mirror of
https://github.com/nodejs/node.git
synced 2025-05-01 08:42:45 +00:00

This reverts commit 2ff93c8975
.
PR-URL: https://github.com/nodejs/node/pull/39437
Reviewed-By: Michaël Zasso <targos@protonmail.com>
Reviewed-By: Richard Lau <rlau@redhat.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
229 lines
5.4 KiB
JavaScript
229 lines
5.4 KiB
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const assert = require('assert');
|
|
const { subtle } = require('crypto').webcrypto;
|
|
|
|
const rsa_pkcs = require('../fixtures/crypto/rsa_pkcs');
|
|
const rsa_pss = require('../fixtures/crypto/rsa_pss');
|
|
|
|
async function testVerify({
|
|
algorithm,
|
|
hash,
|
|
publicKeyBuffer,
|
|
privateKeyBuffer,
|
|
signature,
|
|
plaintext,
|
|
}) {
|
|
const [
|
|
publicKey,
|
|
noVerifyPublicKey,
|
|
privateKey,
|
|
hmacKey,
|
|
ecdsaKeys,
|
|
] = await Promise.all([
|
|
subtle.importKey(
|
|
'spki',
|
|
publicKeyBuffer,
|
|
{ name: algorithm.name, hash },
|
|
false,
|
|
['verify']),
|
|
subtle.importKey(
|
|
'spki',
|
|
publicKeyBuffer,
|
|
{ name: algorithm.name, hash },
|
|
false,
|
|
[ /* No usages */ ]),
|
|
subtle.importKey(
|
|
'pkcs8',
|
|
privateKeyBuffer,
|
|
{ name: algorithm.name, hash },
|
|
false,
|
|
['sign']),
|
|
subtle.generateKey(
|
|
{ name: 'HMAC', hash: 'SHA-256' },
|
|
false,
|
|
['sign']),
|
|
subtle.generateKey(
|
|
{
|
|
name: 'ECDSA',
|
|
namedCurve: 'P-521',
|
|
hash: 'SHA-256',
|
|
},
|
|
false,
|
|
['sign']),
|
|
]);
|
|
|
|
assert(await subtle.verify(algorithm, publicKey, signature, plaintext));
|
|
|
|
// Test verification with altered buffers
|
|
const copy = Buffer.from(plaintext);
|
|
const sigcopy = Buffer.from(signature);
|
|
const p = subtle.verify(algorithm, publicKey, sigcopy, copy);
|
|
copy[0] = 255 - copy[0];
|
|
sigcopy[0] = 255 - sigcopy[0];
|
|
assert(await p);
|
|
|
|
// Test failure when using wrong key
|
|
await assert.rejects(
|
|
subtle.verify(algorithm, privateKey, signature, plaintext), {
|
|
message: /Unable to use this key to verify/
|
|
});
|
|
|
|
await assert.rejects(
|
|
subtle.verify(algorithm, noVerifyPublicKey, signature, plaintext), {
|
|
message: /Unable to use this key to verify/
|
|
});
|
|
|
|
// Test failure when using the wrong algorithms
|
|
await assert.rejects(
|
|
subtle.verify(algorithm, hmacKey, signature, plaintext), {
|
|
message: /Unable to use this key to verify/
|
|
});
|
|
|
|
await assert.rejects(
|
|
subtle.verify(algorithm, ecdsaKeys.publicKey, signature, plaintext), {
|
|
message: /Unable to use this key to verify/
|
|
});
|
|
|
|
// Test failure when signature is altered
|
|
{
|
|
const copy = Buffer.from(signature);
|
|
copy[0] = 255 - copy[0];
|
|
assert(!(await subtle.verify(algorithm, publicKey, copy, plaintext)));
|
|
assert(!(await subtle.verify(
|
|
algorithm,
|
|
publicKey,
|
|
copy.slice(1),
|
|
plaintext)));
|
|
}
|
|
|
|
// Test failure when data is altered
|
|
{
|
|
