test_jpake.js 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. var Cc = Components.classes;
  2. var Ci = Components.interfaces;
  3. // Ensure PSM is initialized.
  4. Cc["@mozilla.org/psm;1"].getService(Ci.nsISupports);
  5. function do_check_throws(func) {
  6. let have_error = false;
  7. try {
  8. func();
  9. } catch(ex) {
  10. dump("Was expecting an exception. Caught: " + ex + "\n");
  11. have_error = true;
  12. }
  13. do_check_true(have_error);
  14. }
  15. function test_success() {
  16. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  17. .createInstance(Ci.nsISyncJPAKE);
  18. let b = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  19. .createInstance(Ci.nsISyncJPAKE);
  20. let a_gx1 = {};
  21. let a_gv1 = {};
  22. let a_r1 = {};
  23. let a_gx2 = {};
  24. let a_gv2 = {};
  25. let a_r2 = {};
  26. let b_gx1 = {};
  27. let b_gv1 = {};
  28. let b_r1 = {};
  29. let b_gx2 = {};
  30. let b_gv2 = {};
  31. let b_r2 = {};
  32. a.round1("alice", a_gx1, a_gv1, a_r1, a_gx2, a_gv2, a_r2);
  33. b.round1("bob", b_gx1, b_gv1, b_r1, b_gx2, b_gv2, b_r2);
  34. let a_A = {};
  35. let a_gva = {};
  36. let a_ra = {};
  37. let b_A = {};
  38. let b_gva = {};
  39. let b_ra = {};
  40. a.round2("bob", "sekrit", b_gx1.value, b_gv1.value, b_r1.value,
  41. b_gx2.value, b_gv2.value, b_r2.value, a_A, a_gva, a_ra);
  42. b.round2("alice", "sekrit", a_gx1.value, a_gv1.value, a_r1.value,
  43. a_gx2.value, a_gv2.value, a_r2.value, b_A, b_gva, b_ra);
  44. let a_aes = {};
  45. let a_hmac = {};
  46. let b_aes = {};
  47. let b_hmac = {};
  48. a.final(b_A.value, b_gva.value, b_ra.value, "ohai", a_aes, a_hmac);
  49. b.final(a_A.value, a_gva.value, a_ra.value, "ohai", b_aes, b_hmac);
  50. do_check_eq(a_aes.value, b_aes.value);
  51. do_check_eq(a_hmac.value, b_hmac.value);
  52. }
  53. function test_failure(modlen) {
  54. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  55. .createInstance(Ci.nsISyncJPAKE);
  56. let b = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  57. .createInstance(Ci.nsISyncJPAKE);
  58. let a_gx1 = {};
  59. let a_gv1 = {};
  60. let a_r1 = {};
  61. let a_gx2 = {};
  62. let a_gv2 = {};
  63. let a_r2 = {};
  64. let b_gx1 = {};
  65. let b_gv1 = {};
  66. let b_r1 = {};
  67. let b_gx2 = {};
  68. let b_gv2 = {};
  69. let b_r2 = {};
  70. a.round1("alice", a_gx1, a_gv1, a_r1, a_gx2, a_gv2, a_r2);
  71. b.round1("bob", b_gx1, b_gv1, b_r1, b_gx2, b_gv2, b_r2);
  72. let a_A = {};
  73. let a_gva = {};
  74. let a_ra = {};
  75. let b_A = {};
  76. let b_gva = {};
  77. let b_ra = {};
  78. // Note how the PINs are different (secret vs. sekrit)
  79. a.round2("bob", "secret", b_gx1.value, b_gv1.value, b_r1.value,
  80. b_gx2.value, b_gv2.value, b_r2.value, a_A, a_gva, a_ra);
  81. b.round2("alice", "sekrit", a_gx1.value, a_gv1.value, a_r1.value,
  82. a_gx2.value, a_gv2.value, a_r2.value, b_A, b_gva, b_ra);
  83. let a_aes = {};
  84. let a_hmac = {};
  85. let b_aes = {};
  86. let b_hmac = {};
  87. a.final(b_A.value, b_gva.value, b_ra.value, "ohai", a_aes, a_hmac);
  88. b.final(a_A.value, a_gva.value, a_ra.value, "ohai", b_aes, b_hmac);
  89. do_check_neq(a_aes.value, b_aes.value);
  90. do_check_neq(a_hmac.value, b_hmac.value);
  91. }
  92. function test_same_signerids() {
  93. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  94. .createInstance(Ci.nsISyncJPAKE);
  95. let b = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  96. .createInstance(Ci.nsISyncJPAKE);
  97. let gx1 = {};
  98. let gv1 = {};
  99. let r1 = {};
  100. let gx2 = {};
  101. let gv2 = {};
  102. let r2 = {};
  103. a.round1("alice", {}, {}, {}, {}, {}, {});
  104. b.round1("alice", gx1, gv1, r1, gx2, gv2, r2);
  105. do_check_throws(function() {
  106. a.round2("alice", "sekrit", gx1.value, gv1.value, r1.value,
  107. gx2.value, gv2.value, r2.value, {}, {}, {});
  108. });
  109. }
  110. function test_bad_zkp() {
  111. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  112. .createInstance(Ci.nsISyncJPAKE);
  113. let b = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  114. .createInstance(Ci.nsISyncJPAKE);
  115. let gx1 = {};
  116. let gv1 = {};
  117. let r1 = {};
  118. let gx2 = {};
  119. let gv2 = {};
  120. let r2 = {};
  121. a.round1("alice", {}, {}, {}, {}, {}, {});
  122. b.round1("bob", gx1, gv1, r1, gx2, gv2, r2);
  123. do_check_throws(function() {
  124. a.round2("invalid", "sekrit", gx1.value, gv1.value, r1.value,
  125. gx2.value, gv2.value, r2.value, {}, {}, {});
  126. });
  127. }
  128. function test_x4_zero() {
  129. // The PKCS#11 API for J-PAKE does not allow us to choose any of the nonces.
