mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-09-30 13:19:02 +00:00
LibWeb: Implement importKey for RSA-OAEP
This commit is contained in:
parent
28dc076764
commit
a0623a47de
Notes:
sideshowbarker
2024-07-17 05:05:51 +09:00
Author: https://github.com/ADKaster
Commit: a0623a47de
Pull-request: https://github.com/SerenityOS/serenity/pull/23596
Reviewed-by: https://github.com/alimpfard
5 changed files with 421 additions and 3 deletions
|
@ -376,6 +376,7 @@ shared_library("LibWeb") {
|
|||
"//Userland/Libraries/LibRegex",
|
||||
"//Userland/Libraries/LibSoftGPU",
|
||||
"//Userland/Libraries/LibSyntax",
|
||||
"//Userland/Libraries/LibTLS",
|
||||
"//Userland/Libraries/LibTextCodec",
|
||||
"//Userland/Libraries/LibURL",
|
||||
"//Userland/Libraries/LibUnicode",
|
||||
|
|
|
@ -706,7 +706,7 @@ set(GENERATED_SOURCES
|
|||
serenity_lib(LibWeb web)
|
||||
|
||||
# NOTE: We link with LibSoftGPU here instead of lazy loading it via dlopen() so that we do not have to unveil the library and pledge prot_exec.
|
||||
target_link_libraries(LibWeb PRIVATE LibCore LibCrypto LibJS LibMarkdown LibHTTP LibGemini LibGUI LibGfx LibIPC LibLocale LibRegex LibSoftGPU LibSyntax LibTextCodec LibUnicode LibAudio LibVideo LibWasm LibXML LibIDL LibURL)
|
||||
target_link_libraries(LibWeb PRIVATE LibCore LibCrypto LibJS LibMarkdown LibHTTP LibGemini LibGUI LibGfx LibIPC LibLocale LibRegex LibSoftGPU LibSyntax LibTextCodec LibUnicode LibAudio LibVideo LibWasm LibXML LibIDL LibURL LibTLS)
|
||||
link_with_locale_data(LibWeb)
|
||||
|
||||
if (HAS_ACCELERATED_GRAPHICS)
|
||||
|
|
|
@ -6,13 +6,16 @@
|
|||
|
||||
#include <AK/Base64.h>
|
||||
#include <AK/QuickSort.h>
|
||||
#include <LibCrypto/ASN1/DER.h>
|
||||
#include <LibCrypto/Hash/HashManager.h>
|
||||
#include <LibCrypto/PK/RSA.h>
|
||||
#include <LibJS/Runtime/ArrayBuffer.h>
|
||||
#include <LibJS/Runtime/DataView.h>
|
||||
#include <LibJS/Runtime/TypedArray.h>
|
||||
#include <LibTLS/Certificate.h>
|
||||
#include <LibWeb/Crypto/CryptoAlgorithms.h>
|
||||
#include <LibWeb/Crypto/KeyAlgorithms.h>
|
||||
#include <LibWeb/Crypto/SubtleCrypto.h>
|
||||
|
||||
namespace Web::Crypto {
|
||||
|
||||
|
@ -91,6 +94,112 @@ ErrorOr<String> base64_url_uint_encode(::Crypto::UnsignedBigInteger integer)
|
|||
return encoded;
|
||||
}
|
||||
|
||||
WebIDL::ExceptionOr<::Crypto::UnsignedBigInteger> base64_url_uint_decode(JS::Realm& realm, String const& base64_url_string)
|
||||
{
|
||||
auto& vm = realm.vm();
|
||||
static_assert(AK::HostIsLittleEndian, "This code assumes little-endian");
|
||||
|
||||
// FIXME: Create a version of decode_base64url that ignores padding inconsistencies
|
||||
auto padded_string = base64_url_string;
|
||||
if (padded_string.byte_count() % 4 != 0) {
|
||||
padded_string = TRY_OR_THROW_OOM(vm, String::formatted("{}{}", padded_string, TRY_OR_THROW_OOM(vm, String::repeated('=', 4 - (padded_string.byte_count() % 4)))));
|
||||
}
|
||||
|
||||
auto base64_bytes_or_error = decode_base64url(padded_string);
|
||||
if (base64_bytes_or_error.is_error()) {
|
||||
if (base64_bytes_or_error.error().code() == ENOMEM)
|
||||
return vm.throw_completion<JS::InternalError>(vm.error_message(::JS::VM::ErrorMessage::OutOfMemory));
|
||||
return WebIDL::DataError::create(realm, MUST(String::formatted("base64 decode: {}", base64_bytes_or_error.release_error())));
|
||||
}
|
||||
auto base64_bytes = base64_bytes_or_error.release_value();
|
||||
|
||||
// We need to swap the integer's big-endian representation to little endian in order to import it
