blob: a496ff37b0f2c22faaf450b3b725b3225ca2a953 [file] [log] [blame]
<script>
var privateKeyJSON = {
kty: "RSA",
alg: "RS256",
n: "rcCUCv7Oc1HVam1DIhCzqknThWawOp8QLk8Ziy2p10ByjQFCajoFiyuAWl-R1WXZaf4xitLRracT9agpzIzc-MbLSHIGgWQGO21lGiImy5ftZ-D8bHAqRz2y15pzD4c4CEou7XSSLDoRnR0QG5MsDhD6s2gV9mwHkrtkCxtMWdBi-77as8wGmlNRldcOSgZDLK8UnCSgA1OguZ989bFyc8tOOEIb0xUSfPSz3LPSCnyYz68aDjmKVeNH-ig857OScyWbGyEy3Biw64qun3juUlNWsJ3zngkOdteYWytx5Qr4XKNs6R-Myyq72KUp02mJDZiiyiglxML_i3-_CeecCw",
e: "AQAB",
d: "eNLS37aCz7RXSNPD_DtLBJ6j5T8cSxdzRBCjPaI6WcGqJp16lq3UTwuoDLAqlA9oGYm238dsIWpuucP_lQtbWe-7SpxoI6_vmYGf7YVUHv1-DF9qiOmSrMmdxMnVOzYXY8RaT6thPjn_J5cfLV2xI_LwsrMtmpdSyNlgX0zTUhwtuahgAKMEChYjH2EnjHdHw6sY2-wApdcQI7ULE0oo5RzbQZpmuhcN9hiBc0L3hhF0qo50mbl02_65_GQ7DpVkXBxNgRBLzlPabmzzG2oAhfefLgYmSC1opaCkXE6vRWQNWNL45RZNZFYM3uoJghOMqGeocM0BpjdChHrPOlFvSQ",
p: "4miTuAjKMeH5uJ5KB397QUwhbkYEgSbcA2mifmSkvE2018gb55qkBHK1eVryf1_m43LNlc6O_ak6gfzdZIZvS5NCGjPl0q09plUpu8qFOSspBwA67qGH76lFlZLn_d4yglS7wfLru4_5Ys8qLLs-DqVLviwposOnyyWqwM5AXp0",
q: "xHYrzkivtmnz_sGchnWGc0q-pDOkKicptRpv2pMFIIXxnFX5aMeEXIZjVujXtwUy1UlFIN2GZJSvy5KJ79mu_XyNnFHMzedH-A3ee3u8h1UUrZF-vUu1_e4U_x67NN1dedzUSKynN7pFl3OkuShMBWGV-cwzOPdcVAfVuZlxUMc",
dp: "fBzDzYDUBmBQGop7Hn0dvf_T27V6RqpctWo074CQZcFbP2atFVtKSj3viWT3xid2VHzcgiDHdfpM3nEVlEO1wwIonGCSvdjGEOZiiFVOjrZAOVxA8guOjyyFvqbXke06VwPIIVvfKeSU2zuhbP__1tt6F_fxow4Kb2xonGT0GGk",
dq: "jmE2DiIPdhwDgLXAQpIaBqQ81bO3XfVT_LRULAwwwwlPuQV148H04zlh9TJ6Y2GZHYokV1U0eOBpJxfkb7dLYtpJpuiBjRf4yIUEoGlkkI_QlJnFSFr-YjGRdfNHqWBkxlSMZL770R9mIATndGkH7z5x-r9KwBZFC4FCG2hg_zE",
qi: "YCX_pLwbMBA1ThVH0WcwmnytqNcrMCEwTm7ByA2eU6nWbQrULvf7m9_kzfLUcjsnpAVlBQG5JMXMy0Sq4ptwbywsa5-G8KAOOOR2L3v4hC-Eys9ftgFM_3i0o40eeQH4b3haPbntrIeMg8IzlOuVYKf9-2QuKDoWeRdd7NsdxTk"
};
function asciiToUint8Array(str)
{
var chars = [];
for (var i = 0; i < str.length; ++i)
chars.push(str.charCodeAt(i));
return new Uint8Array(chars);
}
function bytesToHexString(bytes)
{
if (!bytes)
return null;
bytes = new Uint8Array(bytes);
var hexBytes = [];
for (var i = 0; i < bytes.length; ++i) {
var byteString = bytes[i].toString(16);
if (byteString.length < 2)
byteString = "0" + byteString;
hexBytes.push(byteString);
}
return hexBytes.join("");
}
crypto.subtle.importKey("jwk", privateKeyJSON, { name: 'RSASSA-PKCS1-v1_5', hash: "sha-256" }, true, ["sign"]).then(function(key) {
var openRequest = indexedDB.open("crypto_subtle");
openRequest.onupgradeneeded = function(event) {
var objectStore = event.target.result.createObjectStore("rsa-indexeddb");
}
openRequest.onerror = function(event) {
alert("Could not open database: " + event.target.error.name);
}
openRequest.onsuccess = function(event) {
db = event.target.result;
storeKey();
}
function storeKey() {
var objectStore = db.transaction("rsa-indexeddb", "readwrite").objectStore("rsa-indexeddb");
try {
var req = objectStore.put({ key: key }, "theKey");
req.onerror = function(event) {
alert('failed to store key');
}
req.onsuccess = function(event) {
alert('successfully stored key');
readKey();
}
} catch (e) {
alert(e.name);
}
}
function readKey() {
var objectStore = db.transaction("rsa-indexeddb").objectStore("rsa-indexeddb");
var req = objectStore.get("theKey");
req.onerror = function(event) {
alert('failed to read key');
}
req.onsuccess = function(event) {
window.retrievedKey = event.target.result.key;
if (retrievedKey.type != 'private')
return alert("retrievedKey.type != 'private': " + retrievedKey.type);
if (retrievedKey.extractable != true)
return alert("retrievedKey.extractable != true: " + retrievedKey.extractable);
if (retrievedKey.algorithm.name != 'RSASSA-PKCS1-v1_5')
return alert("retrievedKey.algorithm.name != 'RSASSA-PKCS1-v1_5': " + retrievedKey.algorithm.name);
if (retrievedKey.algorithm.modulusLength != 2048)
return alert("retrievedKey.algorithm.modulusLength != 2048: " + retrievedKey.algorithm.modulusLength);
if (bytesToHexString(retrievedKey.algorithm.publicExponent) != '010001')
return alert("bytesToHexString(retrievedKey.algorithm.publicExponent) != '010001': " + bytesToHexString(retrievedKey.algorithm.publicExponent));
if (retrievedKey.algorithm.hash.name != 'SHA-256')
return alert("retrievedKey.algorithm.hash.name != 'SHA-256': " + retrievedKey.algorithm.hash.name);
if (retrievedKey.usages.length != 1)
return alert("retrievedKey.usages.length != 1: " + retrievedKey.usages.length);
if (retrievedKey.usages[0] != 'sign')
return alert("retrievedKey.usages[0] != 'sign': " + retrievedKey.usages[0]);
alert('retrieved valid key');
}
}
});
</script>