Added.
* crypto/subtle/rsa-indexeddb-non-exportable-private.html: Added.
* crypto/subtle/rsa-indexeddb-non-exportable.html:
* crypto/subtle/rsa-indexeddb-private-expected.txt: Added.
* crypto/subtle/rsa-indexeddb-private.html: Added.
* crypto/subtle/rsa-indexeddb.html:

Modified Paths

Added Paths

Diff

Modified: trunk/LayoutTests/ChangeLog (201684 => 201685)


--- trunk/LayoutTests/ChangeLog	2016-06-04 20:53:25 UTC (rev 201684)
+++ trunk/LayoutTests/ChangeLog	2016-06-04 20:59:57 UTC (rev 201685)
@@ -1,3 +1,20 @@
+2016-06-04  Brady Eidson  <[email protected]>
+
+        Modern IDB: Add -private.html variants of crypto/subtle IndexedDB tests.
+        https://bugs.webkit.org/show_bug.cgi?id=153323
+
+        Reviewed by Darin Adler.
+
+        * crypto/subtle/resources/rsa-indexeddb-non-exportable.js: Copied from LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable.html.
+        * crypto/subtle/resources/rsa-indexeddb.js: Copied from LayoutTests/crypto/subtle/rsa-indexeddb.html.
+
+        * crypto/subtle/rsa-indexeddb-non-exportable-private-expected.txt: Added.
+        * crypto/subtle/rsa-indexeddb-non-exportable-private.html: Added.
+        * crypto/subtle/rsa-indexeddb-non-exportable.html:
+        * crypto/subtle/rsa-indexeddb-private-expected.txt: Added.
+        * crypto/subtle/rsa-indexeddb-private.html: Added.
+        * crypto/subtle/rsa-indexeddb.html:
+
 2016-06-04  Alexey Proskuryakov  <[email protected]>
 
         REGRESSION (r201263): Some tests have become flaky timeouts.

Copied: trunk/LayoutTests/crypto/subtle/resources/rsa-indexeddb-non-exportable.js (from rev 201684, trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable.html) (0 => 201685)


--- trunk/LayoutTests/crypto/subtle/resources/rsa-indexeddb-non-exportable.js	                        (rev 0)
+++ trunk/LayoutTests/crypto/subtle/resources/rsa-indexeddb-non-exportable.js	2016-06-04 20:59:57 UTC (rev 201685)
@@ -0,0 +1,61 @@
+description("Test storing a private RSA key in IndexedDB, and retrieving it.");
+
+jsTestIsAsync = true;
+
+var privateKeyJSON = {
+    kty: "RSA",
+    alg: "RS256",
+    n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLRracT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPSCnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq72KUp02mJDZiiyiglxML_i3-_CeecCw",
+    e: "AQAB",
+    d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238dsIWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_LwsrMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM3uoJghOMqGeocM0BpjdChHrPOlFvSQ",
+    p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVLviwposOnyyWqwM5AXp0",
+    q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2GZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV-cwzOPdcVAfVuZlxUMc",
+    dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiDHdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt6F_fxow4Kb2xonGT0GGk",
+    dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5x-r9KwBZFC4FCG2hg_zE",
+    qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf9-2QuKDoWeRdd7NsdxTk"
+};
+
+crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(privateKeyJSON)), null, false, ["sign", "verify"]).then(function(key) {
+    var openRequest = indexedDB.open("crypto_subtle");
+    openRequest._onupgradeneeded_ = function(event) {
+        var objectStore = event.target.result.createObjectStore("rsa-indexeddb");
+    }
+    openRequest._onerror_ = function(event) {
+        testFailed("Could not open database: " + event.target.error.name);
+        finishJSTest();
+    }
+    openRequest._onsuccess_ = function(event) {
+        db = event.target.result;
+        storeKey();
+    }
+
+    function storeKey() {
+        var objectStore = db.transaction("rsa-indexeddb", "readwrite").objectStore("rsa-indexeddb");
+        var req = objectStore.put(key, "mykey");
+        req._onerror_ = function(event) {
+            testFailed("Could not put a key into database: " + event.target.error.name);
+            finishJSTest();
+        }
+        req._onsuccess_ = function(event) { readKey(); }
+    }
+
+    function readKey() {
+        var objectStore = db.transaction("rsa-indexeddb").objectStore("rsa-indexeddb");
+        var req = objectStore.get("mykey");
+        req._onerror_ = function(event) {
+            testFailed("Could not get a key from database: " + event.target.error.name);
+            finishJSTest();
+        }
+        req._onsuccess_ = function(event) {
+            window.retrievedKey = event.target.result;
+            shouldBe("retrievedKey.type", "'private'");
+            shouldBe("retrievedKey.extractable", "false");
+            shouldBe("retrievedKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
+            shouldBe("retrievedKey.algorithm.modulusLength", "2048");
+            shouldBe("bytesToHexString(retrievedKey.algorithm.publicExponent)", "'010001'");
+            shouldBe("retrievedKey.usages", '["sign", "verify"]');
+
+            finishJSTest();
+        }
+    }
+});

