Source code

Revision control

Copy as Markdown

Other Tools

Test Info: Warnings

"use strict";
const { getCryptoParamsFromHeaders, PushCrypto } = ChromeUtils.importESModule(
);
const REJECT_PADDING = { padding: "reject" };
// A common key to decrypt some aesgcm and aesgcm128 messages. Other decryption
// tests have their own keys.
const LEGACY_PRIVATE_KEY = {
kty: "EC",
crv: "P-256",
d: "4h23G_KkXC9TvBSK2v0Q7ImpS2YAuRd8hQyN0rFAwBg",
x: "sd85ZCbEG6dEkGMCmDyGBIt454Qy-Yo-1xhbaT2Jlk4",
y: "vr3cKpQ-Sp1kpZ9HipNjUCwSA55yy0uM8N9byE8dmLs",
ext: true,
};
const LEGACY_PUBLIC_KEY =
"BLHfOWQmxBunRJBjApg8hgSLeOeEMvmKPtcYW2k9iZZOvr3cKpQ-Sp1kpZ9HipNjUCwSA55yy0uM8N9byE8dmLs";
async function assertDecrypts(test, headers) {
let privateKey = test.privateKey;
let publicKey = ChromeUtils.base64URLDecode(test.publicKey, REJECT_PADDING);
let authSecret = null;
if (test.authSecret) {
authSecret = ChromeUtils.base64URLDecode(test.authSecret, REJECT_PADDING);
}
let payload = ChromeUtils.base64URLDecode(test.data, REJECT_PADDING);
let result = await PushCrypto.decrypt(
privateKey,
publicKey,
authSecret,
headers,
payload
);
let decoder = new TextDecoder("utf-8");
equal(decoder.decode(new Uint8Array(result)), test.result, test.desc);
}
async function assertNotDecrypts(test, headers) {
let authSecret = null;
if (test.authSecret) {
authSecret = ChromeUtils.base64URLDecode(test.authSecret, REJECT_PADDING);
}
let data = ChromeUtils.base64URLDecode(test.data, REJECT_PADDING);
let publicKey = ChromeUtils.base64URLDecode(test.publicKey, REJECT_PADDING);
let promise = PushCrypto.decrypt(
test.privateKey,
publicKey,
authSecret,
headers,
data
);
await Assert.rejects(promise, test.expected, test.desc);
}
add_task(async function test_crypto_getCryptoParamsFromHeaders() {
// These headers should parse correctly.
let shouldParse = [
{
desc: "aesgcm with multiple keys",
headers: {
encoding: "aesgcm",
crypto_key: "keyid=p256dh;dh=Iy1Je2Kv11A,p256ecdsa=o2M8QfiEKuI",
encryption: "keyid=p256dh;salt=upk1yFkp1xI",
},
params: {
senderKey: "Iy1Je2Kv11A",
salt: "upk1yFkp1xI",
rs: 4096,
},
},
{
desc: "aesgcm with quoted key param",
headers: {
encoding: "aesgcm",
crypto_key: 'dh="byfHbUffc-k"',
encryption: "salt=C11AvAsp6Gc",
},
params: {
senderKey: "byfHbUffc-k",
salt: "C11AvAsp6Gc",
rs: 4096,
},
},
{
desc: "aesgcm with Crypto-Key and rs = 24",
headers: {
encoding: "aesgcm",
crypto_key: 'dh="ybuT4VDz-Bg"',
encryption: "salt=H7U7wcIoIKs; rs=24",
},
params: {
senderKey: "ybuT4VDz-Bg",
salt: "H7U7wcIoIKs",
rs: 24,
},
},
{
desc: "aesgcm128 with Encryption-Key and rs = 2",
headers: {
encoding: "aesgcm128",
encryption_key: "keyid=legacy; dh=LqrDQuVl9lY",
encryption: "keyid=legacy; salt=YngI8B7YapM; rs=2",
},
params: {
senderKey: "LqrDQuVl9lY",
salt: "YngI8B7YapM",
rs: 2,
},
},
{
desc: "aesgcm128 with Encryption-Key",
headers: {
encoding: "aesgcm128",
encryption_key: "keyid=v2; dh=VA6wmY1IpiE",
encryption: "keyid=v2; salt=khtpyXhpDKM",
},
params: {
senderKey: "VA6wmY1IpiE",
salt: "khtpyXhpDKM",
rs: 4096,
},
},
];
for (let test of shouldParse) {
let params = getCryptoParamsFromHeaders(test.headers);
let senderKey = ChromeUtils.base64URLDecode(
test.params.senderKey,
REJECT_PADDING
);
let salt = ChromeUtils.base64URLDecode(test.params.salt, REJECT_PADDING);
deepEqual(
new Uint8Array(params.senderKey),
new Uint8Array(senderKey),
"Sender key should match for " + test.desc
);
deepEqual(
new Uint8Array(params.salt),
new Uint8Array(salt),
"Salt should match for " + test.desc
);
equal(
params.rs,
test.params.rs,
"Record size should match for " + test.desc
);
}
// These headers should be rejected.
