2014-05-14 18:58:12 +00:00
|
|
|
/* vim: ts=4:sw=4
|
|
|
|
*
|
2014-05-04 06:34:13 +00:00
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
'use strict';
|
2014-11-08 01:55:33 +00:00
|
|
|
window.assert = chai.assert;
|
2014-07-26 05:37:47 +00:00
|
|
|
|
2014-11-06 22:16:54 +00:00
|
|
|
describe("Crypto", function() {
|
2014-10-26 03:45:21 +00:00
|
|
|
describe("Encrypt AES-CBC", function() {
|
|
|
|
it('works', function(done) {
|
|
|
|
var key = hexToArrayBuffer('603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4');
|
|
|
|
var iv = hexToArrayBuffer('000102030405060708090a0b0c0d0e0f');
|
|
|
|
var plaintext = hexToArrayBuffer('6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710');
|
|
|
|
var ciphertext = hexToArrayBuffer('f58c4c04d6e5f1ba779eabfb5f7bfbd69cfc4e967edb808d679f777bc6702c7d39f23369a9d9bacfa530e26304231461b2eb05e2c39be9fcda6c19078c6a9d1b3f461796d6b0d6b2e0c2a72b4d80e644');
|
2014-11-04 22:59:48 +00:00
|
|
|
window.textsecure.crypto.encrypt(key, plaintext, iv).then(function(result) {
|
2014-10-27 03:02:11 +00:00
|
|
|
assert.strictEqual(getString(result), getString(ciphertext));
|
|
|
|
}).then(done).catch(done);
|
2014-10-26 03:45:21 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2014-07-26 03:59:46 +00:00
|
|
|
describe("Decrypt AES-CBC", function() {
|
|
|
|
it('works', function(done) {
|
|
|
|
var key = hexToArrayBuffer('603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4');
|
|
|
|
var iv = hexToArrayBuffer('000102030405060708090a0b0c0d0e0f');
|
|
|
|
var plaintext = hexToArrayBuffer('6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710');
|
|
|
|
var ciphertext = hexToArrayBuffer('f58c4c04d6e5f1ba779eabfb5f7bfbd69cfc4e967edb808d679f777bc6702c7d39f23369a9d9bacfa530e26304231461b2eb05e2c39be9fcda6c19078c6a9d1b3f461796d6b0d6b2e0c2a72b4d80e644');
|
2014-11-04 22:59:48 +00:00
|
|
|
window.textsecure.crypto.decrypt(key, ciphertext, iv).then(function(result) {
|
2014-10-27 03:02:11 +00:00
|
|
|
assert.strictEqual(getString(result), getString(plaintext));
|
|
|
|
}).then(done).catch(done);
|
2014-07-26 03:59:46 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("HMAC SHA-256", function() {
|
|
|
|
it("works", function(done) {
|
|
|
|
var key = hexToArrayBuffer('6f35628d65813435534b5d67fbdb54cb33403d04e843103e6399f806cb5df95febbdd61236f33245');
|
|
|
|
var input = hexToArrayBuffer('752cff52e4b90768558e5369e75d97c69643509a5e5904e0a386cbe4d0970ef73f918f675945a9aefe26daea27587e8dc909dd56fd0468805f834039b345f855cfe19c44b55af241fff3ffcd8045cd5c288e6c4e284c3720570b58e4d47b8feeedc52fd1401f698a209fccfa3b4c0d9a797b046a2759f82a54c41ccd7b5f592b');
|
|
|
|
var mac = getString(hexToArrayBuffer('05d1243e6465ed9620c9aec1c351a186'));
|
2014-11-04 22:59:48 +00:00
|
|
|
window.textsecure.crypto.sign(key, input).then(function(result) {
|
2014-10-27 03:02:11 +00:00
|
|
|
assert.strictEqual(getString(result).substring(0, mac.length), mac);
|
|
|
|
}).then(done).catch(done);
|
2014-07-26 03:59:46 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
describe("HMAC RFC5869 Test vectors", function() {
|
|
|
|
it('works', function(done) {
|
|
|
|
var IKM = new Uint8Array(new ArrayBuffer(22));
|
|
|
|
for (var i = 0; i < 22; i++)
|
|
|
|
IKM[i] = 11;
|
|
|
|
|
|
|
|
var salt = new Uint8Array(new ArrayBuffer(13));
|
|
|
|
for (var i = 0; i < 13; i++)
|
|
|
|
salt[i] = i;
|
|
|
|
|
|
|
|
var info = new Uint8Array(new ArrayBuffer(10));
|
|
|
|
for (var i = 0; i < 10; i++)
|
|
|
|
info[i] = 240 + i;
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.HKDF(IKM.buffer, salt.buffer, info.buffer).then(function(OKM){
|
2014-07-26 03:59:46 +00:00
|
|
|
var T1 = hexToArrayBuffer("3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf");
|
|
|
|
var T2 = hexToArrayBuffer("34007208d5b887185865");
|
|
|
|
assert.equal(getString(OKM[0]), getString(T1));
|
|
|
|
assert.equal(getString(OKM[1]).substring(0, 10), getString(T2));
|
2014-07-27 06:05:25 +00:00
|
|
|
}).then(done).catch(done);
|
2014-07-26 03:59:46 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
2014-11-06 22:16:54 +00:00
|
|
|
describe("Curve25519 implementation", function() {
|
2014-07-26 03:59:46 +00:00
|
|
|
// this is a just cute little trick to get a nice-looking note about
|
|
|
|
// which curve25519 impl we're using.
