1
2function define_tests() {
3    // May want to test prefixed implementations.
4    var subtle = self.crypto.subtle;
5
6    var pkcs8 = {
7        "P-521": new Uint8Array([48, 129, 238, 2, 1, 0, 48, 16, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 5, 43, 129, 4, 0, 35, 4, 129, 214, 48, 129, 211, 2, 1, 1, 4, 66, 1, 166, 126, 211, 33, 145, 90, 100, 170, 53, 155, 125, 100, 141, 220, 38, 24, 250, 142, 141, 24, 103, 232, 247, 24, 48, 177, 13, 37, 237, 40, 145, 250, 241, 47, 60, 126, 117, 66, 26, 46, 162, 100, 249, 169, 21, 50, 13, 39, 79, 225, 71, 7, 66, 185, 132, 233, 107, 152, 145, 32, 129, 250, 205, 71, 141, 161, 129, 137, 3, 129, 134, 0, 4, 0, 32, 157, 72, 63, 40, 102, 104, 129, 198, 100, 31, 58, 18, 111, 64, 15, 81, 228, 101, 17, 112, 254, 103, 140, 117, 232, 87, 18, 226, 134, 138, 220, 133, 8, 36, 153, 123, 235, 240, 188, 130, 180, 48, 40, 166, 210, 236, 23, 119, 202, 69, 39, 159, 114, 6, 163, 234, 139, 92, 210, 7, 63, 73, 62, 69, 0, 12, 181, 76, 58, 90, 202, 162, 104, 197, 103, 16, 66, 136, 120, 217, 139, 138, 251, 246, 138, 97, 33, 83, 99, 40, 70, 216, 7, 233, 38, 114, 105, 143, 27, 156, 97, 29, 231, 211, 142, 52, 205, 108, 115, 136, 144, 146, 197, 110, 82, 214, 128, 241, 223, 208, 146, 184, 122, 200, 239, 159, 243, 200, 251, 72]),
8        "P-256": new Uint8Array([48, 129, 135, 2, 1, 0, 48, 19, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 8, 42, 134, 72, 206, 61, 3, 1, 7, 4, 109, 48, 107, 2, 1, 1, 4, 32, 15, 247, 79, 232, 241, 202, 175, 97, 92, 206, 241, 29, 217, 53, 114, 87, 98, 217, 216, 65, 236, 186, 185, 94, 170, 38, 68, 123, 52, 100, 245, 113, 161, 68, 3, 66, 0, 4, 140, 96, 11, 44, 102, 25, 45, 97, 158, 39, 210, 37, 107, 59, 151, 118, 178, 141, 30, 5, 246, 13, 234, 189, 98, 174, 123, 154, 211, 157, 224, 217, 59, 4, 102, 109, 199, 119, 14, 126, 207, 13, 211, 203, 203, 211, 110, 221, 107, 94, 220, 153, 81, 7, 55, 161, 237, 104, 46, 205, 112, 244, 10, 47]),
9        "P-384": new Uint8Array([48, 129, 182, 2, 1, 0, 48, 16, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 5, 43, 129, 4, 0, 34, 4, 129, 158, 48, 129, 155, 2, 1, 1, 4, 48, 248, 113, 165, 102, 101, 137, 193, 74, 87, 71, 38, 62, 248, 91, 49, 156, 192, 35, 219, 110, 53, 103, 108, 61, 120, 30, 239, 139, 5, 95, 207, 190, 134, 250, 13, 6, 208, 86, 181, 25, 95, 177, 50, 58, 248, 222, 37, 179, 161, 100, 3, 98, 0, 4, 241, 25, 101, 223, 125, 212, 89, 77, 4, 25, 197, 8, 100, 130, 163, 184, 38, 185, 121, 127, 155, 224, 189, 13, 16, 156, 158, 30, 153, 137, 193, 185, 169, 43, 143, 38, 159, 152, 225, 122, 209, 132, 186, 115, 193, 247, 151, 98, 175, 69, 175, 129, 65, 96, 38, 66, 218, 39, 26, 107, 176, 255, 235, 12, 180, 71, 143, 207, 112, 126, 102, 26, 166, 214, 205, 245, 21, 73, 200, 140, 63, 19, 11, 233, 232, 32, 31, 111, 106, 9, 244, 24, 90, 175, 149, 196])
10    };
11
12    var spki = {
13        "P-521": new Uint8Array([48, 129, 155, 48, 16, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 5, 43, 129, 4, 0, 35, 3, 129, 134, 0, 4, 0, 238, 105, 249, 71, 21, 215, 1, 233, 226, 1, 19, 51, 212, 244, 249, 108, 186, 125, 145, 248, 139, 17, 43, 175, 117, 207, 9, 204, 31, 138, 202, 151, 97, 141, 169, 56, 152, 34, 210, 155, 111, 233, 153, 106, 97, 32, 62, 247, 82, 183, 113, 232, 149, 143, 196, 103, 123, 179, 119, 133, 101, 171, 96, 214, 237, 0, 222, 171, 103, 97, 137, 91, 147, 94, 58, 211, 37, 251, 133, 73, 229, 111, 19, 120, 106, 167, 63, 136, 162, 236, 254, 64, 147, 52, 115, 216, 174, 242, 64, 196, 223, 215, 213, 6, 242, 44, 221, 14, 85, 85, 143, 63, 191, 5, 235, 247, 239, 239, 122, 114, 215, 143, 70, 70, 155, 132, 72, 242, 110, 39, 18]),
14        "P-256": new Uint8Array([48, 89, 48, 19, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 8, 42, 134, 72, 206, 61, 3, 1, 7, 3, 66, 0, 4, 154, 116, 32, 120, 126, 95, 77, 105, 211, 232, 34, 114, 115, 1, 109, 56, 224, 71, 129, 133, 223, 127, 238, 156, 142, 103, 60, 202, 211, 79, 126, 128, 254, 49, 141, 182, 221, 107, 119, 218, 99, 32, 165, 246, 151, 89, 9, 68, 23, 177, 52, 239, 138, 139, 116, 193, 101, 4, 57, 198, 115, 0, 90, 61]),
15        "P-384": new Uint8Array([48, 118, 48, 16, 6, 7, 42, 134, 72, 206, 61, 2, 1, 6, 5, 43, 129, 4, 0, 34, 3, 98, 0, 4, 145, 130, 45, 194, 175, 89, 193, 143, 91, 103, 248, 13, 246, 26, 38, 3, 194, 168, 240, 179, 192, 175, 130, 45, 99, 194, 121, 112, 26, 130, 69, 96, 64, 68, 1, 221, 233, 165, 110, 229, 39, 87, 234, 139, 199, 72, 212, 200, 43, 83, 55, 180, 141, 123, 101, 88, 58, 61, 87, 36, 56, 136, 0, 54, 186, 198, 115, 15, 66, 202, 82, 120, 150, 107, 213, 242, 30, 134, 226, 29, 48, 197, 166, 208, 70, 62, 197, 19, 221, 80, 159, 252, 220, 175, 31, 245])
