/* vim: ts=4:sw=4
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program. If not, see
' + funcName + ' called back multiple times
'); else if (error !== undefined) { console.log(error.stack); testsdiv.append('' + funcName + ' threw ' + error + '
'); } else if (result === true) testsdiv.append('' + funcName + ' passed
'); else testsdiv.append('' + funcName + ' returned ' + result + '
'); delete testsOutstanding[testIndex]; if (exclusive) { exclusiveRunning = -1; localStorage.clear(); if (exclusiveIndex != -1) delete exclusiveTestsWaiting[exclusiveIndex]; startNextExclusiveTest(); } } var runFunc = function() { if (exclusive) { exclusiveRunning = testIndex; localStorage.clear(); } try { testsOutstanding[testIndex] = funcName; func().then(resolve).catch(function(e) { resolve(null, e); }); } catch (e) { resolve(null, e); } } if (!exclusive || exclusiveRunning == -1) runFunc(); else exclusiveTestsWaiting[exclusiveIndex] = runFunc; } function hexToArrayBuffer(str) { var ret = new ArrayBuffer(str.length / 2); var array = new Uint8Array(ret); for (var i = 0; i < str.length/2; i++) array[i] = parseInt(str.substr(i*2, 2), 16); return ret; } textsecure.registerOnLoadFunction(function() { localStorage.clear(); TEST(function() { var b = new ArrayBuffer(3); var a = new Uint8Array(b); a[0] = 0; a[1] = 255; a[2] = 128; return Promise.resolve(getString(b) == "\x00\xff\x80"); }, "ArrayBuffer->String conversion"); // Basic sanity-checks on the crypto library TEST(function() { var PushMessageProto = dcodeIO.ProtoBuf.loadProtoFile("protos/IncomingPushMessageSignal.proto").build("textsecure.PushMessageContent"); var IncomingMessageProto = dcodeIO.ProtoBuf.loadProtoFile("protos/IncomingPushMessageSignal.proto").build("textsecure.IncomingPushMessageSignal"); var text_message = new PushMessageProto(); text_message.body = "Hi Mom"; var server_message = {type: 0, // unencrypted source: "+19999999999", timestamp: 42, message: text_message.encode() }; return textsecure.crypto.handleIncomingPushMessageProto(server_message).then(function(message) { return (message.message.body == text_message.body && message.message.attachments.length == text_message.attachments.length && text_message.attachments.length == 0); }); }, 'Unencrypted PushMessageProto "decrypt"', true); TEST(function() { return textsecure.crypto.generateKeys().then(function() { if (textsecure.storage.getEncrypted("25519KeyidentityKey") === undefined) return false; if (textsecure.storage.getEncrypted("25519KeypreKey16777215") === undefined) return false; for (var i = 0; i < 100; i++) if (textsecure.storage.getEncrypted("25519KeypreKey" + i) === undefined) return false; return true; }); }, "Test Identity/Pre Key Creation", true); TEST(function() { // These are just some random curve25519 test vectors I found online (with a version byte prepended to pubkeys) var alice_priv = hexToArrayBuffer("77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a"); var alice_pub = hexToArrayBuffer("058520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98eaa9b4e6a"); var bob_priv = hexToArrayBuffer("5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb"); var bob_pub = hexToArrayBuffer("05de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f"); var shared_sec = hexToArrayBuffer("4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742"); return textsecure.crypto.testing_only.privToPub(alice_priv, true).then(function(aliceKeyPair) { var