mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
448d9b94ac
--HG-- rename : services/sync/modules/base_records/wbo.js => services/sync/modules/record.js
255 lines
8.4 KiB
JavaScript
255 lines
8.4 KiB
JavaScript
var btoa;
|
|
|
|
Cu.import("resource://services-sync/record.js");
|
|
Cu.import("resource://services-sync/constants.js");
|
|
btoa = Cu.import("resource://services-sync/util.js").btoa;
|
|
|
|
function test_time_keyFromString(iterations) {
|
|
let k;
|
|
let o;
|
|
let b = new BulkKeyBundle();
|
|
let d = Utils.decodeKeyBase32("ababcdefabcdefabcdefabcdef");
|
|
b.generateRandom();
|
|
|
|
_("Running " + iterations + " iterations of hmacKeyObject + sha256HMACBytes.");
|
|
for (let i = 0; i < iterations; ++i) {
|
|
let k = b.hmacKeyObject;
|
|
o = Utils.sha256HMACBytes(d, k);
|
|
}
|
|
do_check_true(!!o);
|
|
_("Done.");
|
|
}
|
|
|
|
function test_repeated_hmac() {
|
|
let testKey = "ababcdefabcdefabcdefabcdef";
|
|
let k = Utils.makeHMACKey("foo");
|
|
let one = Utils.sha256HMACBytes(Utils.decodeKeyBase32(testKey), k);
|
|
let two = Utils.sha256HMACBytes(Utils.decodeKeyBase32(testKey), k);
|
|
do_check_eq(one, two);
|
|
}
|
|
|
|
function do_check_array_eq(a1, a2) {
|
|
do_check_eq(a1.length, a2.length);
|
|
for (let i = 0; i < a1.length; ++i) {
|
|
do_check_eq(a1[i], a2[i]);
|
|
}
|
|
}
|
|
|
|
function test_keymanager() {
|
|
let testKey = "ababcdefabcdefabcdefabcdef";
|
|
|
|
let username = "john@example.com";
|
|
|
|
// Decode the key here to mirror what generateEntry will do,
|
|
// but pass it encoded into the KeyBundle call below.
|
|
|
|
let sha256inputE = "" + HMAC_INPUT + username + "\x01";
|
|
let key = Utils.makeHMACKey(Utils.decodeKeyBase32(testKey));
|
|
let encryptKey = Utils.sha256HMACBytes(sha256inputE, key);
|
|
|
|
let sha256inputH = encryptKey + HMAC_INPUT + username + "\x02";
|
|
let hmacKey = Utils.sha256HMACBytes(sha256inputH, key);
|
|
|
|
// Encryption key is stored in base64 for WeaveCrypto convenience.
|
|
do_check_eq(btoa(encryptKey), new SyncKeyBundle(null, username, testKey).encryptionKey);
|
|
do_check_eq(hmacKey, new SyncKeyBundle(null, username, testKey).hmacKey);
|
|
|
|
// Test with the same KeyBundle for both.
|
|
let obj = new SyncKeyBundle(null, username, testKey);
|
|
do_check_eq(hmacKey, obj.hmacKey);
|
|
do_check_eq(btoa(encryptKey), obj.encryptionKey);
|
|
}
|
|
|
|
function do_check_keypair_eq(a, b) {
|
|
do_check_eq(2, a.length);
|
|
do_check_eq(2, b.length);
|
|
do_check_eq(a[0], b[0]);
|
|
do_check_eq(a[1], b[1]);
|
|
}
|
|
|
|
function test_collections_manager() {
|
|
let log = Log4Moz.repository.getLogger("Test");
|
|
Log4Moz.repository.rootLogger.addAppender(new Log4Moz.DumpAppender());
|
|
|
|
let keyBundle = ID.set("WeaveCryptoID",
|
|
new SyncKeyBundle(PWDMGR_PASSPHRASE_REALM, "john@example.com", "a-bbbbb-ccccc-ddddd-eeeee-fffff"));
|
|
|
|
/*
|
|
* Build a test version of storage/crypto/keys.
|
|
* Encrypt it with the sync key.
|
|
* Pass it into the CollectionKeyManager.