16    };
17
18    var sizes = {
19        "P-521": 66,
20        "P-256": 32,
21        "P-384": 48
22    };
23
24    var derivations = {
25        "P-521": new Uint8Array([0, 156, 43, 206, 87, 190, 128, 173, 171, 59, 7, 56, 91, 142, 89, 144, 235, 125, 111, 222, 189, 176, 27, 243, 83, 113, 164, 246, 7, 94, 157, 40, 138, 193, 42, 109, 254, 3, 170, 87, 67, 188, 129, 112, 157, 73, 168, 34, 148, 2, 25, 182, 75, 118, 138, 205, 82, 15, 161, 54, 142, 160, 175, 141, 71, 93]),
26        "P-256": new Uint8Array([14, 143, 60, 77, 177, 178, 162, 131, 115, 90, 0, 220, 87, 31, 26, 232, 151, 28, 227, 35, 250, 17, 131, 137, 203, 95, 65, 196, 59, 61, 181, 161]),
27        "P-384": new Uint8Array([224, 189, 107, 206, 10, 239, 140, 164, 136, 56, 166, 226, 252, 197, 126, 103, 185, 197, 232, 134, 12, 95, 11, 233, 218, 190, 197, 62, 69, 78, 24, 160, 161, 116, 196, 136, 136, 162, 100, 136, 17, 91, 45, 201, 241, 223, 165, 45])
28    };
29
30    return importKeys(pkcs8, spki, sizes)
31    .then(function(results) {
32        publicKeys = results.publicKeys;
33        privateKeys = results.privateKeys;
34        ecdsaKeyPairs = results.ecdsaKeyPairs;
35        noDeriveKeyKeys = results.noDeriveKeyKeys;
36
37        Object.keys(sizes).forEach(function(namedCurve) {
38            // Basic success case
39            promise_test(function(test) {
40                return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
41                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
42                .then(function(exportedKey) {
43                    assert_true(equalBuffers(exportedKey, derivations[namedCurve], 8 * exportedKey.length), "Derived correct key");
44                }, function(err) {
45                    assert_unreached("deriveKey failed with error " + err.name + ": " + err.message);
46                });
47            }, namedCurve + " good parameters");
48
49            // Case insensitivity check
50            promise_test(function(test) {
51                return subtle.deriveKey({name: "EcDh", public: publicKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
52                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
53                .then(function(exportedKey) {
54                    assert_true(equalBuffers(exportedKey, derivations[namedCurve], 8 * exportedKey.length), "Derived correct key");
55                }, function(err) {
56                    assert_unreached("deriveKey failed with error " + err.name + ": " + err.message);
57                });
58            }, namedCurve + " mixed case parameters");
59            // Errors to test:
60
61            // - missing public property TypeError
62            promise_test(function(test) {
63                return subtle.deriveKey({name: "ECDH"}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
64                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
65                .then(function(exportedKey) {
66                    assert_unreached("deriveKey succeeded but should have failed with TypeError");
67                }, function(err) {
68                    assert_equals(err.name, "TypeError", "Should throw correct error, not " + err.name + ": " + err.message);
69                });
70            }, namedCurve + " missing public curve");
71
72            // - Non CryptoKey public property TypeError
73            promise_test(function(test) {
74                return subtle.deriveKey({name: "ECDH", public: {message: "Not a CryptoKey"}}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
75                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
76                .then(function(exportedKey) {
77                    assert_unreached("deriveKey succeeded but should have failed with TypeError");
78                }, function(err) {
79                    assert_equals(err.name, "TypeError", "Should throw correct error, not " + err.name + ": " + err.message);
80                });
81            }, namedCurve + " public property of algorithm is not a CryptoKey");
82
83            // - wrong named curve
84            promise_test(function(test) {
85                publicKey = publicKeys["P-256"];
86                if (namedCurve === "P-256") {