|
||||
Vector<u8, 32> byte_swapped_data;
|
||||
byte_swapped_data.ensure_capacity(base64_bytes.size());
|
||||
for (size_t i = 0; i < base64_bytes.size(); ++i)
|
||||
byte_swapped_data.append(base64_bytes[base64_bytes.size() - i - 1]);
|
||||
|
||||
return ::Crypto::UnsignedBigInteger::import_data(byte_swapped_data.data(), byte_swapped_data.size());
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#concept-parse-an-asn1-structure
|
||||
template<typename Structure>
|
||||
static WebIDL::ExceptionOr<Structure> parse_an_ASN1_structure(JS::Realm& realm, ReadonlyBytes data, bool exact_data = true)
|
||||
{
|
||||
// 1. Let data be a sequence of bytes to be parsed.
|
||||
// 2. Let structure be the ASN.1 structure to be parsed.
|
||||
// 3. Let exactData be an optional boolean value. If it is not supplied, let it be initialized to true.
|
||||
|
||||
// 4. Parse data according to the Distinguished Encoding Rules of [X690], using structure as the ASN.1 structure to be decoded.
|
||||
::Crypto::ASN1::Decoder decoder(data);
|
||||
Structure structure;
|
||||
if constexpr (IsSame<Structure, TLS::SubjectPublicKey>) {
|
||||
auto maybe_subject_public_key = TLS::parse_subject_public_key_info(decoder);
|
||||
if (maybe_subject_public_key.is_error())
|
||||
return WebIDL::DataError::create(realm, MUST(String::formatted("Error parsing subjectPublicKeyInfo: {}", maybe_subject_public_key.release_error())));
|
||||
structure = maybe_subject_public_key.release_value();
|
||||
} else if constexpr (IsSame<Structure, TLS::PrivateKey>) {
|
||||
auto maybe_private_key = TLS::parse_private_key_info(decoder);
|
||||
if (maybe_private_key.is_error())
|
||||
return WebIDL::DataError::create(realm, MUST(String::formatted("Error parsing privateKeyInfo: {}", maybe_private_key.release_error())));
|
||||
structure = maybe_private_key.release_value();
|
||||
} else {
|
||||
static_assert(DependentFalse<Structure>, "Don't know how to parse ASN.1 structure type");
|
||||
}
|
||||
|
||||
// 5. If exactData was specified, and all of the bytes of data were not consumed during the parsing phase, then throw a DataError.
|
||||
if (exact_data && !decoder.eof())
|
||||
return WebIDL::DataError::create(realm, "Not all bytes were consumed during the parsing phase"_fly_string);
|
||||
|
||||
// 6. Return the parsed ASN.1 structure.
|
||||
return structure;
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#concept-parse-a-spki
|
||||
static WebIDL::ExceptionOr<TLS::SubjectPublicKey> parse_a_subject_public_key_info(JS::Realm& realm, ReadonlyBytes bytes)
|
||||
{
|
||||
// When this specification says to parse a subjectPublicKeyInfo, the user agent must parse an ASN.1 structure,
|
||||
// with data set to the sequence of bytes to be parsed, structure as the ASN.1 structure of subjectPublicKeyInfo,
|
||||
// as specified in [RFC5280], and exactData set to true.
|
||||
return parse_an_ASN1_structure<TLS::SubjectPublicKey>(realm, bytes, true);
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#concept-parse-a-privateKeyInfo
|
||||
static WebIDL::ExceptionOr<TLS::PrivateKey> parse_a_private_key_info(JS::Realm& realm, ReadonlyBytes bytes)
|
||||
{
|
||||
// When this specification says to parse a PrivateKeyInfo, the user agent must parse an ASN.1 structure
|
||||
// with data set to the sequence of bytes to be parsed, structure as the ASN.1 structure of PrivateKeyInfo,
|
||||
// as specified in [RFC5208], and exactData set to true.
