mirror of
https://github.com/denoland/deno.git
synced 2024-12-20 22:34:46 -05:00
204 lines
6 KiB
JavaScript
204 lines
6 KiB
JavaScript
|
// deno-fmt-ignore-file
|
||
|
// deno-lint-ignore-file
|
||
|
|
||
|
// Copyright Joyent and Node contributors. All rights reserved. MIT license.
|
||
|
|
||
|
'use strict';
|
||
|
|
||
|
const common = require('../common');
|
||
|
|
||
|
if (!common.hasCrypto)
|
||
|
common.skip('missing crypto');
|
||
|
|
||
|
const { kMaxLength } = require('buffer');
|
||
|
const assert = require('assert');
|
||
|
const {
|
||
|
createSecretKey,
|
||
|
hkdf,
|
||
|
hkdfSync
|
||
|
} = require('crypto');
|
||
|
|
||
|
{
|
||
|
assert.throws(() => hkdf(), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /The "digest" argument must be of type string/
|
||
|
});
|
||
|
|
||
|
[1, {}, [], false, Infinity].forEach((i) => {
|
||
|
assert.throws(() => hkdf(i, 'a'), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "digest" argument must be of type string/
|
||
|
});
|
||
|
assert.throws(() => hkdfSync(i, 'a'), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "digest" argument must be of type string/
|
||
|
});
|
||
|
});
|
||
|
|
||
|
[1, {}, [], false, Infinity].forEach((i) => {
|
||
|
assert.throws(() => hkdf('sha256', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "ikm" argument must be /
|
||
|
});
|
||
|
assert.throws(() => hkdfSync('sha256', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "ikm" argument must be /
|
||
|
});
|
||
|
});
|
||
|
|
||
|
[1, {}, [], false, Infinity].forEach((i) => {
|
||
|
assert.throws(() => hkdf('sha256', 'secret', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "salt" argument must be /
|
||
|
});
|
||
|
assert.throws(() => hkdfSync('sha256', 'secret', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "salt" argument must be /
|
||
|
});
|
||
|
});
|
||
|
|
||
|
[1, {}, [], false, Infinity].forEach((i) => {
|
||
|
assert.throws(() => hkdf('sha256', 'secret', 'salt', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "info" argument must be /
|
||
|
});
|
||
|
assert.throws(() => hkdfSync('sha256', 'secret', 'salt', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "info" argument must be /
|
||
|
});
|
||
|
});
|
||
|
|
||
|
['test', {}, [], false].forEach((i) => {
|
||
|
assert.throws(() => hkdf('sha256', 'secret', 'salt', 'info', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "length" argument must be of type number/
|
||
|
});
|
||
|
assert.throws(() => hkdfSync('sha256', 'secret', 'salt', 'info', i), {
|
||
|
code: 'ERR_INVALID_ARG_TYPE',
|
||
|
message: /^The "length" argument must be of type number/
|
||
|
});
|
||
|
});
|
||
|
|
||
|
assert.throws(() => hkdf('sha256', 'secret', 'salt', 'info', -1), {
|
||
|
code: 'ERR_OUT_OF_RANGE'
|
||
|
});
|
||
|
assert.throws(() => hkdfSync('sha256', 'secret', 'salt', 'info', -1), {
|
||
|
code: 'ERR_OUT_OF_RANGE'
|
||
|
});
|
||
|
assert.throws(() => hkdf('sha256', 'secret', 'salt', 'info',
|
||
|
kMaxLength + 1), {
|
||
|
code: 'ERR_OUT_OF_RANGE'
|
||
|
});
|
||
|
assert.throws(() => hkdfSync('sha256', 'secret', 'salt', 'info',
|
||
|
kMaxLength + 1), {
|
||
|
code: 'ERR_OUT_OF_RANGE'
|
||
|
});
|
||
|
|
||
|
assert.throws(() => hkdfSync('unknown', 'a', '', '', 10), {
|
||
|
code: 'ERR_CRYPTO_INVALID_DIGEST'
|
||
|
});
|
||
|
|
||
|
assert.throws(() => hkdf('unknown', 'a', '', Buffer.alloc(1025), 10,
|
||
|
common.mustNotCall()), {
|
||
|
code: 'ERR_OUT_OF_RANGE'
|
||
|
});
|
||
|
|
||
|
assert.throws(() => hkdfSync('unknown', 'a', '', Buffer.alloc(1025), 10), {
|
||
|
code: 'ERR_OUT_OF_RANGE'
|
||
|
});
|
||
|
}
|
||
|
|
||
|
const algorithms = [
|
||
|
['sha256', 'secret', 'salt', 'info', 10],
|
||
|
['sha256', '', '', '', 10],
|
||
|
['sha256', '', 'salt', '', 10],
|
||
|
['sha512', 'secret', 'salt', '', 15],
|
||
|
];
|
||
|
|
||
|
algorithms.forEach(([ hash, secret, salt, info, length ]) => {
|
||
|
{
|
||
|
const syncResult = hkdfSync(hash, secret, salt, info, length);
|
||
|
assert(syncResult instanceof ArrayBuffer);
|
||
|
let is_async = false;
|
||
|
hkdf(hash, secret, salt, info, length,
|
||
|
common.mustSucceed((asyncResult) => {
|
||
|
assert(is_async);
|
||
|
assert(asyncResult instanceof ArrayBuffer);
|
||
|
assert.deepStrictEqual(syncResult, asyncResult);
|
||
|
}));
|
||
|
// Keep this after the hkdf call above. This verifies
|
||
|
// that the callback is invoked asynchronously.