Copied: trunk/LayoutTests/crypto/subtle/resources/rsa-indexeddb.js (from rev 201684, trunk/LayoutTests/crypto/subtle/rsa-indexeddb.html) (0 => 201685)


--- trunk/LayoutTests/crypto/subtle/resources/rsa-indexeddb.js	                        (rev 0)
+++ trunk/LayoutTests/crypto/subtle/resources/rsa-indexeddb.js	2016-06-04 20:59:57 UTC (rev 201685)
@@ -0,0 +1,61 @@
+description("Test storing a private RSA key in IndexedDB, and retrieving it.");
+
+jsTestIsAsync = true;
+
+var privateKeyJSON = {
+    kty: "RSA",
+    alg: "RS256",
+    n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLRracT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPSCnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq72KUp02mJDZiiyiglxML_i3-_CeecCw",
+    e: "AQAB",
+    d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238dsIWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_LwsrMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM3uoJghOMqGeocM0BpjdChHrPOlFvSQ",
+    p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVLviwposOnyyWqwM5AXp0",
+    q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2GZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV-cwzOPdcVAfVuZlxUMc",
+    dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiDHdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt6F_fxow4Kb2xonGT0GGk",
+    dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5x-r9KwBZFC4FCG2hg_zE",
+    qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf9-2QuKDoWeRdd7NsdxTk"
+};
+
+crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(privateKeyJSON)), null, true, ["sign", "verify"]).then(function(key) {
+    var openRequest = indexedDB.open("crypto_subtle");
+    openRequest._onupgradeneeded_ = function(event) {
+        var objectStore = event.target.result.createObjectStore("rsa-indexeddb");
+    }
+    openRequest._onerror_ = function(event) {
+        testFailed("Could not open database: " + event.target.error.name);
+        finishJSTest();
+    }
+    openRequest._onsuccess_ = function(event) {
+        db = event.target.result;
+        storeKey();
+    }
+
+    function storeKey() {
+        var objectStore = db.transaction("rsa-indexeddb", "readwrite").objectStore("rsa-indexeddb");
+        var req = objectStore.put(key, "mykey");
+        req._onerror_ = function(event) {
+            testFailed("Could not put a key into database: " + event.target.error.name);
+            finishJSTest();
+        }
+        req._onsuccess_ = function(event) { readKey(); }
+    }
+
+    function readKey() {
+        var objectStore = db.transaction("rsa-indexeddb").objectStore("rsa-indexeddb");
+        var req = objectStore.get("mykey");
+        req._onerror_ = function(event) {
+            testFailed("Could not get a key from database: " + event.target.error.name);
+            finishJSTest();
+        }
+        req._onsuccess_ = function(event) {
+            window.retrievedKey = event.target.result;
+            shouldBe("retrievedKey.type", "'private'");
+            shouldBe("retrievedKey.extractable", "true");
+            shouldBe("retrievedKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
+            shouldBe("retrievedKey.algorithm.modulusLength", "2048");
+            shouldBe("bytesToHexString(retrievedKey.algorithm.publicExponent)", "'010001'");
+            shouldBe("retrievedKey.usages", '["sign", "verify"]');
+
+            finishJSTest();
+        }
+    }
+});

Added: trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable-private-expected.txt (0 => 201685)


--- trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable-private-expected.txt	                        (rev 0)
+++ trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable-private-expected.txt	2016-06-04 20:59:57 UTC (rev 201685)
@@ -0,0 +1,15 @@
+Test storing a private RSA key in IndexedDB, and retrieving it.
+
+On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
+
+
+PASS retrievedKey.type is 'private'
+PASS retrievedKey.extractable is false
+PASS retrievedKey.algorithm.name is 'RSASSA-PKCS1-v1_5'
+PASS retrievedKey.algorithm.modulusLength is 2048
+PASS bytesToHexString(retrievedKey.algorithm.publicExponent) is '010001'
+PASS retrievedKey.usages is ["sign", "verify"]
+PASS successfullyParsed is true
+
+TEST COMPLETE
+

