import assert from "assert"; import process from "process"; import { WebcryptoTest } from "@peculiar/webcrypto-test"; import { Convert } from "pvtsutils"; import * as core from "webcrypto-core"; import { Crypto } from "../src"; // eslint-disable-next-line @typescript-eslint/no-non-null-assertion const nodeMajorVersion = parseInt(/^v(\d+)/.exec(process.version)![1], 10); const crypto = new Crypto(); WebcryptoTest.check(crypto as any, {}); context("Crypto", () => { context("getRandomValues", () => { it("Uint8Array", () => { const array = new Uint8Array(5); const array2 = crypto.getRandomValues(array); assert.notStrictEqual(Buffer.from(array).toString("hex"), "0000000000"); assert.strictEqual(Buffer.from(array2).equals(array), true); }); it("Uint16Array", () => { const array = new Uint16Array(5); const array2 = crypto.getRandomValues(array); assert.notStrictEqual(Buffer.from(array).toString("hex"), "00000000000000000000"); assert.strictEqual(Buffer.from(array2).equals(Buffer.from(array)), true); }); }); it("Import wrong named curve", async () => { const spki = Buffer.from("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAETzlbSDQWz+1nwEHsrT516OAEX5YWzwVYj39BH+Rv5yoP9yLgM5wIXgOls5DoLDJVQ+45XDrD/xjSCcul5NACZw==", "base64"); await assert.rejects(crypto.subtle.importKey( "spki", spki, { name: "ECDSA", namedCurve: "K-256" } as Algorithm, false, ["verify"]), core.CryptoError); }); it("HKDF derive HMAC key", async () => { const hkdf = await crypto.subtle.importKey("raw", new Uint8Array([1, 2, 3, 4, 5]), { name: "HKDF" }, false, ["deriveKey"]); const hmac = await crypto.subtle.deriveKey({ name: "HKDF", hash: "SHA-256", info: new Uint8Array([1, 2, 3, 4, 5]), salt: new Uint8Array([1, 2, 3, 4, 5]), } as globalThis.HkdfParams, hkdf, { name: "HMAC", hash: "SHA-1", } as globalThis.HmacImportParams, false, ["sign"]); assert.strictEqual((hmac.algorithm as globalThis.HmacKeyAlgorithm).length, 512); }); (nodeMajorVersion < 14 ? context.skip : context)("EdDSA", () => { context("generateKey", () => { it("Ed25519", async () => { const keys = await crypto.subtle.generateKey({ name: "eddsa", namedCurve: "ed25519" } as globalThis.EcKeyGenParams, false, ["sign", "verify"]); assert.strictEqual(keys.privateKey.algorithm.name, "EdDSA"); assert.strictEqual((keys.privateKey.algorithm as EcKeyAlgorithm).namedCurve, "Ed25519"); }); it("Ed448", async () => { const keys = await crypto.subtle.generateKey({ name: "eddsa", namedCurve: "ed448" } as globalThis.EcKeyGenParams, true, ["sign", "verify"]); assert.strictEqual(keys.privateKey.algorithm.name, "EdDSA"); assert.strictEqual((keys.privateKey.algorithm as EcKeyAlgorithm).namedCurve, "Ed448"); const data = await crypto.subtle.exportKey("jwk", keys.privateKey); assert.strictEqual(data.kty, "OKP"); assert.strictEqual(data.crv, "Ed448"); assert.strictEqual(!!data.d, true); const privateKey = await crypto.subtle.importKey("jwk", data, { name: "eddsa", namedCurve: "ed448" } as EcKeyImportParams, false, ["sign"]); const message = Buffer.from("message"); const signature = await crypto.subtle.sign({ name: "EdDSA" }, privateKey, message); const ok = await crypto.subtle.verify({ name: "EdDSA" }, keys.publicKey, signature, message); assert.strictEqual(ok, true); }); }); }); (nodeMajorVersion < 14 ? context.skip : context)("ECDH-ES", () => { context("generateKey", () => { it("X25519", async () => { const keys = await crypto.subtle.generateKey({ name: "ecdh-es", namedCurve: "x25519" } as globalThis.EcKeyGenParams, false, ["deriveBits", "deriveKey"]); assert.strictEqual(keys.privateKey.algorithm.name, "ECDH-ES"); assert.strictEqual((keys.privateKey.algorithm as EcKeyAlgorithm).namedCurve, "X25519"); }); it("X448", async () => { const keys = await