|
|
*/
|
|
|
|
log.info("Building storage keys...");
|
|
let storage_keys = new CryptoWrapper("crypto", "keys");
|
|
let default_key64 = Svc.Crypto.generateRandomKey();
|
|
let default_hmac64 = Svc.Crypto.generateRandomKey();
|
|
let bookmarks_key64 = Svc.Crypto.generateRandomKey();
|
|
let bookmarks_hmac64 = Svc.Crypto.generateRandomKey();
|
|
|
|
storage_keys.cleartext = {
|
|
"default": [default_key64, default_hmac64],
|
|
"collections": {"bookmarks": [bookmarks_key64, bookmarks_hmac64]},
|
|
};
|
|
storage_keys.modified = Date.now()/1000;
|
|
storage_keys.id = "keys";
|
|
|
|
log.info("Encrypting storage keys...");
|
|
|
|
// Use passphrase (sync key) itself to encrypt the key bundle.
|
|
storage_keys.encrypt(keyBundle);
|
|
|
|
// Sanity checking.
|
|
do_check_true(null == storage_keys.cleartext);
|
|
do_check_true(null != storage_keys.ciphertext);
|
|
|
|
log.info("Updating CollectionKeys.");
|
|
|
|
// updateContents decrypts the object, releasing the payload for us to use.
|
|
// Returns true, because the default key has changed.
|
|
do_check_true(CollectionKeys.updateContents(keyBundle, storage_keys));
|
|
let payload = storage_keys.cleartext;
|
|
|
|
_("CK: " + JSON.stringify(CollectionKeys._collections));
|
|
|
|
// Test that the CollectionKeyManager returns a similar WBO.
|
|
let wbo = CollectionKeys.asWBO("crypto", "keys");
|
|
|
|
_("WBO: " + JSON.stringify(wbo));
|
|
_("WBO cleartext: " + JSON.stringify(wbo.cleartext));
|
|
|
|
// Check the individual contents.
|
|
do_check_eq(wbo.collection, "crypto");
|
|
do_check_eq(wbo.id, "keys");
|
|
do_check_eq(storage_keys.modified, wbo.modified);
|
|
do_check_true(!!wbo.cleartext.default);
|
|
do_check_keypair_eq(payload.default, wbo.cleartext.default);
|
|
do_check_keypair_eq(payload.collections.bookmarks, wbo.cleartext.collections.bookmarks);
|
|
|
|
do_check_true('bookmarks' in CollectionKeys._collections);
|
|
do_check_false('tabs' in CollectionKeys._collections);
|
|
|
|
_("Updating contents twice with the same data doesn't proceed.");
|
|
storage_keys.encrypt(keyBundle);
|
|
do_check_false(CollectionKeys.updateContents(keyBundle, storage_keys));
|
|
|
|
/*
|
|
* Test that we get the right keys out when we ask for
|
|
* a collection's tokens.
|
|
*/
|
|
let b1 = new BulkKeyBundle(null, "bookmarks");
|
|
b1.keyPair = [bookmarks_key64, bookmarks_hmac64];
|
|
let b2 = CollectionKeys.keyForCollection("bookmarks");
|
|
do_check_keypair_eq(b1.keyPair, b2.keyPair);
|
|
|
|
// Check key equality.
|
|
do_check_true(b1.equals(b2));
|
|
do_check_true(b2.equals(b1));
|
|
|
|
b1 = new BulkKeyBundle(null, "[default]");
|
|
b1.keyPair = [default_key64, default_hmac64];
|
|
|
|
do_check_false(b1.equals(b2));
|
|
do_check_false(b2.equals(b1));
|
|
|
|
b2 = CollectionKeys.keyForCollection(null);
|
|
do_check_keypair_eq(b1.keyPair, b2.keyPair);
|
|
|
|
/*
|
|
* Checking for update times.
|
|
*/
|
|
let info_collections = {};
|
|
do_check_true(CollectionKeys.updateNeeded(info_collections));
|
|
info_collections["crypto"] = 5000;
|
|
do_check_false(CollectionKeys.updateNeeded(info_collections));
|
|
info_collections["crypto"] = 1 + (Date.now()/1000); // Add one in case computers are fast!