Added: trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable-private.html (0 => 201685)


--- trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable-private.html	                        (rev 0)
+++ trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable-private.html	2016-06-04 20:59:57 UTC (rev 201685)
@@ -0,0 +1,14 @@
+<!DOCTYPE html>
+<html>
+<head>
+<script>
+enablePrivateBrowsing = true;
+</script>
+<script src=""
+<script src=""
+</head>
+<body>
+<script src=""
+<script src=""
+</body>
+</html>

Modified: trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable.html (201684 => 201685)


--- trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable.html	2016-06-04 20:53:25 UTC (rev 201684)
+++ trunk/LayoutTests/crypto/subtle/rsa-indexeddb-non-exportable.html	2016-06-04 20:59:57 UTC (rev 201685)
@@ -5,70 +5,7 @@
 <script src=""
 </head>
 <body>
-<script>
-
-description("Test storing a private RSA key in IndexedDB, and retrieving it.");
-
-jsTestIsAsync = true;
-
-var privateKeyJSON = {
-    kty: "RSA",
-    alg: "RS256",
-    n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLRracT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPSCnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq72KUp02mJDZiiyiglxML_i3-_CeecCw",
-    e: "AQAB",
-    d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238dsIWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_LwsrMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM3uoJghOMqGeocM0BpjdChHrPOlFvSQ",
-    p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVLviwposOnyyWqwM5AXp0",
-    q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2GZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV-cwzOPdcVAfVuZlxUMc",
-    dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiDHdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt6F_fxow4Kb2xonGT0GGk",
-    dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5x-r9KwBZFC4FCG2hg_zE",
-    qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf9-2QuKDoWeRdd7NsdxTk"
-};
-
-crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(privateKeyJSON)), null, false, ["sign", "verify"]).then(function(key) {
-    var openRequest = indexedDB.open("crypto_subtle");
-    openRequest._onupgradeneeded_ = function(event) {
-        var objectStore = event.target.result.createObjectStore("rsa-indexeddb");
-    }
-    openRequest._onerror_ = function(event) {
-        testFailed("Could not open database: " + event.target.error.name);
-        finishJSTest();
-    }
-    openRequest._onsuccess_ = function(event) {
-        db = event.target.result;
-        storeKey();
-    }
-
-    function storeKey() {
-        var objectStore = db.transaction("rsa-indexeddb", "readwrite").objectStore("rsa-indexeddb");
-        var req = objectStore.put(key, "mykey");
-        req._onerror_ = function(event) {
-            testFailed("Could not put a key into database: " + event.target.error.name);
-            finishJSTest();
-        }
-        req._onsuccess_ = function(event) { readKey(); }
-    }
-
-    function readKey() {
-        var objectStore = db.transaction("rsa-indexeddb").objectStore("rsa-indexeddb");
-        var req = objectStore.get("mykey");
-        req._onerror_ = function(event) {
-            testFailed("Could not get a key from database: " + event.target.error.name);
-            finishJSTest();
-        }
-        req._onsuccess_ = function(event) {
-            window.retrievedKey = event.target.result;
-            shouldBe("retrievedKey.type", "'private'");
-            shouldBe("retrievedKey.extractable", "false");
-            shouldBe("retrievedKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
-            shouldBe("retrievedKey.algorithm.modulusLength", "2048");
-            shouldBe("bytesToHexString(retrievedKey.algorithm.publicExponent)", "'010001'");
-            shouldBe("retrievedKey.usages", '["sign", "verify"]');
-
-            finishJSTest();
-        }
-    }
-});
-</script>
+<script src=""
 <script src=""
 </body>
 </html>

Added: trunk/LayoutTests/crypto/subtle/rsa-indexeddb-private-expected.txt (0 => 201685)


--- trunk/LayoutTests/crypto/subtle/rsa-indexeddb-private-expected.txt	                        (rev 0)
+++ trunk/LayoutTests/crypto/subtle/rsa-indexeddb-private-expected.txt	2016-06-04 20:59:57 UTC (rev 201685)
@@ -0,0 +1,15 @@
+Test storing a private RSA key in IndexedDB, and retrieving it.
+
+On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
+
+
+PASS retrievedKey.type is 'private'
+PASS retrievedKey.extractable is true
+PASS retrievedKey.algorithm.name is 'RSASSA-PKCS1-v1_5'
+PASS retrievedKey.algorithm.modulusLength is 2048
+PASS bytesToHexString(retrievedKey.algorithm.publicExponent) is '010001'
+PASS retrievedKey.usages is ["sign", "verify"]
+PASS successfullyParsed is true
+
+TEST COMPLETE
+