|
||||
return parse_an_ASN1_structure<TLS::PrivateKey>(realm, bytes, true);
|
||||
}
|
||||
|
||||
static WebIDL::ExceptionOr<::Crypto::PK::RSAPrivateKey<>> parse_jwk_rsa_private_key(JS::Realm& realm, Bindings::JsonWebKey const& jwk)
|
||||
{
|
||||
auto n = TRY(base64_url_uint_decode(realm, *jwk.n));
|
||||
auto d = TRY(base64_url_uint_decode(realm, *jwk.d));
|
||||
auto e = TRY(base64_url_uint_decode(realm, *jwk.e));
|
||||
|
||||
// We know that if any of the extra parameters are provided, all of them must be
|
||||
if (!jwk.p.has_value())
|
||||
return ::Crypto::PK::RSAPrivateKey<>(move(n), move(d), move(e), 0, 0);
|
||||
|
||||
auto p = TRY(base64_url_uint_decode(realm, *jwk.p));
|
||||
auto q = TRY(base64_url_uint_decode(realm, *jwk.q));
|
||||
auto dp = TRY(base64_url_uint_decode(realm, *jwk.dp));
|
||||
auto dq = TRY(base64_url_uint_decode(realm, *jwk.dq));
|
||||
auto qi = TRY(base64_url_uint_decode(realm, *jwk.qi));
|
||||
|
||||
return ::Crypto::PK::RSAPrivateKey<>(move(n), move(d), move(e), move(p), move(q), move(dp), move(dq), move(qi));
|
||||
}
|
||||
|
||||
static WebIDL::ExceptionOr<::Crypto::PK::RSAPublicKey<>> parse_jwk_rsa_public_key(JS::Realm& realm, Bindings::JsonWebKey const& jwk)
|
||||
{
|
||||
auto e = TRY(base64_url_uint_decode(realm, *jwk.e));
|
||||
auto n = TRY(base64_url_uint_decode(realm, *jwk.n));
|
||||
|
||||
return ::Crypto::PK::RSAPublicKey<>(move(n), move(e));
|
||||
}
|
||||
|
||||
AlgorithmParams::~AlgorithmParams() = default;
|
||||
|
||||
JS::ThrowCompletionOr<NonnullOwnPtr<AlgorithmParams>> AlgorithmParams::from_value(JS::VM& vm, JS::Value value)
|
||||
|
@ -193,6 +302,28 @@ JS::ThrowCompletionOr<NonnullOwnPtr<AlgorithmParams>> RsaHashedKeyGenParams::fro
|
|||
return adopt_own<AlgorithmParams>(*new RsaHashedKeyGenParams { name, modulus_length, big_integer_from_api_big_integer(public_exponent), hash.get<HashAlgorithmIdentifier>() });
|
||||
}
|
||||
|
||||
RsaHashedImportParams::~RsaHashedImportParams() = default;
|
||||
|
||||
JS::ThrowCompletionOr<NonnullOwnPtr<AlgorithmParams>> RsaHashedImportParams::from_value(JS::VM& vm, JS::Value value)
|
||||
{
|
||||
auto& object = value.as_object();
|
||||
|
||||
auto name_value = TRY(object.get("name"));
|
||||
auto name = TRY(name_value.to_string(vm));
|
||||
|
||||
auto hash_value = TRY(object.get("hash"));
|
||||
auto hash = Variant<Empty, HashAlgorithmIdentifier> { Empty {} };
|
||||
if (hash_value.is_string()) {
|
||||
auto hash_string = TRY(hash_value.to_string(vm));
|
||||
hash = HashAlgorithmIdentifier { hash_string };
|
||||
} else {
|
||||
auto hash_object = TRY(hash_value.to_object(vm));
|
||||
hash = HashAlgorithmIdentifier { hash_object };
|
||||
}
|
||||
|
||||
return adopt_own<AlgorithmParams>(*new RsaHashedImportParams { name, hash.get<HashAlgorithmIdentifier>() });
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#rsa-oaep-operations
|
||||
WebIDL::ExceptionOr<Variant<JS::NonnullGCPtr<CryptoKey>, JS::NonnullGCPtr<CryptoKeyPair>>> RSAOAEP::generate_key(AlgorithmParams const& params, bool extractable, Vector<Bindings::KeyUsage> const& key_usages)
|
||||
{
|
||||
|
@ -261,6 +392,269 @@ WebIDL::ExceptionOr<Variant<JS::NonnullGCPtr<CryptoKey>, JS::NonnullGCPtr<Crypto
|
|||
return Variant<JS::NonnullGCPtr<CryptoKey>, JS::NonnullGCPtr<CryptoKeyPair>> { CryptoKeyPair::create(m_realm, public_key, private_key) };
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#rsa-oaep-operations
|
||||
WebIDL::ExceptionOr<JS::NonnullGCPtr<CryptoKey>> RSAOAEP::import_key(Web::Crypto::AlgorithmParams const& params, Bindings::KeyFormat key_format, CryptoKey::InternalKeyData key_data, bool extractable, Vector<Bindings::KeyUsage> const& usages)
|
||||
{
|
||||
auto& realm = m_realm;
|
||||
|
||||
// 1. Let keyData be the key data to be imported.