let shouldThrow = [
{
desc: "aesgcm128 with Crypto-Key",
headers: {
encoding: "aesgcm128",
crypto_key: "keyid=v2; dh=VA6wmY1IpiE",
encryption: "keyid=v2; salt=F0Im7RtGgNY",
},
exception: /Missing Encryption-Key header/,
},
{
desc: "Invalid encoding",
headers: {
encoding: "nonexistent",
},
exception: /Missing encryption header/,
},
{
desc: "Invalid record size",
headers: {
encoding: "aesgcm",
crypto_key: "dh=pbmv1QkcEDY",
encryption: "dh=Esao8aTBfIk;rs=bad",
},
exception: /Invalid salt parameter/,
},
{
desc: "aesgcm with Encryption-Key",
headers: {
encoding: "aesgcm",
encryption_key: "dh=FplK5KkvUF0",
encryption: "salt=p6YHhFF3BQY",
},
exception: /Missing Crypto-Key header/,
},
];
for (let test of shouldThrow) {
throws(
() => getCryptoParamsFromHeaders(test.headers),
test.exception,
test.desc
);
}
});
add_task(async function test_aes128gcm_ok() {
let expectedSuccesses = [
{
desc: "Example from draft-ietf-webpush-encryption-latest",
result: "When I grow up, I want to be a watermelon",
data: "DGv6ra1nlYgDCS1FRnbzlwAAEABBBP4z9KsN6nGRTbVYI_c7VJSPQTBtkgcy27mlmlMoZIIgDll6e3vCYLocInmYWAmS6TlzAC8wEqKK6PBru3jl7A_yl95bQpu6cVPTpK4Mqgkf1CXztLVBSt2Ks3oZwbuwXPXLWyouBWLVWGNWQexSgSxsj_Qulcy4a-fN",
authSecret: "BTBZMqHH6r4Tts7J_aSIgg",
privateKey: {
kty: "EC",
crv: "P-256",
d: "q1dXpw3UpT5VOmu_cf_v6ih07Aems3njxI-JWgLcM94",
x: "JXGyvs3942BVGq8e0PTNNmwRzr5VX4m8t7GGpTM5FzE",
y: "aOzi6-AYWXvTBHm4bjyPjs7Vd8pZGH6SRpkNtoIAiw4",
ext: true,
},
publicKey:
"BCVxsr7N_eNgVRqvHtD0zTZsEc6-VV-JvLexhqUzORcxaOzi6-AYWXvTBHm4bjyPjs7Vd8pZGH6SRpkNtoIAiw4",
},
{
desc: "rs = 24, pad = 0",
result:
"I am the very model of a modern Major-General; I've information vegetable, animal, and mineral",
data: "goagSH7PP0ZGwUsgShmdkwAAABhBBDJVyIuUJbOSVMeWHP8VNPnxY-dZSw86doqOkEzZZZY1ALBWVXTVf0rUDH3oi68I9Hrp-01zA-mr8XKWl5kcH8cX0KiV2PtCwdkEyaQ73YF5fsDxgoWDiaTA3wPqMvuLDqGsZWHnE9Psnfoy7UMEqKlh2a1nE7ZOXiXcOBHLNj260jYzSJnEPV2eXixSXfyWpaSJHAwfj4wVdAAocmViIg6ywk8wFB1hgJpnX2UVEU_qIOcaP6AOIOr1UUQPfosQqC2MEHe5u9gHXF5pi-E267LAlkoYefq01KV_xK_vjbxpw8GAYfSjQEm0L8FG-CN37c8pnQ2Yf61MkihaXac9OctfNeWq_22cN6hn4qsOq0F7QoWIiZqWhB1vS9cJ3KUlyPQvKI9cvevDxw0fJHWeTFzhuwT9BjdILjjb2Vkqc0-qTDOawqD4c8WXsvdGDQCec5Y1x3UhdQXdjR_mhXypxFM37OZTvKJBr1vPCpRXl-bI6iOd7KScgtMM1x5luKhGzZyz25HyuFyj1ec82A",
authSecret: "_tK2LDGoIt6be6agJ_nvGA",