Added: trunk/LayoutTests/crypto/subtle/rsa-indexeddb-private.html (0 => 201685)


--- trunk/LayoutTests/crypto/subtle/rsa-indexeddb-private.html	                        (rev 0)
+++ trunk/LayoutTests/crypto/subtle/rsa-indexeddb-private.html	2016-06-04 20:59:57 UTC (rev 201685)
@@ -0,0 +1,14 @@
+<!DOCTYPE html>
+<html>
+<head>
+<script>
+enablePrivateBrowsing = true;
+</script>
+<script src=""
+<script src=""
+</head>
+<body>
+<script src=""
+<script src=""
+</body>
+</html>

Modified: trunk/LayoutTests/crypto/subtle/rsa-indexeddb.html (201684 => 201685)


--- trunk/LayoutTests/crypto/subtle/rsa-indexeddb.html	2016-06-04 20:53:25 UTC (rev 201684)
+++ trunk/LayoutTests/crypto/subtle/rsa-indexeddb.html	2016-06-04 20:59:57 UTC (rev 201685)
@@ -5,70 +5,7 @@
 <script src=""
 </head>
 <body>
-<script>
-
-description("Test storing a private RSA key in IndexedDB, and retrieving it.");
-
-jsTestIsAsync = true;
-
-var privateKeyJSON = {
-    kty: "RSA",
-    alg: "RS256",
-    n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLRracT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPSCnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq72KUp02mJDZiiyiglxML_i3-_CeecCw",
-    e: "AQAB",
-    d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238dsIWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_LwsrMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM3uoJghOMqGeocM0BpjdChHrPOlFvSQ",
-    p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVLviwposOnyyWqwM5AXp0",
-    q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2GZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV-cwzOPdcVAfVuZlxUMc",
-    dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiDHdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt6F_fxow4Kb2xonGT0GGk",
-    dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5x-r9KwBZFC4FCG2hg_zE",
-    qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf9-2QuKDoWeRdd7NsdxTk"
-};
-
-crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(privateKeyJSON)), null, true, ["sign", "verify"]).then(function(key) {
-    var openRequest = indexedDB.open("crypto_subtle");
-    openRequest._onupgradeneeded_ = function(event) {
-        var objectStore = event.target.result.createObjectStore("rsa-indexeddb");
-    }
-    openRequest._onerror_ = function(event) {
-        testFailed("Could not open database: " + event.target.error.name);
-        finishJSTest();
-    }
-    openRequest._onsuccess_ = function(event) {
-        db = event.target.result;
-        storeKey();
-    }
-
-    function storeKey() {
-        var objectStore = db.transaction("rsa-indexeddb", "readwrite").objectStore("rsa-indexeddb");
-        var req = objectStore.put(key, "mykey");
-        req._onerror_ = function(event) {
-            testFailed("Could not put a key into database: " + event.target.error.name);
-            finishJSTest();
-        }
-        req._onsuccess_ = function(event) { readKey(); }
-    }
-
-    function readKey() {
-        var objectStore = db.transaction("rsa-indexeddb").objectStore("rsa-indexeddb");
-        var req = objectStore.get("mykey");
-        req._onerror_ = function(event) {
-            testFailed("Could not get a key from database: " + event.target.error.name);
-            finishJSTest();
-        }
-        req._onsuccess_ = function(event) {
-            window.retrievedKey = event.target.result;
-            shouldBe("retrievedKey.type", "'private'");
-            shouldBe("retrievedKey.extractable", "true");
-            shouldBe("retrievedKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
-            shouldBe("retrievedKey.algorithm.modulusLength", "2048");
-            shouldBe("bytesToHexString(retrievedKey.algorithm.publicExponent)", "'010001'");
-            shouldBe("retrievedKey.usages", '["sign", "verify"]');
-
-            finishJSTest();
-        }
-    }
-});
-</script>
+<script src=""
 <script src=""
 </body>
 </html>
_______________________________________________
webkit-changes mailing list
[email protected]
https://lists.webkit.org/mailman/listinfo/webkit-changes

Reply via email to