File: verify.t.mjs

package info (click to toggle)
libnginx-mod-js 0.8.9-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 6,808 kB
  • sloc: ansic: 114,096; perl: 8,447; javascript: 2,520; exp: 487; sh: 322; xml: 312; python: 181; makefile: 18
file content (165 lines) | stat: -rw-r--r-- 5,589 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
/*---
includes: [compatFs.js, compatBuffer.js, compatWebcrypto.js, runTsuite.js, webCryptoUtils.js]
flags: [async]
---*/

async function test(params) {
    let key = await crypto.subtle.importKey(params.key.fmt,
                                            params.key.file,
                                            params.import_alg,
                                            false, ["verify"]);

    let r = await crypto.subtle.verify(params.verify_alg,
                                       key, params.signature,
                                       params.text)
                    .catch (e => {
                        if (e.toString().startsWith("Error: EVP_PKEY_CTX_set_signature_md() failed")) {
                            /* Red Hat Enterprise Linux: SHA-1 is disabled */
                            return "SKIPPED";
                        }
                    });

    if (r == "SKIPPED") {
        return r;
    }

    if (params.expected !== r) {
        throw Error(`${params.import_alg.name} failed expected: "${params.expected}" vs "${r}"`);
    }

    return 'SUCCESS';
}

function p(args, default_opts) {
    let encoder = new TextEncoder();
    let params = merge({}, default_opts);
    params = merge(params, args);

    switch (params.key.fmt) {
    case "spki":
        let pem = fs.readFileSync(`test/webcrypto/${params.key.file}`);
        params.key.file = pem_to_der(pem, "PUBLIC");
        break;
    case "raw":
        params.key.file = Buffer.from(params.key.file, "hex");
        break;
    }

    params.signature = base64decode(fs.readFileSync(`test/webcrypto/${params.signature}`));
    params.text = encoder.encode(params.text);

    return params;
}

let hmac_tsuite = {
    name: "HMAC verify",
    skip: () => (!has_buffer() || !has_webcrypto()),
    T: test,
    prepare_args: p,
    opts: {
        text: "SigneD-TExt",
        key: { fmt: "raw", file: "aabbcc" },
        import_alg: {
            name: "HMAC",
            hash: "SHA-256",
        },
        verify_alg: {
            name: "HMAC",
        },
    },

    tests: [
        { signature: "text.base64.sha256.hmac.sig", expected: true },
        { signature: "text.base64.sha256.hmac.sig.broken", expected: false },
        { import_alg: { hash: "SHA-1" }, signature: "text.base64.sha1.hmac.sig", expected: true },
        { import_alg: { hash: "SHA-1" }, signature: "text.base64.sha256.hmac.sig", expected: false },
        { key: { file: "aabbccdd" }, signature: "text.base64.sha256.hmac.sig", expected: false },
]};

let rsassa_pkcs1_v1_5_tsuite = {
    name: "RSASSA-PKCS1-v1_5 verify",
    skip: () => (!has_buffer() || !has_webcrypto()),
    T: test,
    prepare_args: p,
    opts: {
        text: "SigneD-TExt",
        key: { fmt: "spki", file: "rsa.spki" },
        import_alg: {
            name: "RSASSA-PKCS1-v1_5",
            hash: "SHA-256",
        },
        verify_alg: {
            name: "RSASSA-PKCS1-v1_5",
        },
    },

    tests: [
        { signature: "text.base64.sha256.pkcs1.sig", expected: true },
        { text: "SigneD-TExt2", signature: "text.base64.sha256.pkcs1.sig", expected: false },
        { signature: "text.base64.sha1.pkcs1.sig", expected: false },
        { import_alg: { hash: "SHA-1" }, signature: "text.base64.sha1.pkcs1.sig", expected: true },
        { key: { file: "rsa2.spki"}, signature: "text.base64.sha256.pkcs1.sig", expected: false },
]};

let rsa_pss_tsuite = {
    name: "RSA-PSS verify",
    skip: () => (!has_buffer() || !has_webcrypto()),
    T: test,
    prepare_args: p,
    opts: {
        text: "SigneD-TExt",
        key: { fmt: "spki", file: "rsa.spki" },
        import_alg: {
            name: "RSA-PSS",
            hash: "SHA-256",
        },
        verify_alg: {
            name: "RSA-PSS",
            saltLength: 32,
        },
    },

    tests: [
        { signature: "text.base64.sha256.rsa-pss.32.sig", expected: true },
        { text: "SigneD-TExt2", signature: "text.base64.sha256.rsa-pss.32.sig", expected: false },
        { key: { file: "rsa2.spki"}, signature: "text.base64.sha256.rsa-pss.32.sig", expected: false },
        { verify_alg: { saltLength: 0 }, signature: "text.base64.sha256.rsa-pss.0.sig", expected: true },
        { verify_alg: { saltLength: 0 }, signature: "text.base64.sha256.rsa-pss.0.sig", expected: true },
        { import_alg: { hash: "SHA-1" }, signature: "text.base64.sha256.rsa-pss.32.sig", expected: false },
        { import_alg: { hash: "SHA-1" }, verify_alg: { saltLength: 16 }, signature: "text.base64.sha1.rsa-pss.16.sig",
          expected: true },
        { verify_alg: { saltLength: 16 }, signature: "text.base64.sha256.rsa-pss.32.sig", expected: false },
]};

let ecdsa_tsuite = {
    name: "ECDSA verify",
    skip: () => (!has_buffer() || !has_webcrypto()),
    T: test,
    prepare_args: p,
    opts: {
        text: "SigneD-TExt",
        key: { fmt: "spki", file: "ec.spki" },
        import_alg: {
            name: "ECDSA",
            namedCurve: "P-256",
        },
        verify_alg: {
            name: "ECDSA",
            hash: "SHA-256",
        },
    },

    tests: [
        { signature: "text.base64.sha256.ecdsa.sig", expected: true },
        { signature: "text.base64.sha1.ecdsa.sig", expected: false },
        { verify_alg: { hash: "SHA-1"}, signature: "text.base64.sha1.ecdsa.sig", expected: true },
        { key: { file: "ec2.spki" }, signature: "text.base64.sha256.ecdsa.sig", expected: false },
]};

run([
    hmac_tsuite,
    rsassa_pkcs1_v1_5_tsuite,
    rsa_pss_tsuite,
    ecdsa_tsuite,
])
.then($DONE, $DONE);