privateKey: {
kty: "EC",
crv: "P-256",
d: "bGViEe3PvjjFJg8lcnLsqu71b2yqWGnZN9J2MTed-9s",
x: "auB0GHF0AZ2LAocFnvOXDS7EeCMopnzbg-tS21FMHrU",
y: "GpbhrW-_xKj3XhhXA-kDZSicKZ0kn0BuVhqzhLOB-Cc",
ext: true,
},
publicKey:
"BGrgdBhxdAGdiwKHBZ7zlw0uxHgjKKZ824PrUttRTB61GpbhrW-_xKj3XhhXA-kDZSicKZ0kn0BuVhqzhLOB-Cc",
},
{
desc: "rs = 49, pad = 84; ciphertext length falls on record boundary",
result: "Hello, world",
data: "-yiDzsHE_K3W0TcfbqSR4AAAADFBBC1EHuf5_2oDKaZJJ9BST9vnsixvtl4Qq0_cA4-UQgoMo_oo2tNshOyRoWLq4Hj6rSwc7XjegRPhlgKyDolPSXa5c-L89oL6DIzNmvPVv_Ht4W-tWjHOGdOLXh_h94pPrYQrvBAlTCxs3ZaitVKE2XLFPK2MO6yxD19X6w1KQzO2BBAroRfK4pEI-9n2Kai6aWDdAZRbOe03unBsQ0oQ_SvSCU_5JJvNrUUTX1_kX804Bx-LLTlBr9pDmBDXeqyvfOULVDJb9YyVAzN9BzeFoyPfo0M",
authSecret: "lfF1cOUI72orKtG09creMw",
privateKey: {
kty: "EC",
crv: "P-256",
d: "ZwBKTqgg3u2OSdtelIDmPT6jzOGujhpgYJcT1SfQAe8",
x: "AU6PFLktoHzgg7k_ljZ-h7IXpH9-8u6TqdNDqgY-V1o",
y: "nzDVnGkMajmz_IFbFQyn3RSWAXQTN7U1B6UfQbFzpyE",
ext: true,
},
publicKey:
"BAFOjxS5LaB84IO5P5Y2foeyF6R_fvLuk6nTQ6oGPldanzDVnGkMajmz_IFbFQyn3RSWAXQTN7U1B6UfQbFzpyE",
},
{
desc: "rs = 18, pad = 0",
result: "1",
data: "fK69vCCTjuNAqUbxvU9o8QAAABJBBDfP21Ij2fleqgL27ZQP8i6vBbNiLpSdw86fM15u-bJq6qzKD3QICos2RZLyzMbV7d1DAEtwuRiH0UTZ-pPxbDvH6mj0_VR6lOyoSxbhOKYIAXc",
authSecret: "1loE35Xy215gSDn3F9zeeQ",
privateKey: {
kty: "EC",
crv: "P-256",
d: "J0M_q4lws8tShLYRg--0YoZWLNKnMw2MrpYJEaVXHQw",
x: "UV1DJjVWUjmdoksr6SQeYztc8U-vDPOm_WAxe5VMCi8",
y: "SEhUgASyewz3SAvIEMa-wDqPt5yOoA_IsF4A-INFY-8",
ext: true,
},
publicKey:
"BFFdQyY1VlI5naJLK-kkHmM7XPFPrwzzpv1gMXuVTAovSEhUgASyewz3SAvIEMa-wDqPt5yOoA_IsF4A-INFY-8",
},
];
for (let test of expectedSuccesses) {
let privateKey = test.privateKey;
let publicKey = ChromeUtils.base64URLDecode(test.publicKey, {
padding: "reject",
});
let authSecret = ChromeUtils.base64URLDecode(test.authSecret, {
padding: "reject",
});
let payload = ChromeUtils.base64URLDecode(test.data, {
padding: "reject",
});
let result = await PushCrypto.decrypt(
privateKey,
publicKey,
authSecret,
{
encoding: "aes128gcm",
},
payload
);
let decoder = new TextDecoder("utf-8");
equal(decoder.decode(new Uint8Array(result)), test.result, test.desc);
}
});
add_task(async function test_aes128gcm_err() {
let expectedFailures = [
{
// Just the payload; no header at all.