target = new Uint8Array(alice_priv.slice(0)); target[0] &= 248; target[31] &= 127; target[31] |= 64; if (String.fromCharCode.apply(null, new Uint8Array(aliceKeyPair.privKey)) != String.fromCharCode.apply(null, target)) return false; return textsecure.crypto.testing_only.privToPub(bob_priv, true).then(function(bobKeyPair) { var target = new Uint8Array(bob_priv.slice(0)); target[0] &= 248; target[31] &= 127; target[31] |= 64; if (String.fromCharCode.apply(null, new Uint8Array(bobKeyPair.privKey)) != String.fromCharCode.apply(null, target)) return false; if (String.fromCharCode.apply(null, new Uint8Array(aliceKeyPair.pubKey)) != String.fromCharCode.apply(null, new Uint8Array(alice_pub))) return false; if (String.fromCharCode.apply(null, new Uint8Array(bobKeyPair.pubKey)) != String.fromCharCode.apply(null, new Uint8Array(bob_pub))) return false; return textsecure.crypto.testing_only.ECDHE(bobKeyPair.pubKey, aliceKeyPair.privKey).then(function(ss) { if (String.fromCharCode.apply(null, new Uint16Array(ss)) != String.fromCharCode.apply(null, new Uint16Array(shared_sec))) return false; return textsecure.crypto.testing_only.ECDHE(aliceKeyPair.pubKey, bobKeyPair.privKey).then(function(ss) { if (String.fromCharCode.apply(null, new Uint16Array(ss)) != String.fromCharCode.apply(null, new Uint16Array(shared_sec))) return false; else return true; }); }); }); }); }, "Simple Curve25519 test vector"); // TextSecure implements a slightly tweaked version of RFC 5869 and thus this test fails // If you tweak the HKDF as noted in the comment there, this test passes /*TEST(function() { var IKM = new Uint8Array(new ArrayBuffer(22)); for (var i = 0; i < 22; i++) IKM[i] = 11; var salt = new Uint8Array(new ArrayBuffer(13)); for (var i = 0; i < 13; i++) salt[i] = i; var info = new Uint8Array(new ArrayBuffer(10)); for (var i = 0; i < 10; i++) info[i] = 240 + i; return textsecure.crypto.testing_only.HKDF(IKM, salt, info).then(function(OKM){ var T1 = hexToArrayBuffer("3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf"); var T2 = hexToArrayBuffer("34007208d5b887185865"); return (getString(OKM[0]) == getString(T1) && getString(OKM[1]).substring(0, 10) == getString(T2)); }); }, "HMAC RFC5869 Test vectors");*/ var axolotlTwoPartyTestVectorsAlice = [ ["sendMessage", { smsText: "A ", ourBaseKey: hexToArrayBuffer('192b4892aa2e4cff1293999dc7c367874456c4d920aae7d9d42e5e62c965546c'), ourEphemeralKey: hexToArrayBuffer('f12704787bab04a3cf544ebd9d421b6fe36147519eb5afa7c90e3fb67c141e64'), ourIdentityKey: hexToArrayBuffer('a05fd14abb42ff393004eee526e3167441ee51021c6d801b784720c15637747c'), theirPreKey: hexToArrayBuffer('05fee424a5b6ccb717d85ef2207e2057ab1144c40afe89cdc80e9c424dd90c146e'), theirPreKeyId: 13845842, registrationId: 11593, theirIdentityKey: hexToArrayBuffer('05276e4df34557386f67df38b708eeddb1a8924e0428b9eefdc9213c3e8927cc7d'), //expectedPlaintext: hexToArrayBuffer('0a0e4120202020202020202020202020'), //expectedCounter: 0, expectedCiphertext: hexToArrayBuffer('2208d28acd061221059ab4e844771bfeb96382edac5f80e757a1109b5611c770b2ba9f28b363d7c2541a2105bd61aea7fa5304f4dc914892bc3795812cda8bb90b73de9920e22c609cf0ec4e2242220a21058c0c357a3a25e6da46b0186d93fec31d5b86a4ac4973742012d8e9de2346be161000180022104bd27ab87ee151d71cdfe89828050ef4b05bddfb56da491728c95a'), }], ["sendMessage", { smsText: "B ", //expectedPlaintext: hexToArrayBuffer('0a0e4220202020202020202020202020'), //expectedCounter: 1, expectedCiphertext: hexToArrayBuffer('2208d28acd061221059ab4e844771bfeb96382edac5f80e757a1109b5611c770b2ba9f28b363d7c2541a2105bd61aea7fa5304f4dc914892bc3795812cda8bb90b73de9920e22c609cf0ec4e2242220a21058c0c357a3a25e6da46b0186d93fec31d5b86a4ac4973742012d8e9de2346be16100118002210b40da85e4998984b4bac1748045b3661f46657badd576b4128c95a'), }], ["receiveMessage", { message: hexToArrayBuffer('220a2105edf6feeea8ee95f4b227453d5942d15731cb7a962eff6d04706860a4d577476f100018ffffffff0f22032a53da435b5477336965c6'), type: 1, newEphemeralKey: hexToArrayBuffer('a92a28cf21fb48745ebf68b425a1811476fed69f8623ff5941fd4e547ee4027c'), //expectedPlaintext: hexToArrayBuffer(''), expectedSmsText: "C", }], ["receiveMessage", { message: hexToArrayBuffer('220a2105edf6feeea8ee95f4b227453d5942d15731cb7a962eff6d04706860a4d577476f100118ffffffff0f2203a439d199228e124820c28b'), type: 1, //expectedPlaintext: hexToArrayBuffer(''), expectedSmsText: "D", }], ["sendMessage", { smsText: "E", //expectedPlaintext: hexToArrayBuffer('0a0145'), //expectedCounter: 0, expectedCiphertext: hexToArrayBuffer('220a2105f94173eeb7ff19ab9196461d596324385611fadef0ca29592cc182d92eb653281000180122031b67b3e2c43b9a672c9cb0'), }], ]; var axolotlTwoPartyTestVectorsBob = [ ["receiveMessage", { message: hexToArrayBuffer('2208d28acd061221059ab4e844771bfeb96382edac5f80e757a1109b5611c770b2ba9f28b363d7c2541a2105bd61aea7fa5304f4dc914892bc3795812cda8bb90b73de9920e22c609cf0ec4e2242220a21058c0c357a3a25e6da46b0186d93fec31d5b86a4ac4973742012d8e9de2346be161000180022104bd27ab87ee151d71cdfe89828050ef4b05bddfb56da491728c95a'), type: 3, ourPreKey: hexToArrayBuffer('799706c9a19c663b6970690beccb5ffdc55b9f592f1dcbcd954f3662842c076b'), preKeyId: 13845842, ourIdentityKey: hexToArrayBuffer('5024f863ed4a17505a5588cb464aa3cb349201f786e6f871a22cbed1ea6dd97c'), newEphemeralKey: hexToArrayBuffer('d1d52b5a4403c32e81bc242b10502ad222ed47af16ba6548496217416c934252'), //expectedPlaintext: hexToArrayBuffer(''), expectedSmsText: "A ", }], ["receiveMessage", { message: hexToArrayBuffer('2208d28acd061221059ab4e844771bfeb96382edac5f80e757a1109b5611c770b2ba9f28b363d7c2541a2105bd61aea7fa5304f4dc914892bc3795812cda8bb90b73de9920e22c609cf0ec4e2242220a21058c0c357a3a25e6da46b0186d93fec31d5b86a4ac4973742012d8e9de2346be16100118002210b40da85e4998984b4bac1748045b3661f46657badd576b4128c95a'), type: 3, //expectedPlaintext: hexToArrayBuffer(''), expectedSmsText: "B ", }], ["sendMessage", { smsText: "C", //expectedPlaintext: hexToArrayBuffer('0a0143'), //expectedCounter: 0, expectedCiphertext: hexToArrayBuffer('220a2105edf6feeea8ee95f4b227453d5942d15731cb7a962eff6d04706860a4d577476f100018ffffffff0f22032a53da435b5477336965c6'), }], ["sendMessage", { smsText: "D", //expectedPlaintext: hexToArrayBuffer('0a0144'), //expectedCounter: 1, expectedCiphertext: hexToArrayBuffer('220a2105edf6feeea8ee95f4b227453d5942d15731cb7a962eff6d04706860a4d577476f100118ffffffff0f2203a439d199228e124820c28b'), }], ["receiveMessage", { message: hexToArrayBuffer('220a2105f94173eeb7ff19ab9196461d596324385611fadef0ca29592cc182d92eb653281000180122031b67b3e2c43b9a672c9cb0'), type: 1, newEphemeralKey: hexToArrayBuffer('c1ad88addc5a74b0028e669c70d2860dfdd315af542ebd7394921d91f5cd5558'), expectedSmsText: "E", }], ]; var axolotlTestVectors = function(v, remoteDevice) { var origCreateNewKeyPair = textsecure.crypto.testing_only.createNewKeyPair; var