  130. // In order to test the defence against x4 (mod p) == 1, we had to generate
  131. // our own signed nonces using a the FreeBL JPAKE_Sign function directly.
  132. // To verify the signatures are accurate, pass the given value of R as the
  133. // "testRandom" parameter to FreeBL's JPAKE_Sign, along with the given values
  134. // for X and GX, using signerID "alice". Then verify that each GV returned
  135. // from JPAKE_Sign matches the value specified here.
  136. let test = function(badGX, badX_GV, badX_R) {
  137. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  138. .createInstance(Ci.nsISyncJPAKE);
  139. let b = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  140. .createInstance(Ci.nsISyncJPAKE);
  141. let a_gx1 = {};
  142. let a_gv1 = {};
  143. let a_r1 = {};
  144. let a_gx2 = {};
  145. let a_gv2 = {};
  146. let a_r2 = {};
  147. let b_gx1 = {};
  148. let b_gv1 = {};
  149. let b_r1 = {};
  150. let b_gx2 = {};
  151. let b_gv2 = {};
  152. let b_r2 = {};
  153. a.round1("alice", a_gx1, a_gv1, a_r1, a_gx2, a_gv2, a_r2);
  154. b.round1("bob", b_gx1, b_gv1, b_r1, b_gx2, b_gv2, b_r2);
  155. // Replace the g^x2 generated by A with the given illegal value.
  156. a_gx2.value = badGX;
  157. a_gv2.value = badX_GV;
  158. a_r2.value = badX_R;
  159. let b_A = {};
  160. let b_gva = {};
  161. let b_ra = {};
  162. do_check_throws(function() {
  163. b.round2("alice", "secret", a_gx1.value, a_gv1.value, a_r1.value,
  164. a_gx2.value, a_gv2.value, a_r2.value, b_A, b_gva, b_ra);
  165. });
  166. };
  167. // g^x is NIST 3072's p + 1, (p + 1) mod p == 1, x == 0
  168. test("90066455B5CFC38F9CAA4A48B4281F292C260FEEF01FD61037E56258A7795A1C"
  169. + "7AD46076982CE6BB956936C6AB4DCFE05E6784586940CA544B9B2140E1EB523F"
  170. + "009D20A7E7880E4E5BFA690F1B9004A27811CD9904AF70420EEFD6EA11EF7DA1"
  171. + "29F58835FF56B89FAA637BC9AC2EFAAB903402229F491D8D3485261CD068699B"
  172. + "6BA58A1DDBBEF6DB51E8FE34E8A78E542D7BA351C21EA8D8F1D29F5D5D159394"
  173. + "87E27F4416B0CA632C59EFD1B1EB66511A5A0FBF615B766C5862D0BD8A3FE7A0"
  174. + "E0DA0FB2FE1FCB19E8F9996A8EA0FCCDE538175238FC8B0EE6F29AF7F642773E"
  175. + "BE8CD5402415A01451A840476B2FCEB0E388D30D4B376C37FE401C2A2C2F941D"
  176. + "AD179C540C1C8CE030D460C4D983BE9AB0B20F69144C1AE13F9383EA1C08504F"
  177. + "B0BF321503EFE43488310DD8DC77EC5B8349B8BFE97C2C560EA878DE87C11E3D"
  178. + "597F1FEA742D73EEC7F37BE43949EF1A0D15C3F3E3FC0A8335617055AC91328E"
  179. + "C22B50FC15B941D3D1624CD88BC25F3E941FDDC6200689581BFEC416B4B2CB74",
  180. "5386107A0DD4A96ECF8D9BCF864BDE23AAEF13351F5550D777A32C1FEC165ED67AE51"
  181. + "66C3876AABC1FED1A0993754F3AEE256530F529548F8FE010BC0D070175569845"
  182. + "CF009AD24BC897A9CA1F18E1A9CE421DD54FD93AB528BC2594B47791713165276"
  183. + "7B76903190C3DCD2076FEC1E61FFFC32D1B07273B06EA2889E66FCBFD41FE8984"
  184. + "5FCE36056B09D1F20E58BB6BAA07A32796F11998BEF0AB3D387E2FB4FE3073FEB"