desc: "Missing header block",
data: "RbdNK2m-mwdN47NaqH58FWEd",
privateKey: {
kty: "EC",
crv: "P-256",
d: "G-g_ODMu8JaB-vPzB7H_LhDKt4zHzatoOsDukqw_buE",
x: "26mRyiFTQ_Nr3T6FfK_ePRi_V_GDWygzutQU8IhBYgU",
y: "GslqCyRJADfQfPUo5OGOEAoaZOt0R0hUS_HiINq6zyw",
ext: true,
},
publicKey:
"BNupkcohU0Pza90-hXyv3j0Yv1fxg1soM7rUFPCIQWIFGslqCyRJADfQfPUo5OGOEAoaZOt0R0hUS_HiINq6zyw",
authSecret: "NHG7mEgeAlM785VCvPPbpA",
expected: /Truncated header/,
},
{
// The sender key should be 65 bytes; this header contains an invalid key
// that's only 1 byte.
desc: "Truncated sender key",
data: "3ltpa4fxoVy2revdedb5ngAAABIBALa8GCbDfJ9z3WtIWcK1BRgZUg",
privateKey: {
kty: "EC",
crv: "P-256",
d: "zojo4LMFekdS60yPqTHrYhwwLaWtA7ga9FnPZzVWDK4",
x: "oyXZkITEDeDOcioELESNlKMmkXIcp54890XnjGmIYZQ",
y: "sCzqGSJBdnlanU27sgc68szW-m8KTHxJaFVr5QKjuoE",
ext: true,
},
publicKey:
"BKMl2ZCExA3gznIqBCxEjZSjJpFyHKeePPdF54xpiGGUsCzqGSJBdnlanU27sgc68szW-m8KTHxJaFVr5QKjuoE",
authSecret: "XDHg2W2aE5iZrAlp01n3QA",
expected: /Invalid sender public key/,
},
{
// The message is encrypted with only the first 12 bytes of the 16-byte
// auth secret, so the derived decryption key and nonce won't match.
desc: "Encrypted with mismatched auth secret",
data: "gRX0mIuMOSp7rLQ8jxrFZQAAABJBBBmUSDxUHpvDmmrwP_cTqndFwoThOKQqJDW3l7IMS2mM9RGLT4VVMXwZDqvr-rdJwWTT9r3r4NRBcZExo1fYiQoTxNvUsW_z3VqD98ka1uBArEJzCn8LPNMkXp-Nb_McdR1BDP0",
privateKey: {
kty: "EC",
crv: "P-256",
d: "YMdjalF95wOaCsLQ4wZEAHlMeOfgSTmBKaInzuD5qAE",
x: "_dBBKKhcBYltf4H-EYvcuIe588H_QYOtxMgk0ShgcwA",
y: "6Yay37WmEOWvQ-QIoAcwWE-T49_d_ERzfV8I-y1viRY",
ext: true,
},
publicKey:
"BP3QQSioXAWJbX-B_hGL3LiHufPB_0GDrcTIJNEoYHMA6Yay37WmEOWvQ-QIoAcwWE-T49_d_ERzfV8I-y1viRY",
authSecret: "NVo4zW2b7xWZDi0zCNvWAA",
expected: /Bad encryption/,
},
{
// Multiple records; the first has padding delimiter = 2, but should be 1.
