OLD | NEW |
| (Empty) |
1 <!DOCTYPE html> | |
2 <html> | |
3 <head> | |
4 <script src="../../resources/js-test.js"></script> | |
5 <script src="resources/common.js"></script> | |
6 </head> | |
7 <body> | |
8 <p id="description"></p> | |
9 <div id="console"></div> | |
10 | |
11 <script> | |
12 description("Tests encrypt/decrypt for AES-CBC"); | |
13 | |
14 jsTestIsAsync = true; | |
15 | |
16 // ------------------------------------------------- | |
17 // Successful password import and key derivation | |
18 // ------------------------------------------------- | |
19 | |
20 // Test vectors were copied from: | |
21 // https://tools.ietf.org/html/rfc6070 | |
22 // | |
23 | |
24 var kPbkdf2SuccessVectors = [ | |
25 { | |
26 password: "password", | |
27 salt: "salt", | |
28 c: 1, | |
29 dkLen: 20, | |
30 hash: "SHA-1", | |
31 derived_key_full_length: "0c60c80f961f0e71f3a9b524af6012062fe037a6" | |
32 }, | |
33 | |
34 { | |
35 password: "password", | |
36 salt: "salt", | |
37 c: 2, | |
38 dkLen: 20, | |
39 hash: "SHA-1", | |
40 derived_key_full_length: "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957" | |
41 }, | |
42 | |
43 { | |
44 password: "password", | |
45 salt: "salt", | |
46 c: 4096, | |
47 dkLen: 20, | |
48 hash: "SHA-1", | |
49 derived_key_full_length: "4b007901b765489abead49d926f721d065a429c1" | |
50 }, | |
51 | |
52 { | |
53 password: "passwordPASSWORDpassword", | |
54 salt: "saltSALTsaltSALTsaltSALTsaltSALTsalt", | |
55 c: 4096, | |
56 dkLen: 25, | |
57 hash: "SHA-1", | |
58 derived_key_full_length: "3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038
" | |
59 }, | |
60 | |
61 { | |
62 password: "pass\0word", | |
63 salt: "sa\0lt", | |
64 c: 4096, | |
65 dkLen: 16, | |
66 hash: "SHA-1", | |
67 derived_key_full_length: "56fa6aa75548099dcc37d7f03425e0c3" | |
68 }, | |
69 ]; | |
70 | |
71 var key = null; | |
72 var dkey = null; | |
73 | |
74 function runPbkdf2SuccessTestCase(testCase) | |
75 { | |
76 var algorithm = {name: 'PBKDF2'}; | |
77 | |
78 var password = asciiToUint8Array(testCase.password); | |
79 var usages = ['deriveBits', 'deriveKey']; | |
80 var extractable = false; | |
81 | |
82 var params = { | |
83 name: 'PBKDF2', | |
84 salt: asciiToUint8Array(testCase.salt), | |
85 iterations: testCase.c, | |
86 hash: {name: testCase.hash} | |
87 }; | |
88 // (1) Import the password | |
89 return crypto.subtle.importKey('raw', password, algorithm, extractable, usag
es).then(function(result) { | |
90 key = result; | |
91 // shouldBe() can only resolve variables in global context. | |
92 tmpKey = key; | |
93 shouldEvaluateAs("tmpKey.type", "secret"); | |
94 shouldEvaluateAs("tmpKey.extractable", false); | |
95 shouldEvaluateAs("tmpKey.algorithm.name", "PBKDF2"); | |
96 shouldEvaluateAs("tmpKey.usages.join(',')", "deriveKey,deriveBits"); | |
97 | |
98 var derivedAlgorithm = {name: 'aes-cbc', length: 128}; | |
99 // (2) Derive key for aes-cbc | |
100 return crypto.subtle.deriveKey(params, key, derivedAlgorithm, true, ['en
crypt']); | |
101 }).then(function(result) { | |
102 dkey = result; | |
103 | |
104 // Verify the key's properties. | |
105 shouldEvaluateAs("dkey.type", "secret"); | |
106 shouldEvaluateAs("dkey.extractable", true); | |
107 shouldEvaluateAs("dkey.algorithm.name", "AES-CBC"); | |
108 shouldEvaluateAs("dkey.algorithm.length", 128); | |
109 shouldEvaluateAs("dkey.usages.join(',')", "encrypt"); | |
110 | |
111 // Export the key and check its bytes. | |
112 return crypto.subtle.exportKey("raw",dkey); | |
113 }).then(function(result) { | |
114 bytesShouldMatchHexString("Derivedkey", testCase.derived_key_full_length
.substring(0, 32), result); | |
115 }); | |
116 } | |
117 | |
118 var lastPromise = Promise.resolve(null); | |
119 | |
120 kPbkdf2SuccessVectors.forEach(function(test) { | |
121 lastPromise = lastPromise.then(runPbkdf2SuccessTestCase.bind(null, test)); | |
122 }); | |
123 | |
124 lastPromise.then(finishJSTest, failAndFinishJSTest); | |
125 | |
126 </script> | |
127 | |
128 </body> | |
129 </html> | |
OLD | NEW |