  185. + "634BA91709010A70DA29C06F8F92D638C4F158680EAFEB5E0E323BD7DACB671C0"
  186. + "BA3EDEEAB5CAA243CABAB28E7205AC9A0AAEAFE132635DAC7FE001C19F880A96E"
  187. + "395C42536D694F81B4F44DC66D7D6FBE933C56ABF585837291D8751C18EB1F3FB"
  188. + "620582E6A7B795D699E38C270863A289583CB9D07651E6BA3B82BC656B49BD09B"
  189. + "6B8C27F370120C7CB89D0829BE51D56356EA836012E9204FF4D1CA8B1B7F9C768"
  190. + "4BB2B0F226FD4042EEBAD931FDBD4F81F8425B305752F5E37FFA2B73BB5A034EC"
  191. + "7EEF5AAC92EA212897E3A2B8961D2147710ECCE127B942AB2",
  192. "05CC4DF005FE006C11111624E14806E4A904A4D1D6A53E795AC7867A960CD4FD");
  193. // x == 0 implies g^x == 1
  194. test("01",
  195. "488759644532FA7C53E5239F2A365D4B9189582BDD2967A1852FE56568382B65"
  196. + "C66BDFCD9B581EAEF4BB497CAF1290ECDFA47A1D1658DC5DC9248D9A4135"
  197. + "DC70B6A8497CDF117236841FA18500DC696A92EEF5000ABE68E9C75B37BC"
  198. + "6A722126BE728163AA90A6B03D5585994D3403557EEF08E819C72D143BBC"
  199. + "CDF74559645066CB3607E1B0430365356389FC8FB3D66FD2B6E2E834EC23"
  200. + "0B0234956752D07F983C918488C8E5A124B062D50B44C5E6FB36BCB03E39"
  201. + "0385B17CF8062B6688371E6AF5915C2B1AAA31C9294943CC6DC1B994FC09"
  202. + "49CA31828B83F3D6DFB081B26045DFD9F10092588B63F1D6E68881A06522"
  203. + "5A417CA9555B036DE89D349AC794A43EB28FE320F9A321F06A9364C88B54"
  204. + "99EEF4816375B119824ACC9AA56D1340B6A49D05F855DE699B351012028C"
  205. + "CA43001F708CC61E71CA3849935BEEBABC0D268CD41B8D2B8DCA705FDFF8"
  206. + "1DAA772DA96EDEA0B291FD5C0C1B8EFE5318D37EBC1BFF53A9DDEC4171A6"
  207. + "479E341438970058E25C8F2BCDA6166C8BF1B065C174",
  208. "8B2BACE575179D762F6F2FFDBFF00B497C07766AB3EED9961447CF6F43D06A97");
  209. }
  210. function test_invalid_input_round2() {
  211. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  212. .createInstance(Ci.nsISyncJPAKE);
  213. a.round1("alice", {}, {}, {}, {}, {}, {});
  214. do_check_throws(function() {
  215. a.round2("invalid", "sekrit", "some", "real", "garbage",
  216. "even", "more", "garbage", {}, {}, {});
  217. });
  218. }
  219. function test_invalid_input_final() {
  220. let a = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  221. .createInstance(Ci.nsISyncJPAKE);
  222. let b = Cc["@mozilla.org/services-crypto/sync-jpake;1"]
  223. .createInstance(Ci.nsISyncJPAKE);
  224. let gx1 = {};
  225. let gv1 = {};
  226. let r1 = {};
  227. let gx2 = {};
  228. let gv2 = {};
  229. let r2 = {};
  230. a.round1("alice", {}, {}, {}, {}, {}, {});
  231. b.round1("bob", gx1, gv1, r1, gx2, gv2, r2);
  232. a.round2("bob", "sekrit", gx1.value, gv1.value, r1.value,
  233. gx2.value, gv2.value, r2.value, {}, {}, {});
  234. do_check_throws(function() {
  235. a.final("some", "garbage", "alright", "foobar-info", {}, {});
  236. });
  237. }
  238. function run_test() {
  239. test_x4_zero();
  240. test_success();
  241. test_failure();
  242. test_same_signerids();
  243. test_bad_zkp();
  244. test_invalid_input_round2();
  245. test_invalid_input_final();
  246. }