desc: "Early final record",
data: "2-IVUH0a09Lq6r6ubodNjwAAABJBBHvEND80qDSM3E5GL_x8QKpqjGGnOcTEHUUSVQX3Dp_F-e-oaFLdSI3Pjo6iyvt14Hq9XufJ1cA4uv7weVcbC9opRBHOmMdt0DHA5YBXekmAo3XkXtMEKb4OLunafm34aW0BuOw",
privateKey: {
kty: "EC",
crv: "P-256",
d: "XdodkYvEB7o82hLLgBTUmqfgJpACggMERmvIADTKkkA",
x: "yVxlINrRHo9qG_gDGkDCpO4QRcGQO-BqHfp_gpzOst4",
y: "Akga5r0EdhIbEsVTLQsjF4gHfvoGg6W_4NYjObJRyzU",
ext: true,
},
publicKey:
"BMlcZSDa0R6Pahv4AxpAwqTuEEXBkDvgah36f4KczrLeAkga5r0EdhIbEsVTLQsjF4gHfvoGg6W_4NYjObJRyzU",
authSecret: "QMJB_eQmnuHm1yVZLZgnGA",
expected: /Padding is wrong!/,
},
];
for (let test of expectedFailures) {
await assertNotDecrypts(test, { encoding: "aes128gcm" });
}
});
add_task(async function test_aesgcm_ok() {
let expectedSuccesses = [
{
desc: "padSize = 2, rs = 24, pad = 0",
result: "Some message",
data: "Oo34w2F9VVnTMFfKtdx48AZWQ9Li9M6DauWJVgXU",
authSecret: "aTDc6JebzR6eScy2oLo4RQ",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BCHFVrflyxibGLlgztLwKelsRZp4gqX3tNfAKFaxAcBhpvYeN1yIUMrxaDKiLh4LNKPtj0BOXGdr-IQ-QP82Wjo",
encryption: "salt=zCU18Rw3A5aB_Xi-vfixmA; rs=24",
encoding: "aesgcm",
},
},
{
desc: "padSize = 2, rs = 8, pad = 16",
result: "Yet another message",
data: "uEC5B_tR-fuQ3delQcrzrDCp40W6ipMZjGZ78USDJ5sMj-6bAOVG3AK6JqFl9E6AoWiBYYvMZfwThVxmDnw6RHtVeLKFM5DWgl1EwkOohwH2EhiDD0gM3io-d79WKzOPZE9rDWUSv64JstImSfX_ADQfABrvbZkeaWxh53EG59QMOElFJqHue4dMURpsMXg",
authSecret: "6plwZnSpVUbF7APDXus3UQ",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BEaA4gzA3i0JDuirGhiLgymS4hfFX7TNTdEhSk_HBlLpkjgCpjPL5c-GL9uBGIfa_fhGNKKFhXz1k9Kyens2ZpQ",
encryption: "salt=ZFhzj0S-n29g9P2p4-I7tA; rs=8",
encoding: "aesgcm",
},
},
{
desc: "padSize = 2, rs = 3, pad = 0",
result: "Small record size",
data: "oY4e5eDatDVt2fpQylxbPJM-3vrfhDasfPc8Q1PWt4tPfMVbz_sDNL_cvr0DXXkdFzS1lxsJsj550USx4MMl01ihjImXCjrw9R5xFgFrCAqJD3GwXA1vzS4T5yvGVbUp3SndMDdT1OCcEofTn7VC6xZ-zP8rzSQfDCBBxmPU7OISzr8Z4HyzFCGJeBfqiZ7yUfNlKF1x5UaZ4X6iU_TXx5KlQy_toV1dXZ2eEAMHJUcSdArvB6zRpFdEIxdcHcJyo1BIYgAYTDdAIy__IJVCPY_b2CE5W_6ohlYKB7xDyH8giNuWWXAgBozUfScLUVjPC38yJTpAUi6w6pXgXUWffende5FreQpnMFL1L4G-38wsI_-ISIOzdO8QIrXHxmtc1S5xzYu8bMqSgCinvCEwdeGFCmighRjj8t1zRWo0D14rHbQLPR_b1P5SvEeJTtS9Nm3iibM",
authSecret: "g2rWVHUCpUxgcL9Tz7vyeQ",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BCg6ZIGuE2ZNm2ti6Arf4CDVD_8--aLXAGLYhpghwjl1xxVjTLLpb7zihuEOGGbyt8Qj0_fYHBP4ObxwJNl56bk",
encryption: "salt=5LIDBXbvkBvvb7ZdD-T4PQ; rs=3",
encoding: "aesgcm",
},
},
{
desc: "Example from draft-ietf-httpbis-encryption-encoding-02",
result: "I am the walrus",
data: "6nqAQUME8hNqw5J3kl8cpVVJylXKYqZOeseZG8UueKpA",
authSecret: "R29vIGdvbyBnJyBqb29iIQ",
privateKey: {
kty: "EC",
crv: "P-256",