|
2014-11-04 22:59:48 +00:00
|
|
|
if (window.textsecure.NATIVE_CLIENT) {
|
2014-11-06 22:16:54 +00:00
|
|
|
it("is Native Client", function() {});
|
2014-07-26 03:59:46 +00:00
|
|
|
} else {
|
2014-11-06 22:16:54 +00:00
|
|
|
it("is JavaScript", function() {});
|
2014-07-26 03:59:46 +00:00
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("Simple Curve25519 test vectors", function() {
|
|
|
|
it('works', function(done) {
|
2014-07-27 06:05:25 +00:00
|
|
|
return textsecure.registerOnLoadFunction(function() {
|
2014-07-26 03:59:46 +00:00
|
|
|
// These are just some random curve25519 test vectors I found online (with a version byte prepended to pubkeys)
|
|
|
|
var alice_priv = hexToArrayBuffer("77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a");
|
|
|
|
var alice_pub = hexToArrayBuffer("058520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98eaa9b4e6a");
|
|
|
|
var bob_priv = hexToArrayBuffer("5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb");
|
|
|
|
var bob_pub = hexToArrayBuffer("05de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f");
|
|
|
|
var shared_sec = hexToArrayBuffer("4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742");
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.createKeyPair(alice_priv).then(function(aliceKeyPair) {
|
2014-07-26 03:59:46 +00:00
|
|
|
var target = new Uint8Array(alice_priv.slice(0));
|
|
|
|
target[0] &= 248;
|
|
|
|
target[31] &= 127;
|
|
|
|
target[31] |= 64;
|
2014-11-04 22:59:48 +00:00
|
|
|
assert.equal(getString(aliceKeyPair.pubKey), getString(alice_pub));
|
2014-07-26 03:59:46 +00:00
|
|
|
assert.equal(getString(aliceKeyPair.privKey), getString(target));
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.createKeyPair(bob_priv).then(function(bobKeyPair) {
|
2014-07-26 03:59:46 +00:00
|
|
|
var target = new Uint8Array(bob_priv.slice(0));
|
|
|
|
target[0] &= 248;
|
|
|
|
target[31] &= 127;
|
|
|
|
target[31] |= 64;
|
|
|
|
assert.equal(getString(bobKeyPair.privKey), getString(target));
|
|
|
|
assert.equal(getString(bobKeyPair.pubKey), getString(bob_pub));
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.ECDHE(bobKeyPair.pubKey, aliceKeyPair.privKey).then(function(ss) {
|
2014-07-26 03:59:46 +00:00
|
|
|
assert.equal(getString(ss), getString(shared_sec));
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.ECDHE(aliceKeyPair.pubKey, bobKeyPair.privKey).then(function(ss) {
|
2014-07-26 03:59:46 +00:00
|
|
|
assert.equal(getString(ss), getString(shared_sec));
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
2014-07-27 06:05:25 +00:00
|
|
|
}).then(done).catch(done);
|
2014-07-26 03:59:46 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("Simple Ed25519 tests", function() {
|
|
|
|
it('works', function(done) {
|
2014-07-27 06:05:25 +00:00
|
|
|
return textsecure.registerOnLoadFunction(function() {
|
2014-07-26 03:59:46 +00:00
|
|
|
// Some self-generated test vectors
|
|
|
|
var priv = hexToArrayBuffer("48a8892cc4e49124b7b57d94fa15becfce071830d6449004685e387c62409973");
|
|
|
|
var pub = hexToArrayBuffer("0555f1bfede27b6a03e0dd389478ffb01462e5c52dbbac32cf870f00af1ed9af3a");
|
|
|
|
var msg = hexToArrayBuffer("617364666173646661736466");
|
|
|
|
var sig = hexToArrayBuffer("2bc06c745acb8bae10fbc607ee306084d0c28e2b3bb819133392473431291fd0"+
|
|
|
|
"dfa9c7f11479996cf520730d2901267387e08d85bbf2af941590e3035a545285");
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.createKeyPair(priv).then(function(pubCalc) {
|
2014-07-26 03:59:46 +00:00
|
|
|
//if (getString(pub) != getString(pubCalc))
|
|
|
|
// return false;
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.Ed25519Sign(priv, msg).then(function(sigCalc) {
|
2014-07-26 03:59:46 +00:00
|
|
|
assert.equal(getString(sig), getString(sigCalc));
|
|
|
|
|
2014-11-04 22:59:48 +00:00
|
|
|
return textsecure.crypto.Ed25519Verify(pub, msg, sig);
|
2014-07-26 03:59:46 +00:00
|
|
|
});
|
|
|
|
});
|
2014-07-27 06:05:25 +00:00
|
|
|
}).then(done).catch(done);
|
2014-07-26 03:59:46 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|