<!DOCTYPE html>
<html>

<head>
<title>WebCrypto Test Suite</title>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<link rel="stylesheet" href="./test_WebCrypto.css"/>
<script src="/tests/SimpleTest/SimpleTest.js"></script>

<!-- Utilities for manipulating ABVs -->
<script src="util.js"></script>

<!-- A simple wrapper around IndexedDB -->
<script src="simpledb.js"></script>

<!-- Test vectors drawn from the literature -->
<script src="./test-vectors.js"></script>

<!-- General testing framework -->
<script src="./test-array.js"></script>

<script>/*<![CDATA[*/
"use strict";

// -----------------------------------------------------------------------------
TestArray.addTest(
  "Generate an ECDSA key for named curve P-256",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-256" };
    crypto.subtle.generateKey(alg, false, ["sign", "verify"]).then(
      complete(that, function(x) {
        return exists(x.publicKey) &&
               (x.publicKey.algorithm.name == alg.name) &&
               (x.publicKey.algorithm.namedCurve == alg.namedCurve) &&
               (x.publicKey.type == "public") &&
               x.publicKey.extractable &&
               (x.publicKey.usages.length == 1) &&
               (x.publicKey.usages[0] == "verify") &&
               exists(x.privateKey) &&
               (x.privateKey.algorithm.name == alg.name) &&
               (x.privateKey.algorithm.namedCurve == alg.namedCurve) &&
               (x.privateKey.type == "private") &&
               !x.privateKey.extractable &&
               (x.privateKey.usages.length == 1) &&
               (x.privateKey.usages[0] == "sign")
      }),
      error(that)
    );
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "ECDSA JWK import and verify a known-good signature",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-521", hash: "SHA-512" };

    function doVerify(x) {
      return crypto.subtle.verify(alg, x, tv.ecdsa_verify.sig, tv.ecdsa_verify.data);
    }

    crypto.subtle.importKey("jwk", tv.ecdsa_verify.pub_jwk, alg, true, ["verify"])
      .then(doVerify)
      .then(complete(that, x => x), error(that))
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "ECDSA key generation with public key export",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-256", hash: "SHA-256" };
    var msg = Uint8Array.from([1]);

    crypto.subtle.generateKey(alg, false, ["sign", "verify"])
      .then(pair => Promise.all([
          crypto.subtle.sign(alg, pair.privateKey, msg),
          crypto.subtle.exportKey("spki", pair.publicKey)
            .then(spki => crypto.subtle.importKey("spki", spki, alg, false, ["verify"]))
      ]))
      .then(sigAndKey => crypto.subtle.verify(alg, sigAndKey[1], sigAndKey[0], msg))
      .then(complete(that, x => x), error(that))
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "ECDSA JWK import and reject a known-bad signature",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-256", hash: "SHA-256" };

    function doVerify(x) {
      return crypto.subtle.verify(alg, x, tv.ecdsa_verify.sig_tampered,
                                          tv.ecdsa_verify.data);
    }

    crypto.subtle.importKey("jwk", tv.ecdsa_verify.pub_jwk, alg, true, ["verify"])
      .then(doVerify)
      .then(complete(that, x => !x), error(that))
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "ECDSA sign/verify round-trip",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-521", hash: "SHA-512" };
    var pubKey;


    function doSign(keyPair) {
      pubKey = keyPair.publicKey;
      return crypto.subtle.sign(alg, keyPair.privateKey, tv.ecdsa_verify.data);
    }
    function doVerify(sig) {
      return crypto.subtle.verify(alg, pubKey, sig, tv.ecdsa_verify.data);
    }

    crypto.subtle.generateKey(alg, true, ["sign", "verify"])
      .then(doSign)
      .then(doVerify)
      .then(complete(that, x => x), error(that))
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "Verify that ECDSA import fails with a known-bad public key",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-256", hash: "SHA-256" };

    function doVerify(x) {
      return crypto.subtle.verify(alg, x, tv.ecdsa_verify.sig, tv.ecdsa_verify.data);
    }

    crypto.subtle.importKey("jwk", tv.ecdsa_bad.pub_jwk, alg, true, ["verify"])
      .then(error(that), complete(that))
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "Raw import/export of a public ECDSA key (P-521)",
  function () {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-521", hash: "SHA-512" };

    function doExport(x) {
      return crypto.subtle.exportKey("raw", x);
    }

    crypto.subtle.importKey("raw", tv.ecdsa_verify.raw, alg, true, ["verify"])
      .then(doExport)
      .then(memcmp_complete(that, tv.ecdsa_verify.raw), error(that));
  }
);

// -----------------------------------------------------------------------------
TestArray.addTest(
  "ECDSA raw import and verify a known-good signature",
  function() {
    var that = this;
    var alg = { name: "ECDSA", namedCurve: "P-521", hash: "SHA-512" };

    function doVerify(x) {
      return crypto.subtle.verify(alg, x, tv.ecdsa_verify.sig, tv.ecdsa_verify.data);
    }

    crypto.subtle.importKey("raw", tv.ecdsa_verify.raw, alg, true, ["verify"])
      .then(doVerify)
      .then(complete(that, x => x), error(that))
  }
);

/*]]>*/</script>
</head>

<body>

<div id="content">
        <div id="head">
                <b>Web</b>Crypto<br>
        </div>

    <div id="start" onclick="start();">RUN ALL</div>

    <div id="resultDiv" class="content">
    Summary:
    <span class="pass"><span id="passN">0</span> passed, </span>
    <span class="fail"><span id="failN">0</span> failed, </span>
    <span class="pending"><span id="pendingN">0</span> pending.</span>
    <br/>
    <br/>

    <table id="results">
        <tr>
            <th>Test</th>
            <th>Result</th>
            <th>Time</th>
        </tr>
    </table>

    </div>

    <div id="foot"></div>
</div>

</body>
</html>