fork-openpgpjs/test/crypto/eax.js
2023-02-21 18:27:56 +01:00

174 lines
5.9 KiB
JavaScript

// Modified by ProtonTech AG
// Adapted from https://github.com/artjomb/cryptojs-extension/blob/8c61d159/test/eax.js
const sandbox = require('sinon/lib/sinon/sandbox');
const { use: chaiUse, expect } = require('chai');
chaiUse(require('chai-as-promised'));
const openpgp = typeof window !== 'undefined' && window.openpgp ? window.openpgp : require('../..');
const EAX = require('../../src/crypto/mode/eax');
const util = require('../../src/util');
function testAESEAX() {
it('Passes all test vectors', async function() {
const vectors = [
// From http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf ...
{
msg: '',
key: '233952DEE4D5ED5F9B9C6D6FF80FF478',
nonce: '62EC67F9C3A4A407FCB2A8C49031A8B3',
header: '6BFB914FD07EAE6B',
ct: 'E037830E8389F27B025A2D6527E79D01'
},
{
msg: 'F7FB',
key: '91945D3F4DCBEE0BF45EF52255F095A4',
nonce: 'BECAF043B0A23D843194BA972C66DEBD',
header: 'FA3BFD4806EB53FA',
ct: '19DD5C4C9331049D0BDAB0277408F67967E5'
},
{
msg: '1A47CB4933',
key: '01F74AD64077F2E704C0F60ADA3DD523',
nonce: '70C3DB4F0D26368400A10ED05D2BFF5E',
header: '234A3463C1264AC6',
ct: 'D851D5BAE03A59F238A23E39199DC9266626C40F80'
},
{
msg: '481C9E39B1',
key: 'D07CF6CBB7F313BDDE66B727AFD3C5E8',
nonce: '8408DFFF3C1A2B1292DC199E46B7D617',
header: '33CCE2EABFF5A79D',
ct: '632A9D131AD4C168A4225D8E1FF755939974A7BEDE'
},
{
msg: '40D0C07DA5E4',
key: '35B6D0580005BBC12B0587124557D2C2',
nonce: 'FDB6B06676EEDC5C61D74276E1F8E816',
header: 'AEB96EAEBE2970E9',
ct: '071DFE16C675CB0677E536F73AFE6A14B74EE49844DD'
},
{
msg: '4DE3B35C3FC039245BD1FB7D',
key: 'BD8E6E11475E60B268784C38C62FEB22',
nonce: '6EAC5C93072D8E8513F750935E46DA1B',
header: 'D4482D1CA78DCE0F',
ct: '835BB4F15D743E350E728414ABB8644FD6CCB86947C5E10590210A4F'
},
{
msg: '8B0A79306C9CE7ED99DAE4F87F8DD61636',
key: '7C77D6E813BED5AC98BAA417477A2E7D',
nonce: '1A8C98DCD73D38393B2BF1569DEEFC19',
header: '65D2017990D62528',
ct: '02083E3979DA014812F59F11D52630DA30137327D10649B0AA6E1C181DB617D7F2'
},
{
msg: '1BDA122BCE8A8DBAF1877D962B8592DD2D56',
key: '5FFF20CAFAB119CA2FC73549E20F5B0D',
nonce: 'DDE59B97D722156D4D9AFF2BC7559826',
header: '54B9F04E6A09189A',
ct: '2EC47B2C4954A489AFC7BA4897EDCDAE8CC33B60450599BD02C96382902AEF7F832A'
},
{
msg: '6CF36720872B8513F6EAB1A8A44438D5EF11',
key: 'A4A4782BCFFD3EC5E7EF6D8C34A56123',
nonce: 'B781FCF2F75FA5A8DE97A9CA48E522EC',
header: '899A175897561D7E',
ct: '0DE18FD0FDD91E7AF19F1D8EE8733938B1E8E7F6D2231618102FDB7FE55FF1991700'
},
{
msg: 'CA40D7446E545FFAED3BD12A740A659FFBBB3CEAB7',
key: '8395FCF1E95BEBD697BD010BC766AAC3',
nonce: '22E7ADD93CFC6393C57EC0B3C17D6B44',
header: '126735FCC320D25A',
ct: 'CB8920F87A6C75CFF39627B56E3ED197C552D295A7CFC46AFC253B4652B1AF3795B124AB6E'
}
];
const cipher = openpgp.enums.symmetric.aes128;
await Promise.all(vectors.map(async vec => {
const keyBytes = util.hexToUint8Array(vec.key);
const msgBytes = util.hexToUint8Array(vec.msg);
const nonceBytes = util.hexToUint8Array(vec.nonce);
const headerBytes = util.hexToUint8Array(vec.header);
const ctBytes = util.hexToUint8Array(vec.ct);
const eax = await EAX(cipher, keyBytes);
// encryption test
let ct = await eax.encrypt(msgBytes, nonceBytes, headerBytes);
expect(util.uint8ArrayToHex(ct)).to.equal(vec.ct.toLowerCase());
// decryption test with verification
let pt = await eax.decrypt(ctBytes, nonceBytes, headerBytes);
expect(util.uint8ArrayToHex(pt)).to.equal(vec.msg.toLowerCase());
// tampering detection test
ct = await eax.encrypt(msgBytes, nonceBytes, headerBytes);
ct[2] ^= 8;
pt = eax.decrypt(ct, nonceBytes, headerBytes);
await expect(pt).to.eventually.be.rejectedWith('Authentication tag mismatch');
// testing without additional data
ct = await eax.encrypt(msgBytes, nonceBytes, new Uint8Array());
pt = await eax.decrypt(ct, nonceBytes, new Uint8Array());
expect(util.uint8ArrayToHex(pt)).to.equal(vec.msg.toLowerCase());
// testing with multiple additional data
ct = await eax.encrypt(msgBytes, nonceBytes, util.concatUint8Array([headerBytes, headerBytes, headerBytes]));
pt = await eax.decrypt(ct, nonceBytes, util.concatUint8Array([headerBytes, headerBytes, headerBytes]));
expect(util.uint8ArrayToHex(pt)).to.equal(vec.msg.toLowerCase());
}));
});
}
/* eslint-disable no-invalid-this */
module.exports = () => describe('Symmetric AES-EAX', function() {
let sinonSandbox;
let getWebCryptoStub;
let getNodeCryptoStub;
const disableNative = () => {
enableNative();
// stubbed functions return undefined
getWebCryptoStub = sinonSandbox.stub(util, 'getWebCrypto');
getNodeCryptoStub = sinonSandbox.stub(util, 'getNodeCrypto');
};
const enableNative = () => {
getWebCryptoStub && getWebCryptoStub.restore();
getNodeCryptoStub && getNodeCryptoStub.restore();
};
describe('Symmetric AES-EAX (native)', function() {
before(function () {
const detectNative = () => !!(util.getWebCrypto() || util.getNodeCrypto());
if (!detectNative()) { this.skip(); }
});
beforeEach(function () {
sinonSandbox = sandbox.create();
enableNative();
});
afterEach(function () {
sinonSandbox.restore();
});
testAESEAX();
});
describe('Symmetric AES-EAX (asm.js fallback)', function() {
beforeEach(function () {
sinonSandbox = sandbox.create();
disableNative();
});
afterEach(function () {
sinonSandbox.restore();
});
testAESEAX();
});
});