mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-12 14:37:50 +00:00
67 lines
2.9 KiB
JavaScript
67 lines
2.9 KiB
JavaScript
Cu.import("resource://services-crypto/WeaveCrypto.js");
|
|
Cu.import("resource://services-sync/util.js");
|
|
|
|
let cryptoSvc = new WeaveCrypto();
|
|
|
|
function run_test() {
|
|
if (this.gczeal) {
|
|
_("Running deriveKey tests with gczeal(2).");
|
|
gczeal(2);
|
|
} else {
|
|
_("Running deriveKey tests with default gczeal.");
|
|
}
|
|
|
|
var iv = cryptoSvc.generateRandomIV();
|
|
var der_passphrase = "secret phrase";
|
|
var der_salt = "RE5YUHpQcGl3bg=="; // btoa("DNXPzPpiwn")
|
|
|
|
_("Testing deriveKeyFromPassphrase. Input is \"" + der_passphrase + "\", \"" + der_salt + "\" (base64-encoded).");
|
|
|
|
// Test friendly-ing.
|
|
do_check_eq("abcdefghijk8mn9pqrstuvwxyz234567",
|
|
Utils.base32ToFriendly("ABCDEFGHIJKLMNOPQRSTUVWXYZ234567"));
|
|
do_check_eq("ABCDEFGHIJKLMNOPQRSTUVWXYZ234567",
|
|
Utils.base32FromFriendly(
|
|
Utils.base32ToFriendly("ABCDEFGHIJKLMNOPQRSTUVWXYZ234567")));
|
|
|
|
// Test translation.
|
|
do_check_false(Utils.isPassphrase("o-5wmnu-o5tqc-7lz2h-amkbw-izqzi")); // Wrong charset.
|
|
do_check_false(Utils.isPassphrase("O-5WMNU-O5TQC-7LZ2H-AMKBW-IZQZI")); // Wrong charset.
|
|
do_check_true(Utils.isPassphrase("9-5wmnu-95tqc-78z2h-amkbw-izqzi"));
|
|
do_check_true(Utils.isPassphrase("9-5WMNU-95TQC-78Z2H-AMKBW-IZQZI")); // isPassphrase normalizes.
|
|
do_check_true(Utils.isPassphrase(
|
|
Utils.normalizePassphrase("9-5WMNU-95TQC-78Z2H-AMKBW-IZQZI")));
|
|
|
|
// Base64. We don't actually use this in anger, particularly not with a 32-byte key.
|
|
var der_key = Utils.deriveEncodedKeyFromPassphrase(der_passphrase, der_salt);
|
|
_("Derived key in base64: " + der_key);
|
|
do_check_eq(cryptoSvc.decrypt(cryptoSvc.encrypt("bacon", der_key, iv), der_key, iv), "bacon");
|
|
|
|
// Base64, 16-byte output.
|
|
var der_key = Utils.deriveEncodedKeyFromPassphrase(der_passphrase, der_salt, 16);
|
|
_("Derived key in base64: " + der_key);
|
|
do_check_eq("d2zG0d2cBfXnRwMUGyMwyg==", der_key);
|
|
do_check_eq(cryptoSvc.decrypt(cryptoSvc.encrypt("bacon", der_key, iv), der_key, iv), "bacon");
|
|
|
|
// Base32. Again, specify '16' to avoid it generating a 256-bit key string.
|
|
var b32key = Utils.derivePresentableKeyFromPassphrase(der_passphrase, der_salt, 16);
|
|
var hyphenated = Utils.hyphenatePassphrase(b32key);
|
|
do_check_true(Utils.isPassphrase(b32key));
|
|
|
|
_("Derived key in base32: " + b32key);
|
|
do_check_eq(b32key.length, 26);
|
|
do_check_eq(hyphenated.length, 31); // 1 char, plus 5 groups of 5, hyphenated = 5 + (5*5) + 1 = 31.
|
|
do_check_eq(hyphenated, "9-5wmnu-95tqc-78z2h-amkbw-izqzi");
|
|
|
|
if (this.gczeal)
|
|
gczeal(0);
|
|
|
|
// Test the equivalence of our NSS and JS versions.
|
|
// Will only work on FF4, of course.
|
|
// Note that we don't add gczeal here: the pure-JS implementation is
|
|
// astonishingly slow, and this check takes five minutes to run.
|
|
do_check_eq(
|
|
Utils.deriveEncodedKeyFromPassphrase(der_passphrase, der_salt, 16, false),
|
|
Utils.deriveEncodedKeyFromPassphrase(der_passphrase, der_salt, 16, true));
|
|
}
|