87                    publicKey = publicKeys["P-384"];
88                }
89                return subtle.deriveKey({name: "ECDH", public: publicKey}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
90                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
91                .then(function(exportedKey) {
92                    assert_unreached("deriveKey succeeded but should have failed with InvalidAccessError");
93                }, function(err) {
94                    assert_equals(err.name, "InvalidAccessError", "Should throw correct error, not " + err.name + ": " + err.message);
95                });
96            }, namedCurve + " mismatched curves");
97
98            // - not ECDH public property InvalidAccessError
99            promise_test(function(test) {
100                return subtle.deriveKey({name: "ECDH", public: ecdsaKeyPairs[namedCurve].publicKey}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
101                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
102                .then(function(exportedKey) {
103                    assert_unreached("deriveKey succeeded but should have failed with InvalidAccessError");
104                }, function(err) {
105                    assert_equals(err.name, "InvalidAccessError", "Should throw correct error, not " + err.name + ": " + err.message);
106                });
107            }, namedCurve + " public property of algorithm is not an ECDSA public key");
108
109            // - No deriveKey usage in baseKey InvalidAccessError
110            promise_test(function(test) {
111                return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, noDeriveKeyKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
112                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
113                .then(function(exportedKey) {
114                    assert_unreached("deriveKey succeeded but should have failed with InvalidAccessError");
115                }, function(err) {
116                    assert_equals(err.name, "InvalidAccessError", "Should throw correct error, not " + err.name + ": " + err.message);
117                });
118            }, namedCurve + " no deriveKey usage for base key");
119
120            // - Use public key for baseKey InvalidAccessError
121            promise_test(function(test) {
122                return subtle.deriveKey({name: "ECDH", public: publicKeys[namedCurve]}, publicKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
123                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
124                .then(function(exportedKey) {
125                    assert_unreached("deriveKey succeeded but should have failed with InvalidAccessError");
126                }, function(err) {
127                    assert_equals(err.name, "InvalidAccessError", "Should throw correct error, not " + err.name + ": " + err.message);
128                });
129            }, namedCurve + " base key is not a private key");
130
131            // - Use private key for public property InvalidAccessError
132            promise_test(function(test) {
133                return subtle.deriveKey({name: "ECDH", public: privateKeys[namedCurve]}, privateKeys[namedCurve], {name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
134                .then(function(key) {return crypto.subtle.exportKey("raw", key);})
135                .then(function(exportedKey) {
136                    assert_unreached("deriveKey succeeded but should have failed with InvalidAccessError");
137                }, function(err) {
138                    assert_equals(err.name, "InvalidAccessError", "Should throw correct error, not " + err.name + ": " + err.message);
139                });
140            }, namedCurve + " public property value is a private key");
141
142            // - Use secret key for public property InvalidAccessError
143            promise_test(function(test) {
144                return subtle.generateKey({name: "HMAC", hash: "SHA-256", length: 256}, true, ["sign", "verify"])
145                .then(function(secretKey) {
146                    return subtle.deriveKey({name: "ECDH", public: secretKey}, privateKeys[namedCurve], {name: "AES-CBC", length: 256}, true, ["sign", "verify"])
147                    .then(function(key) {return crypto.subtle.exportKey("raw", key);})
148                    .then(function(exportedKey) {