d: "9FWl15_QUQAWDaD3k3l50ZBZQJ4au27F1V4F0uLSD_M",
x: "ISQGPMvxncL6iLZDugTm3Y2n6nuiyMYuD3epQ_TC-pE",
y: "T21EEWyf0cQDQcakQMqz4hQKYOQ3il2nNZct4HgAUQU",
ext: true,
},
publicKey:
"BCEkBjzL8Z3C-oi2Q7oE5t2Np-p7osjGLg93qUP0wvqRT21EEWyf0cQDQcakQMqz4hQKYOQ3il2nNZct4HgAUQU",
headers: {
crypto_key:
'keyid="dhkey"; dh="BNoRDbb84JGm8g5Z5CFxurSqsXWJ11ItfXEWYVLE85Y7CYkDjXsIEc4aqxYaQ1G8BqkXCJ6DPpDrWtdWj_mugHU"',
encryption: 'keyid="dhkey"; salt="lngarbyKfMoi9Z75xYXmkg"',
encoding: "aesgcm",
},
},
];
for (let test of expectedSuccesses) {
await assertDecrypts(test, test.headers);
}
});
add_task(async function test_aesgcm_err() {
let expectedFailures = [
{
desc: "aesgcm128 message decrypted as aesgcm",
data: "fwkuwTTChcLnrzsbDI78Y2EoQzfnbMI8Ax9Z27_rwX8",
authSecret: "BhbpNTWyO5wVJmVKTV6XaA",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BCHn-I-J3dfPRLJBlNZ3xFoAqaBLZ6qdhpaz9W7Q00JW1oD-hTxyEECn6KYJNK8AxKUyIDwn6Icx_PYWJiEYjQ0",
encryption: "salt=c6JQl9eJ0VvwrUVCQDxY7Q",
encoding: "aesgcm",
},
expected: /Bad encryption/,
},
{
// The plaintext is "O hai". The ciphertext is exactly `rs + 16` bytes,
// but we didn't include the empty trailing block that aesgcm requires for
// exact multiples.
desc: "rs = 7, no trailing block",
data: "YG4F-b06y590hRlnSsw_vuOw62V9Iz8",
authSecret: "QoDi0u6vcslIVJKiouXMXw",
privateKey: {
kty: "EC",
crv: "P-256",
d: "2bu4paOAZbL2ef1u-wTzONuTIcDPc00o0zUJgg46XTc",
x: "uEvLZUMVn1my0cwnLdcFT0mj1gSU5uzI3HeGwXC7jX8",
y: "SfNVLGL-FurydsuzciDfw8K1cUHyoDWnJJ_16UG6Dbo",
ext: true,
},
publicKey:
"BLhLy2VDFZ9ZstHMJy3XBU9Jo9YElObsyNx3hsFwu41_SfNVLGL-FurydsuzciDfw8K1cUHyoDWnJJ_16UG6Dbo",
headers: {
crypto_key:
"dh=BD_bsTUpxBMvSv8eksith3vijMLj44D4jhJjO51y7wK1ytbUlsyYBBYYyB5AAe5bnREA_WipTgemDVz00LiWcfM",
encryption: "salt=xKWvs_jWWeg4KOsot_uBhA; rs=7",
encoding: "aesgcm",
},
expected: /Encrypted data truncated/,
},
{
// The last block is only 1 byte, but valid blocks must be at least 2 bytes.
desc: "Pad size > last block length",
data: "JvX9HsJ4lL5gzP8_uCKc6s15iRIaNhD4pFCgq5-dfwbUqEcNUkqv",
authSecret: "QtGZeY8MQfCaq-XwKOVGBQ",
privateKey: {
kty: "EC",
crv: "P-256",
d: "CosERAVXgvTvoh7UkrRC2V-iXoNs0bXle9I68qzkles",
x: "_D0YqEwirvTJQJdjG6xXrjstMVpeAzf221cUqZz6hgY",
y: "9MnFbM7U14uiYMDI5e2I4jN29tYmsM9F66QodhKmA-c",
ext: true,
},
publicKey:
"BPw9GKhMIq70yUCXYxusV647LTFaXgM39ttXFKmc-oYG9MnFbM7U14uiYMDI5e2I4jN29tYmsM9F66QodhKmA-c",
headers: {
crypto_key:
"dh=BBNZNEi5Ew_ID5S4Y9jWBi1NeVDje6Mjs7SDLViUn6A8VAZj-6X3QAuYQ3j20BblqjwTgYst7PRnY6UGrKyLbmU",
encryption: "salt=ot8hzbwOo6CYe6ZhdlwKtg; rs=6",
encoding: "aesgcm",
},
expected: /Decoded array is too short/,
},
{
// The last block is 3 bytes (2 bytes for the pad length; 1 byte of data),
// but claims its pad length is 2.
