fune/services/fxaccounts/tests/xpcshell/test_credentials.js
Cristian Tuns b3bf09cc0d Backed out 6 changesets (bug 1816934, bug 1817182, bug 1817179, bug 1817183) for causing dt failures in browser_jsterm_autocomplete_null.js CLOSED TREE
Backed out changeset 17d4c013ed92 (bug 1817183)
Backed out changeset cfed8d9c23f3 (bug 1817183)
Backed out changeset 62fe2f589efe (bug 1817182)
Backed out changeset 557bd773fb85 (bug 1817179)
Backed out changeset 7f8a7865868b (bug 1816934)
Backed out changeset d6c1d4c0d2a0 (bug 1816934)
2023-02-17 10:51:33 -05:00

130 lines
3.6 KiB
JavaScript

/* Any copyright is dedicated to the Public Domain.
* http://creativecommons.org/publicdomain/zero/1.0/ */
const { Credentials } = ChromeUtils.import(
"resource://gre/modules/Credentials.jsm"
);
const { CryptoUtils } = ChromeUtils.import(
"resource://services-crypto/utils.js"
);
var { hexToBytes: h2b, hexAsString: h2s, bytesAsHex: b2h } = CommonUtils;
// Test vectors for the "onepw" protocol:
// https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol#wiki-test-vectors
var vectors = {
"client stretch-KDF": {
email: h("616e6472c3a94065 78616d706c652e6f 7267"),
password: h("70c3a4737377c3b6 7264"),
quickStretchedPW: h(
"e4e8889bd8bd61ad 6de6b95c059d56e7 b50dacdaf62bd846 44af7e2add84345d"
),
authPW: h(
"247b675ffb4c4631 0bc87e26d712153a be5e1c90ef00a478 4594f97ef54f2375"
),
authSalt: h(
"00f0000000000000 0000000000000000 0000000000000000 0000000000000000"
),
},
};
// A simple test suite with no utf8 encoding madness.
add_task(async function test_onepw_setup_credentials() {
let email = "francine@example.org";
let password = CommonUtils.encodeUTF8("i like pie");
let pbkdf2 = CryptoUtils.pbkdf2Generate;
let hkdf = CryptoUtils.hkdfLegacy;
// quickStretch the email
let saltyEmail = Credentials.keyWordExtended("quickStretch", email);
Assert.equal(
b2h(saltyEmail),
"6964656e746974792e6d6f7a696c6c612e636f6d2f7069636c2f76312f717569636b537472657463683a6672616e63696e65406578616d706c652e6f7267"
);
let pbkdf2Rounds = 1000;
let pbkdf2Len = 32;
let quickStretchedPW = await pbkdf2(
password,
saltyEmail,
pbkdf2Rounds,
pbkdf2Len
);
let quickStretchedActual =
"6b88094c1c73bbf133223f300d101ed70837af48d9d2c1b6e7d38804b20cdde4";
Assert.equal(b2h(quickStretchedPW), quickStretchedActual);
// obtain hkdf info
let authKeyInfo = Credentials.keyWord("authPW");
Assert.equal(
b2h(authKeyInfo),
"6964656e746974792e6d6f7a696c6c612e636f6d2f7069636c2f76312f617574685057"
);
// derive auth password
let hkdfSalt = h2b("00");
let hkdfLen = 32;
let authPW = await hkdf(quickStretchedPW, hkdfSalt, authKeyInfo, hkdfLen);
Assert.equal(
b2h(authPW),
"4b8dec7f48e7852658163601ff766124c312f9392af6c3d4e1a247eb439be342"
);
// derive unwrap key
let unwrapKeyInfo = Credentials.keyWord("unwrapBkey");
let unwrapKey = await hkdf(
quickStretchedPW,
hkdfSalt,
unwrapKeyInfo,
hkdfLen
);
Assert.equal(
b2h(unwrapKey),
"8ff58975be391338e4ec5d7138b5ed7b65c7d1bfd1f3a4f93e05aa47d5b72be9"
);
});
add_task(async function test_client_stretch_kdf() {
let expected = vectors["client stretch-KDF"];
let email = h2s(expected.email);
let password = h2s(expected.password);
// Intermediate value from sjcl implementation in fxa-js-client
// The key thing is the c3a9 sequence in "andré"
let salt = Credentials.keyWordExtended("quickStretch", email);
Assert.equal(
b2h(salt),
"6964656e746974792e6d6f7a696c6c612e636f6d2f7069636c2f76312f717569636b537472657463683a616e6472c3a9406578616d706c652e6f7267"
);
let options = {
stretchedPassLength: 32,
pbkdf2Rounds: 1000,
hkdfSalt: h2b("00"),
hkdfLength: 32,
};
let results = await Credentials.setup(email, password, options);
Assert.equal(
expected.quickStretchedPW,
b2h(results.quickStretchedPW),
"quickStretchedPW is wrong"
);
Assert.equal(expected.authPW, b2h(results.authPW), "authPW is wrong");
});
// End of tests
// Utility functions follow
// turn formatted test vectors into normal hex strings
function h(hexStr) {
return hexStr.replace(/\s+/g, "");
}