summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html')
-rw-r--r--testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html138
1 files changed, 138 insertions, 0 deletions
diff --git a/testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html b/testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html
new file mode 100644
index 0000000000..4cda97e9b7
--- /dev/null
+++ b/testing/web-platform/tests/webrtc/RTCPeerConnection-generateCertificate.html
@@ -0,0 +1,138 @@
+<!doctype html>
+<meta charset="utf-8">
+<title>Test RTCPeerConnection.generateCertificate</title>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script>
+ 'use strict';
+
+ // Test is based on the following editor draft:
+ // https://w3c.github.io/webrtc-pc/archives/20170515/webrtc.html
+
+ /*
+ * 4.10. Certificate Management
+ * partial interface RTCPeerConnection {
+ * static Promise<RTCCertificate> generateCertificate(
+ * AlgorithmIdentifier keygenAlgorithm);
+ * };
+ *
+ * 4.10.2. RTCCertificate Interface
+ * interface RTCCertificate {
+ * readonly attribute DOMTimeStamp expires;
+ * ...
+ * };
+ *
+ * [WebCrypto]
+ * 11. Algorithm Dictionary
+ * typedef (object or DOMString) AlgorithmIdentifier;
+ */
+
+ /*
+ * 4.10. The following values must be supported by a user agent:
+ * { name: "RSASSA-PKCS1-v1_5", modulusLength: 2048,
+ * publicExponent: new Uint8Array([1, 0, 1]), hash: "SHA-256" },
+ * and { name: "ECDSA", namedCurve: "P-256" }.
+ */
+ promise_test(t =>
+ RTCPeerConnection.generateCertificate({
+ name: 'RSASSA-PKCS1-v1_5',
+ modulusLength: 2048,
+ publicExponent: new Uint8Array([1, 0, 1]),
+ hash: 'SHA-256'
+ }).then(cert => {
+ assert_true(cert instanceof RTCCertificate,
+ 'Expect cert to be instance of RTCCertificate');
+
+ assert_greater_than(cert.expires, Date.now(),
+ 'Expect generated certificate to expire reasonably long after current time');
+ }),
+ 'generateCertificate() with compulsary RSASSA-PKCS1-v1_5 parameters should succeed');
+
+ promise_test(t =>
+ RTCPeerConnection.generateCertificate({
+ name: 'ECDSA',
+ namedCurve: 'P-256'
+ }).then(cert => {
+ assert_true(cert instanceof RTCCertificate,
+ 'Expect cert to be instance of RTCCertificate');
+
+ assert_greater_than(cert.expires, Date.now(),
+ 'Expect generated certificate to expire reasonably long after current time');
+ }),
+ 'generateCertificate() with compulsary ECDSA parameters should succeed');
+
+ /*
+ * 4.10. A user agent must reject a call to generateCertificate() with a
+ * DOMException of type NotSupportedError if the keygenAlgorithm
+ * parameter identifies an algorithm that the user agent cannot or
+ * will not use to generate a certificate for RTCPeerConnection.
+ */
+ promise_test(t =>
+ promise_rejects_dom(t, 'NotSupportedError',
+ RTCPeerConnection.generateCertificate('invalid-algo')),
+ 'generateCertificate() with invalid string algorithm should reject with NotSupportedError');
+
+ promise_test(t =>
+ promise_rejects_dom(t, 'NotSupportedError',
+ RTCPeerConnection.generateCertificate({
+ name: 'invalid-algo'
+ })),
+ 'generateCertificate() with invalid algorithm dict should reject with NotSupportedError');
+
+ /*
+ * 4.10.1. Dictionary RTCCertificateExpiration
+ * dictionary RTCCertificateExpiration {
+ * [EnforceRange]
+ * DOMTimeStamp expires;
+ * };
+ *
+ * If this parameter is present it indicates the maximum time that
+ * the RTCCertificate is valid for relative to the current time.
+ *
+ * When generateCertificate is called with an object argument,
+ * the user agent attempts to convert the object into a
+ * RTCCertificateExpiration. If this is unsuccessful, immediately
+ * return a promise that is rejected with a newly created TypeError
+ * and abort processing.
+ */
+
+ promise_test(t => {
+ const start = Date.now();
+ return RTCPeerConnection.generateCertificate({
+ name: 'ECDSA',
+ namedCurve: 'P-256',
+ expires: 2000
+ }).then(cert => {
+ assert_approx_equals(cert.expires, start+2000, 1000);
+ })
+ }, 'generateCertificate() with valid expires parameter should succeed');
+
+ promise_test(t => {
+ return RTCPeerConnection.generateCertificate({
+ name: 'ECDSA',
+ namedCurve: 'P-256',
+ expires: 0
+ }).then(cert => {
+ assert_less_than_equal(cert.expires, Date.now());
+ })
+ }, 'generateCertificate() with 0 expires parameter should generate expired cert');
+
+ promise_test(t => {
+ return promise_rejects_js(t, TypeError,
+ RTCPeerConnection.generateCertificate({
+ name: 'ECDSA',
+ namedCurve: 'P-256',
+ expires: -1
+ }))
+ }, 'generateCertificate() with invalid range for expires should reject with TypeError');
+
+ promise_test(t => {
+ return promise_rejects_js(t, TypeError,
+ RTCPeerConnection.generateCertificate({
+ name: 'ECDSA',
+ namedCurve: 'P-256',
+ expires: 'invalid'
+ }))
+ }, 'generateCertificate() with invalid type for expires should reject with TypeError');
+
+</script>