const copy = Buffer.from(plaintext);
|
|
copy[0] = 255 - copy[0];
|
|
assert(!(await subtle.verify(algorithm, publicKey, signature, copy)));
|
|
}
|
|
|
|
// Test failure when wrong hash is used
|
|
{
|
|
const otherhash = hash === 'SHA-1' ? 'SHA-256' : 'SHA-1';
|
|
assert(!(await subtle.verify({
|
|
...algorithm,
|
|
hash: otherhash
|
|
}, publicKey, signature, copy)));
|
|
}
|
|
|
|
await assert.rejects(
|
|
subtle.verify(
|
|
{ ...algorithm, hash: 'sha256' },
|
|
publicKey,
|
|
signature,
|
|
copy),
|
|
{ message: /Unrecognized name/ });
|
|
}
|
|
|
|
async function testSign({
|
|
algorithm,
|
|
hash,
|
|
publicKeyBuffer,
|
|
privateKeyBuffer,
|
|
signature,
|
|
plaintext,
|
|
}) {
|
|
const [
|
|
publicKey,
|
|
noSignPrivateKey,
|
|
privateKey,
|
|
hmacKey,
|
|
ecdsaKeys,
|
|
] = await Promise.all([
|
|
subtle.importKey(
|
|
'spki',
|
|
publicKeyBuffer,
|
|
{ name: algorithm.name, hash },
|
|
false,
|
|
['verify']),
|
|
subtle.importKey(
|
|
'pkcs8',
|
|
privateKeyBuffer,
|
|
{ name: algorithm.name, hash },
|
|
false,
|
|
[ /* No usages */ ]),
|
|
subtle.importKey(
|
|
'pkcs8',
|
|
privateKeyBuffer,
|
|
{ name: algorithm.name, hash },
|
|
false,
|
|
['sign']),
|
|
subtle.generateKey(
|
|
{ name: 'HMAC', hash: 'SHA-256' },
|
|
false,
|
|
['sign']),
|
|
subtle.generateKey(
|
|
{
|
|
name: 'ECDSA',
|
|
namedCurve: 'P-521',
|
|
hash: 'SHA-256',
|
|
},
|
|
false,
|
|
['sign']),
|
|
]);
|
|
|
|
{
|
|
const sig = await subtle.sign(algorithm, privateKey, plaintext);
|
|
assert.strictEqual(sig.byteLength, signature.byteLength);
|
|
assert(await subtle.verify(algorithm, publicKey, sig, plaintext));
|
|
}
|
|
|
|
{
|
|
const copy = Buffer.from(plaintext);
|
|
const p = subtle.sign(algorithm, privateKey, copy);
|
|
copy[0] = 255 - copy[0];
|
|
const sig = await p;
|
|
assert(await subtle.verify(algorithm, publicKey, sig, plaintext));
|
|
}
|
|
|
|
// Test failure when using wrong key
|
|
await assert.rejects(
|
|
subtle.sign(algorithm, publicKey, plaintext), {
|
|
message: /Unable to use this key to sign/
|
|
});
|
|
|
|
// Test failure when no sign usage
|
|
await assert.rejects(
|
|
subtle.sign(algorithm, noSignPrivateKey, plaintext), {
|
|
message: /Unable to use this key to sign/
|
|
});
|
|
|
|
// Test failure when using the wrong algorithms
|
|
await assert.rejects(
|
|
subtle.sign(algorithm, hmacKey, plaintext), {
|
|
message: /Unable to use this key to sign/
|
|
});
|
|
|
|
await assert.rejects(
|
|
subtle.sign(algorithm, ecdsaKeys.privateKey, plaintext), {
|
|
message: /Unable to use this key to sign/
|
|
});
|
|
}
|
|
|
|
(async function() {
|
|
const variations = [];
|
|
|
|
rsa_pkcs().forEach((vector) => {
|
|
variations.push(testVerify(vector));
|
|
variations.push(testSign(vector));
|
|
});
|
|
rsa_pss().forEach((vector) => {
|
|
variations.push(testVerify(vector));
|
|
variations.push(testSign(vector));
|
|
});
|
|
|
|
await Promise.all(variations);
|
|
})().then(common.mustCall());
|