crypto.subtle.generateKey({ name: "ecdh-es", namedCurve: "x448" } as globalThis.EcKeyGenParams, true, ["deriveBits", "deriveKey"]); assert.strictEqual(keys.privateKey.algorithm.name, "ECDH-ES"); assert.strictEqual((keys.privateKey.algorithm as EcKeyAlgorithm).namedCurve, "X448"); const bits = await crypto.subtle.deriveBits({ name: "ECDH-ES", public: keys.publicKey } as globalThis.EcdhKeyDeriveParams, keys.privateKey, 256); assert.strictEqual(bits.byteLength, 32); const data = await crypto.subtle.exportKey("jwk", keys.publicKey); assert.strictEqual(data.kty, "OKP"); assert.strictEqual(data.crv, "X448"); assert.strictEqual(!!data.x, true); }); }); }); context("Extra ECC named curves", () => { const namedCurves = [ "brainpoolP160r1", "brainpoolP160t1", "brainpoolP192r1", "brainpoolP192t1", "brainpoolP224r1", "brainpoolP224t1", "brainpoolP256r1", "brainpoolP256t1", "brainpoolP320r1", "brainpoolP320t1", "brainpoolP384r1", "brainpoolP384t1", "brainpoolP512r1", "brainpoolP512t1", ]; context("sign/verify + pkcs8/spki", () => { const data = new Uint8Array(10); namedCurves.forEach((namedCurve) => { it(namedCurve, async () => { const alg: EcKeyGenParams = { name: "ECDSA", namedCurve }; const signAlg = { ...alg, hash: "SHA-256" } as EcdsaParams; const keys = await crypto.subtle.generateKey(alg, true, ["sign", "verify"]); const signature = await crypto.subtle.sign(signAlg, keys.privateKey, data); const ok = await crypto.subtle.verify(signAlg, keys.publicKey, signature, data); assert.ok(ok); const pkcs8 = await crypto.subtle.exportKey("pkcs8", keys.privateKey); const spki = await crypto.subtle.exportKey("spki", keys.publicKey); const privateKey = await crypto.subtle.importKey("pkcs8", pkcs8, alg, true, ["sign"]); const publicKey = await crypto.subtle.importKey("spki", spki, alg, true, ["verify"]); const signature2 = await crypto.subtle.sign(signAlg, privateKey, data); const ok2 = await crypto.subtle.verify(signAlg, keys.publicKey, signature2, data); assert.ok(ok2); const ok3 = await crypto.subtle.verify(signAlg, publicKey, signature, data); assert.ok(ok3); }); }); }); context("deriveBits + jwk", () => { namedCurves.forEach((namedCurve) => { it(namedCurve, async () => { const alg: EcKeyGenParams = { name: "ECDH", namedCurve }; const keys = await crypto.subtle.generateKey(alg, true, ["deriveBits", "deriveKey"]); const deriveAlg: EcdhKeyDeriveParams = { name: "ECDH", public: keys.publicKey }; const derivedBits = await crypto.subtle.deriveBits(deriveAlg, keys.privateKey, 128); const privateJwk = await crypto.subtle.exportKey("jwk", keys.privateKey); const publicJwk = await crypto.subtle.exportKey("jwk", keys.publicKey); const privateKey = await crypto.subtle.importKey("jwk", privateJwk, alg, true, ["deriveBits"]); const publicKey = await crypto.subtle.importKey("jwk", publicJwk, alg, true, []); const derivedBits2 = await crypto.subtle.deriveBits({ name: "ECDH", public: keys.publicKey } as EcdhKeyDeriveParams, privateKey, 128); const derivedBits3 = await crypto.subtle.deriveBits({ name: "ECDH", public: publicKey } as EcdhKeyDeriveParams, keys.privateKey, 128); assert.strictEqual(Convert.ToHex(derivedBits2), Convert.ToHex(derivedBits)); assert.strictEqual(Convert.ToHex(derivedBits3), Convert.ToHex(derivedBits)); }); }); }); }); it("Import Secret JWK without 'alg' and 'key_ops' fields", async () => { const aesKey = await crypto.subtle.generateKey({ name: "AES-CBC", length: 256 }, true, ["encrypt", "decrypt"]); const jwk = await crypto.subtle.exportKey("jwk", aesKey); delete jwk.key_ops; delete jwk.alg; const hmacKey = await crypto.subtle.importKey("jwk", jwk, { name: "HMAC", hash: "SHA-256" } as Algorithm, false, ["sign", "verify"]); assert.strictEqual(hmacKey.algorithm.name, "HMAC"); }); });