summaryrefslogtreecommitdiff
path: root/services/fxaccounts/tests/xpcshell/test_credentials.js
blob: cbd9e4c7a0c5fbf73140062d2d9b2f76bc666a1f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
/* Any copyright is dedicated to the Public Domain.
 * http://creativecommons.org/publicdomain/zero/1.0/ */

Cu.import("resource://gre/modules/Credentials.jsm");
Cu.import("resource://gre/modules/Promise.jsm");
Cu.import("resource://services-common/utils.js");
Cu.import("resource://services-crypto/utils.js");

var {hexToBytes: h2b,
     hexAsString: h2s,
     stringAsHex: s2h,
     bytesAsHex: b2h} = CommonUtils;

// Test vectors for the "onepw" protocol:
// https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol#wiki-test-vectors
var vectors = {
  "client stretch-KDF": {
    email:
      h("616e6472c3a94065 78616d706c652e6f 7267"),
    password:
      h("70c3a4737377c3b6 7264"),
    quickStretchedPW:
      h("e4e8889bd8bd61ad 6de6b95c059d56e7 b50dacdaf62bd846 44af7e2add84345d"),
    authPW:
      h("247b675ffb4c4631 0bc87e26d712153a be5e1c90ef00a478 4594f97ef54f2375"),
    authSalt:
      h("00f0000000000000 0000000000000000 0000000000000000 0000000000000000"),
  },
};

// A simple test suite with no utf8 encoding madness.
add_task(function* test_onepw_setup_credentials() {
  let email = "francine@example.org";
  let password = CommonUtils.encodeUTF8("i like pie");

  let pbkdf2 = CryptoUtils.pbkdf2Generate;
  let hkdf = CryptoUtils.hkdf;

  // quickStretch the email
  let saltyEmail = Credentials.keyWordExtended("quickStretch", email);

  do_check_eq(b2h(saltyEmail), "6964656e746974792e6d6f7a696c6c612e636f6d2f7069636c2f76312f717569636b537472657463683a6672616e63696e65406578616d706c652e6f7267");

  let pbkdf2Rounds = 1000;
  let pbkdf2Len = 32;

  let quickStretchedPW = pbkdf2(password, saltyEmail, pbkdf2Rounds, pbkdf2Len, Ci.nsICryptoHMAC.SHA256, 32);
  let quickStretchedActual = "6b88094c1c73bbf133223f300d101ed70837af48d9d2c1b6e7d38804b20cdde4";
  do_check_eq(b2h(quickStretchedPW), quickStretchedActual);

  // obtain hkdf info
  let authKeyInfo = Credentials.keyWord('authPW');
  do_check_eq(b2h(authKeyInfo), "6964656e746974792e6d6f7a696c6c612e636f6d2f7069636c2f76312f617574685057");

  // derive auth password
  let hkdfSalt = h2b("00");
  let hkdfLen = 32;
  let authPW = hkdf(quickStretchedPW, hkdfSalt, authKeyInfo, hkdfLen);

  do_check_eq(b2h(authPW), "4b8dec7f48e7852658163601ff766124c312f9392af6c3d4e1a247eb439be342");

  // derive unwrap key
  let unwrapKeyInfo = Credentials.keyWord('unwrapBkey');
  let unwrapKey = hkdf(quickStretchedPW, hkdfSalt, unwrapKeyInfo, hkdfLen);

  do_check_eq(b2h(unwrapKey), "8ff58975be391338e4ec5d7138b5ed7b65c7d1bfd1f3a4f93e05aa47d5b72be9");
});

add_task(function* test_client_stretch_kdf() {
  let pbkdf2 = CryptoUtils.pbkdf2Generate;
  let hkdf = CryptoUtils.hkdf;
  let expected = vectors["client stretch-KDF"];

  let email = h2s(expected.email);
  let password = h2s(expected.password);

  // Intermediate value from sjcl implementation in fxa-js-client
  // The key thing is the c3a9 sequence in "andré"
  let salt = Credentials.keyWordExtended("quickStretch", email);
  do_check_eq(b2h(salt), "6964656e746974792e6d6f7a696c6c612e636f6d2f7069636c2f76312f717569636b537472657463683a616e6472c3a9406578616d706c652e6f7267");

  let options = {
    stretchedPassLength: 32,
    pbkdf2Rounds: 1000,
    hmacAlgorithm: Ci.nsICryptoHMAC.SHA256,
    hmacLength: 32,
    hkdfSalt: h2b("00"),
    hkdfLength: 32,
  };

  let results = yield Credentials.setup(email, password, options);

  do_check_eq(expected.quickStretchedPW, b2h(results.quickStretchedPW),
      "quickStretchedPW is wrong");

  do_check_eq(expected.authPW, b2h(results.authPW),
      "authPW is wrong");
});

// End of tests
// Utility functions follow

function run_test() {
  run_next_test();
}

// turn formatted test vectors into normal hex strings
function h(hexStr) {
  return hexStr.replace(/\s+/g, "");
}