diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/u2f/tests/u2futil.js | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/u2f/tests/u2futil.js')
-rw-r--r-- | dom/u2f/tests/u2futil.js | 204 |
1 files changed, 204 insertions, 0 deletions
diff --git a/dom/u2f/tests/u2futil.js b/dom/u2f/tests/u2futil.js new file mode 100644 index 000000000..97f5df7a1 --- /dev/null +++ b/dom/u2f/tests/u2futil.js @@ -0,0 +1,204 @@ +// Used by local_addTest() / local_completeTest() +var _countCompletions = 0; +var _expectedCompletions = 0; + +function handleEventMessage(event) { + if ("test" in event.data) { + let summary = event.data.test + ": " + event.data.msg; + log(event.data.status + ": " + summary); + ok(event.data.status, summary); + } else if ("done" in event.data) { + SimpleTest.finish(); + } else { + ok(false, "Unexpected message in the test harness: " + event.data) + } +} + +function log(msg) { + console.log(msg) + let logBox = document.getElementById("log"); + if (logBox) { + logBox.textContent += "\n" + msg; + } +} + +function local_is(value, expected, message) { + if (value === expected) { + local_ok(true, message); + } else { + local_ok(false, message + " unexpectedly: " + value + " !== " + expected); + } +} + +function local_isnot(value, expected, message) { + if (value !== expected) { + local_ok(true, message); + } else { + local_ok(false, message + " unexpectedly: " + value + " === " + expected); + } +} + +function local_ok(expression, message) { + let body = {"test": this.location.pathname, "status":expression, "msg": message} + parent.postMessage(body, "http://mochi.test:8888"); +} + +function local_doesThrow(fn, name) { + let gotException = false; + try { + fn(); + } catch (ex) { gotException = true; } + local_ok(gotException, name); +}; + +function local_expectThisManyTests(count) { + if (_expectedCompletions > 0) { + local_ok(false, "Error: local_expectThisManyTests should only be called once."); + } + _expectedCompletions = count; +} + +function local_completeTest() { + _countCompletions += 1 + if (_countCompletions == _expectedCompletions) { + log("All tests completed.") + local_finished(); + } + if (_countCompletions > _expectedCompletions) { + local_ok(false, "Error: local_completeTest called more than local_addTest."); + } +} + +function local_finished() { + parent.postMessage({"done":true}, "http://mochi.test:8888"); +} + +function string2buffer(str) { + return (new Uint8Array(str.length)).map((x, i) => str.charCodeAt(i)); +} + +function buffer2string(buf) { + let str = ""; + buf.map(x => str += String.fromCharCode(x)); + return str; +} + +function bytesToBase64(u8a){ + let CHUNK_SZ = 0x8000; + let c = []; + for (let i = 0; i < u8a.length; i += CHUNK_SZ) { + c.push(String.fromCharCode.apply(null, u8a.subarray(i, i + CHUNK_SZ))); + } + return window.btoa(c.join("")); +} + +function base64ToBytes(b64encoded) { + return new Uint8Array(window.atob(b64encoded).split("").map(function(c) { + return c.charCodeAt(0); + })); +} + +function bytesToBase64UrlSafe(buf) { + return bytesToBase64(buf) + .replace(/\+/g, "-") + .replace(/\//g, "_") + .replace(/=/g, ""); +} + +function base64ToBytesUrlSafe(str) { + if (str.length % 4 == 1) { + throw "Improper b64 string"; + } + + var b64 = str.replace(/\-/g, "+").replace(/\_/g, "/"); + while (b64.length % 4 != 0) { + b64 += "="; + } + return base64ToBytes(b64); +} + +function hexEncode(buf) { + return Array.from(buf) + .map(x => ("0"+x.toString(16)).substr(-2)) + .join(""); +} + +function hexDecode(str) { + return new Uint8Array(str.match(/../g).map(x => parseInt(x, 16))); +} + +function importPublicKey(keyBytes) { + if (keyBytes[0] != 0x04 || keyBytes.byteLength != 65) { + throw "Bad public key octet string"; + } + var jwk = { + kty: "EC", + crv: "P-256", + x: bytesToBase64UrlSafe(keyBytes.slice(1, 33)), + y: bytesToBase64UrlSafe(keyBytes.slice(33)) + }; + return crypto.subtle.importKey("jwk", jwk, {name: "ECDSA", namedCurve: "P-256"}, true, ["verify"]) +} + +function deriveAppAndChallengeParam(appId, clientData) { + var appIdBuf = string2buffer(appId); + return Promise.all([ + crypto.subtle.digest("SHA-256", appIdBuf), + crypto.subtle.digest("SHA-256", clientData) + ]) + .then(function(digests) { + return { + appParam: new Uint8Array(digests[0]), + challengeParam: new Uint8Array(digests[1]), + }; + }); +} + +function assembleSignedData(appParam, presenceAndCounter, challengeParam) { + let signedData = new Uint8Array(32 + 1 + 4 + 32); + appParam.map((x, i) => signedData[0 + i] = x); + presenceAndCounter.map((x, i) => signedData[32 + i] = x); + challengeParam.map((x, i) => signedData[37 + i] = x); + return signedData; +} + +function assembleRegistrationSignedData(appParam, challengeParam, keyHandle, pubKey) { + let signedData = new Uint8Array(1 + 32 + 32 + keyHandle.length + 65); + signedData[0] = 0x00; + appParam.map((x, i) => signedData[1 + i] = x); + challengeParam.map((x, i) => signedData[33 + i] = x); + keyHandle.map((x, i) => signedData[65 + i] = x); + pubKey.map((x, i) => signedData[65 + keyHandle.length + i] = x); + return signedData; +} + +function sanitizeSigArray(arr) { + // ECDSA signature fields into WebCrypto must be exactly 32 bytes long, so + // this method strips leading padding bytes, if added, and also appends + // padding zeros, if needed. + if (arr.length > 32) { + arr = arr.slice(arr.length - 32) + } + let ret = new Uint8Array(32); + ret.set(arr, ret.length - arr.length); + return ret; +} + +function verifySignature(key, data, derSig) { + let sigAsn1 = org.pkijs.fromBER(derSig.buffer); + let sigR = new Uint8Array(sigAsn1.result.value_block.value[0].value_block.value_hex); + let sigS = new Uint8Array(sigAsn1.result.value_block.value[1].value_block.value_hex); + + // The resulting R and S values from the ASN.1 Sequence must be fit into 32 + // bytes. Sometimes they have leading zeros, sometimes they're too short, it + // all depends on what lib generated the signature. + let R = sanitizeSigArray(sigR); + let S = sanitizeSigArray(sigS); + + let sigData = new Uint8Array(R.length + S.length); + sigData.set(R); + sigData.set(S, R.length); + + let alg = {name: "ECDSA", hash: "SHA-256"}; + return crypto.subtle.verify(alg, key, sigData, data); +} |