desc: "Padding length > last block length",
data: "oWSOFA-UO5oWq-kI79RHaFfwAejLiQJ4C7eTmrSTBl4gArLXfx7lZ-Y",
authSecret: "gKG_P6-de5pyzS8hyH_NyQ",
privateKey: {
kty: "EC",
crv: "P-256",
d: "9l-ahcBM-I0ykwbWiDS9KRrPdhyvTZ0SxKiPpj2aeaI",
x: "qx0tU4EDaQv6ayFA3xvLLBdMmn4mLxjn7SK6mIeIxeg",
y: "ymbMcmUOEyh_-rLrBsi26NG4UFCis2MTDs5FG2VdDPI",
ext: true,
},
publicKey:
"BKsdLVOBA2kL-mshQN8byywXTJp-Ji8Y5-0iupiHiMXoymbMcmUOEyh_-rLrBsi26NG4UFCis2MTDs5FG2VdDPI",
headers: {
crypto_key:
"dh=BKe2IBO_cwmEzQyTVscSbQcj0Y3uBSzGZ_mHlANMciS8uGpb7U8_Bw7TNdlYfpwWDLd0cxM8YYWNDbNJ_p2Rp4o",
encryption: "salt=z7QJ6UR89SiFRkd4RsC4Vg; rs=6",
encoding: "aesgcm",
},
expected: /Padding is wrong/,
},
{
// The first block has no padding, but claims its pad length is 1.
desc: "Non-zero padding",
data: "Qdvjh0LkZXKu_1Hvv56D0rOSF6Mww3y0F8xkxUNlwVu2U1iakOUUGRs",
authSecret: "cMpWQW58BrpDbJ8KqbS9ig",
privateKey: {
kty: "EC",
crv: "P-256",
d: "IzuaxLqFJmjSu8GjLCo2oEaDZjDButW4m4T0qx02XsM",
x: "Xy7vt_TJTynxwWsQyY069BcKmrhkRjhKPFuTi-AphoY",
y: "0M10IVM1ourR7Q5AUX2b2fgdmGyTWcYsdHcdFK_b4Hk",
ext: true,
},
publicKey:
"BF8u77f0yU8p8cFrEMmNOvQXCpq4ZEY4Sjxbk4vgKYaG0M10IVM1ourR7Q5AUX2b2fgdmGyTWcYsdHcdFK_b4Hk",
headers: {
crypto_key:
"dh=BBicj01QI0ryiFzAaty9VpW_crgq9XbU1bOCtEZI9UNE6tuOgp4lyN_UN0N905ECnLWK5v_sCPUIxnQgOuCseSo",
encryption: "salt=SbkGHONbQBBsBcj9dLyIUw; rs=6",
encoding: "aesgcm",
},
expected: /Padding is wrong/,
},
{
// The first record is 22 bytes: 2 bytes for the pad length, 4 bytes of
// data, and a 16-byte auth tag. The second "record" is missing the pad
// and data, and contains just the auth tag.
desc: "rs = 6, second record truncated to only auth tag",
data: "C7u3j5AL4Yzh2yYB_umN6tzrVHxrt7D5baTEW9DE1Bk3up9fY4w",
authSecret: "3rWhsRCU_KdaqfKPbd3zBQ",
privateKey: {
kty: "EC",
crv: "P-256",
d: "nhOT9171xuoQBJGkiZ3aqT5qw_ILJ94_PPiVNu1LFSY",
x: "lCj7ctQTmRfwzTMcODlNfHjFMAHmgdI44OhTQXX_xpE",
y: "WBdgz4GWGtGAisC63O9DtP5l--hnCzPZiV-YZ-a6Lcw",
ext: true,
},
publicKey:
"BJQo-3LUE5kX8M0zHDg5TXx4xTAB5oHSOODoU0F1_8aRWBdgz4GWGtGAisC63O9DtP5l--hnCzPZiV-YZ-a6Lcw",
headers: {
crypto_key:
"dh=BI38Qs_OhDmQIxbszc6Nako-MrX3FzAE_8HzxM1wgoEIG4ocxyF-YAAVhfkpJUvDpRyKW2LDHIaoylaZuxQfRhE",
encryption: "salt=QClh48OlvGpSjZ0Mg0e8rg; rs=6",
encoding: "aesgcm",
},
expected: /Decoded array is too short/,
},
];
for (let test of expectedFailures) {
await assertNotDecrypts(test, test.headers);
}
});
add_task(async function test_aesgcm128_ok() {
let expectedSuccesses = [
{
desc: "padSize = 1, rs = 4096, pad = 2",
result: "aesgcm128 encrypted message",
data: "ljBJ44NPzJFH9EuyT5xWMU4vpZ90MdAqaq1TC1kOLRoPNHtNFXeJ0GtuSaE",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
encryption_key:
"dh=BOmnfg02vNd6RZ7kXWWrCGFF92bI-rQ-bV0Pku3-KmlHwbGv4ejWqgasEdLGle5Rhmp6SKJunZw2l2HxKvrIjfI",
encryption: "salt=btxxUtclbmgcc30b9rT3Bg; rs=4096",
encoding: "aesgcm128",
},
},
];
for (let test of expectedSuccesses) {
await assertDecrypts(test, test.headers);
}
});
add_task(async function test_aesgcm128_err() {
let expectedFailures = [
{
// aesgcm128 doesn't use an auth secret, but we've mixed one in during
// encryption, so the decryption key and nonce won't match.