doStep; var stepDone; stepDone = function(res) { if (!res || privKeyQueue.length != 0) { textsecure.crypto.testing_only.createNewKeyPair = origCreateNewKeyPair; return false; } else if (step == v.length) { textsecure.crypto.testing_only.createNewKeyPair = origCreateNewKeyPair; return true; } else return doStep().then(stepDone); } var privKeyQueue = []; textsecure.crypto.testing_only.createNewKeyPair = function(isIdentity) { if (privKeyQueue.length == 0 || isIdentity) throw new Error('Out of private keys'); else { var privKey = privKeyQueue.shift(); return textsecure.crypto.testing_only.privToPub(privKey, false).then(function(keyPair) { var a = btoa(getString(keyPair.privKey)); var b = btoa(getString(privKey)); if (getString(keyPair.privKey) != getString(privKey)) throw new Error('Failed to rederive private key!'); else return keyPair; }); } } var step = 0; var doStep = function() { var data = v[step][1]; switch(v[step++][0]) { case "receiveMessage": var postLocalKeySetup = function() { if (data.newEphemeralKey !== undefined) privKeyQueue.push(data.newEphemeralKey); var message = new textsecure.protos.IncomingPushMessageProtobuf(); message.type = data.type; message.source = remoteDevice.encodedNumber; message.message = data.message; return textsecure.crypto.handleIncomingPushMessageProto(textsecure.protos.decodeIncomingPushMessageProtobuf(getString(message.encode()))).then(function(res) { return res.message.body == data.expectedSmsText; }); } if (data.ourIdentityKey !== undefined) return textsecure.crypto.testing_only.privToPub(data.ourIdentityKey, true).then(function(keyPair) { textsecure.storage.putEncrypted("25519KeyidentityKey", keyPair); return textsecure.crypto.testing_only.privToPub(data.ourPreKey, false).then(function(keyPair) { textsecure.storage.putEncrypted("25519KeypreKey" + data.preKeyId, keyPair); return postLocalKeySetup(); }); }); else return postLocalKeySetup(); case "sendMessage": var postLocalKeySetup = function() { if (data.theirIdentityKey !== undefined) remoteDevice.identityKey = data.theirIdentityKey; if (data.theirPreKey !== undefined) { remoteDevice.publicKey = data.theirPreKey; remoteDevice.preKeyId = data.theirPreKeyId; textsecure.storage.putUnencrypted("registrationId", data.registrationId); } var message = new PushMessageContentProtobuf(); message.body = data.smsText; return textsecure.crypto.encryptMessageFor(remoteDevice, message).then(function(res) { //XXX: This should be all we do: stepDone(getString(data.expectedCiphertext) == getString(res.body)); if (res.type == 1) { //XXX: This should be used for everything... var expectedString = getString(data.expectedCiphertext); var decoded = textsecure.protos.decodeWhisperMessageProtobuf(expectedString.substring(1, expectedString.length - 8)); var result = getString(res.body); return getString(decoded.encode()) == result.substring(1, result.length - 8); } else { var decoded = textsecure.protos.decodePreKeyWhisperMessageProtobuf(getString(data.expectedCiphertext).substr(1)); var result = getString(res.body).substring(1); return getString(decoded.encode()) == result; } }); } if (data.ourBaseKey !== undefined) privKeyQueue.push(data.ourBaseKey); if (data.ourEphemeralKey !== undefined) privKeyQueue.push(data.ourEphemeralKey); if (data.ourIdentityKey !