149                        assert_unreached("deriveKey succeeded but should have failed with InvalidAccessError");
150                    }, function(err) {
151                        assert_equals(err.name, "InvalidAccessError", "Should throw correct error, not " + err.name + ": " + err.message);
152                    });
153                });
154            }, namedCurve + " public property value is a secret key");
155        });
156    });
157
158    function importKeys(pkcs8, spki, sizes) {
159        var privateKeys = {};
160        var publicKeys = {};
161        var ecdsaKeyPairs = {};
162        var noDeriveKeyKeys = {};
163
164        var promises = [];
165        Object.keys(pkcs8).forEach(function(namedCurve) {
166            var operation = subtle.importKey("pkcs8", pkcs8[namedCurve],
167                                            {name: "ECDH", namedCurve: namedCurve},
168                                            false, ["deriveBits", "deriveKey"])
169                            .then(function(key) {
170                                privateKeys[namedCurve] = key;
171                            }, function (err) {
172                                privateKeys[namedCurve] = null;
173                            });
174            promises.push(operation);
175        });
176        Object.keys(pkcs8).forEach(function(namedCurve) {
177            var operation = subtle.importKey("pkcs8", pkcs8[namedCurve],
178                                            {name: "ECDH", namedCurve: namedCurve},
179                                            false, ["deriveBits"])
180                            .then(function(key) {
181                                noDeriveKeyKeys[namedCurve] = key;
182                            }, function (err) {
183                                noDeriveKeyKeys[namedCurve] = null;
184                            });
185            promises.push(operation);
186        });
187        Object.keys(spki).forEach(function(namedCurve) {
188            var operation = subtle.importKey("spki", spki[namedCurve],
189                                            {name: "ECDH", namedCurve: namedCurve},
190                                            false, [])
191                            .then(function(key) {
192                                publicKeys[namedCurve] = key;
193                            }, function (err) {
194                                publicKeys[namedCurve] = null;
195                            });
196            promises.push(operation);
197        });
198        Object.keys(sizes).forEach(function(namedCurve) {
199            var operation = subtle.generateKey({name: "ECDSA", namedCurve: namedCurve}, false, ["sign", "verify"])
200                            .then(function(keyPair) {
201                                ecdsaKeyPairs[namedCurve] = keyPair;
202                            }, function (err) {
203                                ecdsaKeyPairs[namedCurve] = null;
204                            });
205            promises.push(operation);
206        });
207
208        return Promise.all(promises)
209               .then(function(results) {return {privateKeys: privateKeys, publicKeys: publicKeys, ecdsaKeyPairs: ecdsaKeyPairs, noDeriveKeyKeys: noDeriveKeyKeys}});
210    }
211
212    // Compares two ArrayBuffer or ArrayBufferView objects. If bitCount is
213    // omitted, the two values must be the same length and have the same contents
214    // in every byte. If bitCount is included, only that leading number of bits
215    // have to match.
216    function equalBuffers(a, b, bitCount) {
217        var remainder;
218
219        if (typeof bitCount === "undefined" && a.byteLength !== b.byteLength) {
220            return false;
221        }
222
223        var aBytes = new Uint8Array(a);
224        var bBytes = new Uint8Array(b);
225
226        var length = a.byteLength;
227        if (typeof bitCount !== "undefined") {
228            length = Math.floor(bitCount / 8);
229        }
230
231        for (var i=0; i<length; i++) {
232            if (aBytes[i] !== bBytes[i]) {
233                return false;
234            }
235        }
236
237        if (typeof bitCount !== "undefined") {
238            remainder = bitCount % 8;
239            return aBytes[length] >> (8 - remainder) === bBytes[length] >> (8 - remainder);
240        }
241
242        return true;
243    }
244
245}
246