|
|
do_check_true(CollectionKeys.updateNeeded(info_collections));
|
|
|
|
CollectionKeys._lastModified = null;
|
|
do_check_true(CollectionKeys.updateNeeded({}));
|
|
|
|
/*
|
|
* Check _compareKeyBundleCollections.
|
|
*/
|
|
function newBundle(name) {
|
|
let r = new BulkKeyBundle(null, name);
|
|
r.generateRandom();
|
|
return r;
|
|
}
|
|
let k1 = newBundle("k1");
|
|
let k2 = newBundle("k2");
|
|
let k3 = newBundle("k3");
|
|
let k4 = newBundle("k4");
|
|
let k5 = newBundle("k5");
|
|
let coll1 = {"foo": k1, "bar": k2};
|
|
let coll2 = {"foo": k1, "bar": k2};
|
|
let coll3 = {"foo": k1, "bar": k3};
|
|
let coll4 = {"foo": k4};
|
|
let coll5 = {"baz": k5, "bar": k2};
|
|
let coll6 = {};
|
|
|
|
let d1 = CollectionKeys._compareKeyBundleCollections(coll1, coll2); // []
|
|
let d2 = CollectionKeys._compareKeyBundleCollections(coll1, coll3); // ["bar"]
|
|
let d3 = CollectionKeys._compareKeyBundleCollections(coll3, coll2); // ["bar"]
|
|
let d4 = CollectionKeys._compareKeyBundleCollections(coll1, coll4); // ["bar", "foo"]
|
|
let d5 = CollectionKeys._compareKeyBundleCollections(coll5, coll2); // ["baz", "foo"]
|
|
let d6 = CollectionKeys._compareKeyBundleCollections(coll6, coll1); // ["bar", "foo"]
|
|
let d7 = CollectionKeys._compareKeyBundleCollections(coll5, coll5); // []
|
|
let d8 = CollectionKeys._compareKeyBundleCollections(coll6, coll6); // []
|
|
|
|
do_check_true(d1.same);
|
|
do_check_false(d2.same);
|
|
do_check_false(d3.same);
|
|
do_check_false(d4.same);
|
|
do_check_false(d5.same);
|
|
do_check_false(d6.same);
|
|
do_check_true(d7.same);
|
|
do_check_true(d8.same);
|
|
|
|
do_check_array_eq(d1.changed, []);
|
|
do_check_array_eq(d2.changed, ["bar"]);
|
|
do_check_array_eq(d3.changed, ["bar"]);
|
|
do_check_array_eq(d4.changed, ["bar", "foo"]);
|
|
do_check_array_eq(d5.changed, ["baz", "foo"]);
|
|
do_check_array_eq(d6.changed, ["bar", "foo"]);
|
|
}
|
|
|
|
// Make sure that KeyBundles work when persisted through Identity.
|
|
function test_key_persistence() {
|
|
_("Testing key persistence.");
|
|
|
|
// Create our sync key bundle and persist it.
|
|
let k = new SyncKeyBundle(null, null, "abcdeabcdeabcdeabcdeabcdea");
|
|
k.username = "john@example.com";
|
|
ID.set("WeaveCryptoID", k);
|
|
let id = ID.get("WeaveCryptoID");
|
|
do_check_eq(k, id);
|
|
id.persist();
|
|
|
|
// Now erase any memory of it.
|
|
ID.del("WeaveCryptoID");
|
|
k = id = null;
|
|
|
|
// Now recreate via the persisted value.
|
|
id = new SyncKeyBundle();
|
|
id.username = "john@example.com";
|
|
|
|
// The password should have been fetched from storage...
|
|
do_check_eq(id.password, "abcdeabcdeabcdeabcdeabcdea");
|
|
|
|
// ... and we should be able to grab these by derivation.
|
|
do_check_true(!!id.hmacKeyObject);
|
|
do_check_true(!!id.hmacKey);
|
|
do_check_true(!!id.encryptionKey);
|
|
}
|
|
|
|
function run_test() {
|
|
test_keymanager();
|
|
test_collections_manager();
|
|
test_key_persistence();
|
|
test_repeated_hmac();
|
|
|
|
// Only do 1,000 to avoid a 5-second pause in test runs.
|
|
test_time_keyFromString(1000);
|
|
}
|