== undefined) return textsecure.crypto.testing_only.privToPub(data.ourIdentityKey, true).then(function(keyPair) { textsecure.storage.putEncrypted("25519KeyidentityKey", keyPair); return postLocalKeySetup(); }); else return postLocalKeySetup(); default: return Promise.resolve(false); } } return doStep().then(stepDone); } TEST(function() { return axolotlTestVectors(axolotlTwoPartyTestVectorsAlice, { encodedNumber: "BOB" }); }, "Standard Axolotl Test Vectors as Alice", true); TEST(function() { var t = axolotlTwoPartyTestVectorsAlice[2][1]; axolotlTwoPartyTestVectorsAlice[2][1] = axolotlTwoPartyTestVectorsAlice[3][1]; axolotlTwoPartyTestVectorsAlice[2][1].newEphemeralKey = t.newEphemeralKey; axolotlTwoPartyTestVectorsAlice[3][1] = t; delete axolotlTwoPartyTestVectorsAlice[3][1]['newEphemeralKey']; return axolotlTestVectors(axolotlTwoPartyTestVectorsAlice, { encodedNumber: "BOB" }); }, "Shuffled Axolotl Test Vectors as Alice", true); TEST(function() { return axolotlTestVectors(axolotlTwoPartyTestVectorsBob, { encodedNumber: "ALICE" }); }, "Standard Axolotl Test Vectors as Bob", true); TEST(function() { // Copy axolotlTwoPartyTestVectorsBob into v var orig = axolotlTwoPartyTestVectorsBob; var v = []; for (var i = 0; i < axolotlTwoPartyTestVectorsBob.length; i++) { v[i] = []; v[i][0] = orig[i][0]; v[i][1] = orig[i][1]; } // Swap first and second received prekey messages v[0][1] = { message: orig[1][1].message, type: orig[1][1].type, expectedSmsText: orig[1][1].expectedSmsText }; v[0][1].ourPreKey = orig[0][1].ourPreKey; v[0][1].preKeyId = orig[0][1].preKeyId; v[0][1].registrationId = orig[0][1].registrationId; v[0][1].ourIdentityKey = orig[0][1].ourIdentityKey; v[0][1].newEphemeralKey = orig[0][1].newEphemeralKey; v[1][1] = { message: orig[0][1].message, type: orig[0][1].type, expectedSmsText: orig[0][1].expectedSmsText }; return axolotlTestVectors(v, { encodedNumber: "ALICE" }); }, "Shuffled Axolotl Test Vectors as Bob I", true); TEST(function() { // Copy axolotlTwoPartyTestVectorsBob into v var orig = axolotlTwoPartyTestVectorsBob; var v = []; for (var i = 0; i < axolotlTwoPartyTestVectorsBob.length; i++) { v[i] = []; v[i][0] = orig[i][0]; v[i][1] = orig[i][1]; } // Swap second received prekey msg with the first send v[1] = orig[2]; v[2] = orig[1]; return axolotlTestVectors(v, { encodedNumber: "ALICE" }); }, "Shuffled Axolotl Test Vectors as Bob II", true); TEST(function() { // Copy axolotlTwoPartyTestVectorsBob into v var orig = axolotlTwoPartyTestVectorsBob; var v = []; for (var i = 0; i < axolotlTwoPartyTestVectorsBob.length; i++) { v[i] = []; v[i][0] = orig[i][0]; v[i][1] = orig[i][1]; } // Move second received prekey msg to the end (incl after the first received message in the second chain) v[4] = orig[1]; v[1] = orig[2]; v[2] = orig[3]; v[3] = orig[4]; return axolotlTestVectors(v, { encodedNumber: "ALICE" }); }, "Shuffled Axolotl Test Vectors as Bob III", true); TEST(function() { // Copy axolotlTwoPartyTestVectorsBob into v var orig = axolotlTwoPartyTestVectorsBob; var v = []; for (var i = 0; i < axolotlTwoPartyTestVectorsBob.length; i++) { v[i] = []; v[i][0] = orig[i][0]; v[i][1] = orig[i][1]; } // Move first received prekey msg to the end (incl after the first received message in the second chain) // ... by first swapping first and second received prekey msg v[0][1] = { message: orig[1][1].message, type: orig[1][1].type, expectedSmsText: orig[1][1].expectedSmsText }; v[0][1].ourPreKey = orig[0][1].ourPreKey; v[0][1].preKeyId = orig[0][1].preKeyId; v[0][1].registrationId = orig[0][1].registrationId; v[0][1].ourIdentityKey = orig[0][1].ourIdentityKey; v[0][1].newEphemeralKey = orig[0][1].newEphemeralKey; v[1][1] = { message: orig[0][1].message, type: orig[0][1].type, expectedSmsText: orig[0][1].expectedSmsText }; // ... then moving the (now-second) message to the end v[4] = v[1]; v[1] = orig[2]; v[2] = orig[3]; v[3] = orig[4]; return axolotlTestVectors(v, { encodedNumber: "ALICE" }); }, "Shuffled Axolotl Test Vectors as Bob IV", true); TEST(function() { var key = hexToArrayBuffer('6f35628d65813435534b5d67fbdb54cb33403d04e843103e6399f806cb5df95febbdd61236f33245'); var input = hexToArrayBuffer('752cff52e4b90768558e5369e75d97c69643509a5e5904e0a386cbe4d0970ef73f918f675945a9aefe26daea27587e8dc909dd56fd0468805f834039b345f855cfe19c44b55af241fff3ffcd8045cd5c288e6c4e284c3720570b58e4d47b8feeedc52fd1401f698a209fccfa3b4c0d9a797b046a2759f82a54c41ccd7b5f592b'); var mac = getString(hexToArrayBuffer('05d1243e6465ed9620c9aec1c351a186')); return window.crypto.subtle.sign({name: "HMAC", hash: "SHA-256"}, key, input).then(function(result) { return getString(result).substring(0, mac.length) === mac; }); }, "HMAC SHA-256", false); TEST(function() { var key = hexToArrayBuffer('2b7e151628aed2a6abf7158809cf4f3c'); var counter = hexToArrayBuffer('f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff'); var plaintext = hexToArrayBuffer('6bc1bee22e409f96e93d7e117393172a'); var ciphertext = hexToArrayBuffer('874d6191b620e3261bef6864990db6ce'); return window.crypto.subtle.encrypt({name: "AES-CTR", counter: counter}, key, plaintext).then(function(result) { return getString(result) === getString(ciphertext); }); }, "Encrypt AES-CTR", false); TEST(function() { var key = hexToArrayBuffer('2b7e151628aed2a6abf7158809cf4f3c'); var counter = hexToArrayBuffer('f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff'); var plaintext = hexToArrayBuffer('6bc1bee22e409f96e93d7e117393172a'); var ciphertext = hexToArrayBuffer('874d6191b620e3261bef6864990db6ce'); return window.crypto.subtle.decrypt({name: "AES-CTR", counter: counter}, key, ciphertext).then(function(result) { return getString(result) === getString(plaintext); }); }, "Decrypt AES-CTR", false); TEST(function() { var key = hexToArrayBuffer('603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4'); var iv = hexToArrayBuffer('000102030405060708090a0b0c0d0e0f'); var plaintext = hexToArrayBuffer('6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710'); var ciphertext = hexToArrayBuffer('f58c4c04d6e5f1ba779eabfb5f7bfbd69cfc4e967edb808d679f777bc6702c7d39f23369a9d9bacfa530e26304231461b2eb05e2c39be9fcda6c19078c6a9d1b3f461796d6b0d6b2e0c2a72b4d80e644'); return window.crypto.subtle.decrypt({name: "AES-CBC", iv: iv}, key, ciphertext).then(function(result) { return getString(result) === getString(plaintext); }); }, "Decrypt AES-CBC", false); // Setup test timeouts (note that this will only work if things are actually // being run async, ie in the case of NaCL) window.setInterval(function() { for (var i = 0; i < maxTestId; i++) { if (testsOutstanding[i] !== undefined) { testsdiv.append('' + testsOutstanding[i] + ' timed out
'); if (exclusiveRunning == i) { testsdiv.append('WARNING: exclusive test left running, further results may be unreliable.
'); delete exclusiveTestsWaiting[i]; } } delete testsOutstanding[i]; } startNextExclusiveTest(); localStorage.clear(); }, 10000); });