desc: "padSize = 1, rs = 4096, auth secret, pad = 8",
data: "h0FmyldY8aT5EQ6CJrbfRn_IdDvytoLeHb9_q5CjtdFRfgDRknxLmOzavLaVG4oOiS0r",
authSecret: "Sxb6u0gJIhGEogyLawjmCw",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BCXHk7O8CE-9AOp6xx7g7c-NCaNpns1PyyHpdcmDaijLbT6IdGq0ezGatBwtFc34BBfscFxdk4Tjksa2Mx5rRCM",
encryption: "salt=aGBpoKklLtrLcAUCcCr7JQ",
encoding: "aesgcm128",
},
expected: /Missing Encryption-Key header/,
},
{
// The first byte of each record must be the pad length.
desc: "Missing padding",
data: "anvsHj7oBQTPMhv7XSJEsvyMS4-8EtbC7HgFZsKaTg",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BMSqfc3ohqw2DDgu3nsMESagYGWubswQPGxrW1bAbYKD18dIHQBUmD3ul_lu7MyQiT5gNdzn5JTXQvCcpf-oZE4",
encryption: "salt=Czx2i18rar8XWOXAVDnUuw",
encoding: "aesgcm128",
},
expected: /Missing Encryption-Key header/,
},
{
desc: "Truncated input",
data: "AlDjj6NvT5HGyrHbT8M5D6XBFSra6xrWS9B2ROaCIjwSu3RyZ1iyuv0",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BCHn-I-J3dfPRLJBlNZ3xFoAqaBLZ6qdhpaz9W7Q00JW1oD-hTxyEECn6KYJNK8AxKUyIDwn6Icx_PYWJiEYjQ0",
encryption: "salt=c6JQl9eJ0VvwrUVCQDxY7Q; rs=25",
encoding: "aesgcm128",
},
expected: /Missing Encryption-Key header/,
},
{
desc: "Padding length > rs",
data: "Ct_h1g7O55e6GvuhmpjLsGnv8Rmwvxgw8iDESNKGxk_8E99iHKDzdV8wJPyHA-6b2E6kzuVa5UWiQ7s4Zms1xzJ4FKgoxvBObXkc_r_d4mnb-j245z3AcvRmcYGk5_HZ0ci26SfhAN3lCgxGzTHS4nuHBRkGwOb4Tj4SFyBRlLoTh2jyVK2jYugNjH9tTrGOBg7lP5lajLTQlxOi91-RYZSfFhsLX3LrAkXuRoN7G1CdiI7Y3_eTgbPIPabDcLCnGzmFBTvoJSaQF17huMl_UnWoCj2WovA4BwK_TvWSbdgElNnQ4CbArJ1h9OqhDOphVu5GUGr94iitXRQR-fqKPMad0ULLjKQWZOnjuIdV1RYEZ873r62Yyd31HoveJcSDb1T8l_QK2zVF8V4k0xmK9hGuC0rF5YJPYPHgl5__usknzxMBnRrfV5_MOL5uPZwUEFsu",
privateKey: LEGACY_PRIVATE_KEY,
publicKey: LEGACY_PUBLIC_KEY,
headers: {
crypto_key:
"dh=BAcMdWLJRGx-kPpeFtwqR3GE1LWzd1TYh2rg6CEFu53O-y3DNLkNe_BtGtKRR4f7ZqpBMVS6NgfE2NwNPm3Ndls",
encryption: "salt=NQVTKhB0rpL7ZzKkotTGlA; rs=1",
encoding: "aesgcm128",
},
expected: /Missing Encryption-Key header/,
},
];
for (let test of expectedFailures) {
await assertNotDecrypts(test, test.headers);
}
});