|
||
|
is_async = true;
|
||
|
}
|
||
|
|
||
|
{
|
||
|
const buf_secret = Buffer.from(secret);
|
||
|
const buf_salt = Buffer.from(salt);
|
||
|
const buf_info = Buffer.from(info);
|
||
|
|
||
|
const syncResult = hkdfSync(hash, buf_secret, buf_salt, buf_info, length);
|
||
|
hkdf(hash, buf_secret, buf_salt, buf_info, length,
|
||
|
common.mustSucceed((asyncResult) => {
|
||
|
assert.deepStrictEqual(syncResult, asyncResult);
|
||
|
}));
|
||
|
}
|
||
|
|
||
|
{
|
||
|
const key_secret = createSecretKey(Buffer.from(secret));
|
||
|
const buf_salt = Buffer.from(salt);
|
||
|
const buf_info = Buffer.from(info);
|
||
|
|
||
|
const syncResult = hkdfSync(hash, key_secret, buf_salt, buf_info, length);
|
||
|
hkdf(hash, key_secret, buf_salt, buf_info, length,
|
||
|
common.mustSucceed((asyncResult) => {
|
||
|
assert.deepStrictEqual(syncResult, asyncResult);
|
||
|
}));
|
||
|
}
|
||
|
|
||
|
{
|
||
|
const ta_secret = new Uint8Array(Buffer.from(secret));
|
||
|
const ta_salt = new Uint16Array(Buffer.from(salt));
|
||
|
const ta_info = new Uint32Array(Buffer.from(info));
|
||
|
|
||
|
const syncResult = hkdfSync(hash, ta_secret, ta_salt, ta_info, length);
|
||
|
hkdf(hash, ta_secret, ta_salt, ta_info, length,
|
||
|
common.mustSucceed((asyncResult) => {
|
||
|
assert.deepStrictEqual(syncResult, asyncResult);
|
||
|
}));
|
||
|
}
|
||
|
|
||
|
{
|
||
|
const ta_secret = new Uint8Array(Buffer.from(secret));
|
||
|
const ta_salt = new Uint16Array(Buffer.from(salt));
|
||
|
const ta_info = new Uint32Array(Buffer.from(info));
|
||
|
|
||
|
const syncResult = hkdfSync(
|
||
|
hash,
|
||
|
ta_secret.buffer,
|
||
|
ta_salt.buffer,
|
||
|
ta_info.buffer,
|
||
|
length);
|
||
|
hkdf(hash, ta_secret, ta_salt, ta_info, length,
|
||
|
common.mustSucceed((asyncResult) => {
|
||
|
assert.deepStrictEqual(syncResult, asyncResult);
|
||
|
}));
|
||
|
}
|
||
|
|
||
|
{
|
||
|
const ta_secret = new Uint8Array(Buffer.from(secret));
|
||
|
const sa_salt = new ArrayBuffer(0);
|
||
|
const sa_info = new ArrayBuffer(1);
|
||
|
|
||
|
const syncResult = hkdfSync(
|
||
|
hash,
|
||
|
ta_secret.buffer,
|
||
|
sa_salt,
|
||
|
sa_info,
|
||
|
length);
|
||
|
hkdf(hash, ta_secret, sa_salt, sa_info, length,
|
||
|
common.mustSucceed((asyncResult) => {
|
||
|
assert.deepStrictEqual(syncResult, asyncResult);
|
||
|
}));
|
||
|
}
|
||
|
});
|