|
||||
|
||||
JS::GCPtr<CryptoKey> key = nullptr;
|
||||
auto const& normalized_algorithm = static_cast<RsaHashedImportParams const&>(params);
|
||||
|
||||
// 2. -> If format is "spki":
|
||||
if (key_format == Bindings::KeyFormat::Spki) {
|
||||
// 1. If usages contains an entry which is not "encrypt" or "wrapKey", then throw a SyntaxError.
|
||||
for (auto const& usage : usages) {
|
||||
if (usage != Bindings::KeyUsage::Encrypt && usage != Bindings::KeyUsage::Wrapkey) {
|
||||
return WebIDL::SyntaxError::create(m_realm, MUST(String::formatted("Invalid key usage '{}'", idl_enum_to_string(usage))));
|
||||
}
|
||||
}
|
||||
|
||||
VERIFY(key_data.has<ByteBuffer>());
|
||||
|
||||
// 2. Let spki be the result of running the parse a subjectPublicKeyInfo algorithm over keyData.
|
||||
// 3. If an error occurred while parsing, then throw a DataError.
|
||||
auto spki = TRY(parse_a_subject_public_key_info(m_realm, key_data.get<ByteBuffer>()));
|
||||
|
||||
// 4. If the algorithm object identifier field of the algorithm AlgorithmIdentifier field of spki
|
||||
// is not equal to the rsaEncryption object identifier defined in [RFC3447], then throw a DataError.
|
||||
if (spki.algorithm.identifier != TLS::rsa_encryption_oid)
|
||||
return WebIDL::DataError::create(m_realm, "Algorithm object identifier is not the rsaEncryption object identifier"_fly_string);
|
||||
|
||||
// 5. Let publicKey be the result of performing the parse an ASN.1 structure algorithm,
|
||||
// with data as the subjectPublicKeyInfo field of spki, structure as the RSAPublicKey structure
|
||||
// specified in Section A.1.1 of [RFC3447], and exactData set to true.
|
||||
// NOTE: We already did this in parse_a_subject_public_key_info
|
||||
auto& public_key = spki.rsa;
|
||||
|
||||
// 6. If an error occurred while parsing, or it can be determined that publicKey is not
|
||||
// a valid public key according to [RFC3447], then throw a DataError.
|
||||
// FIXME: Validate the public key
|
||||
|
||||
// 7. Let key be a new CryptoKey that represents the RSA public key identified by publicKey.
|
||||
key = CryptoKey::create(m_realm, CryptoKey::InternalKeyData { public_key });
|
||||
|
||||
// 8. Set the [[type]] internal slot of key to "public"
|
||||
key->set_type(Bindings::KeyType::Public);
|
||||
}
|
||||
|
||||
// -> If format is "pkcs8":
|
||||
else if (key_format == Bindings::KeyFormat::Pkcs8) {
|
||||
// 1. If usages contains an entry which is not "decrypt" or "unwrapKey", then throw a SyntaxError.
|
||||
for (auto const& usage : usages) {
|
||||
if (usage != Bindings::KeyUsage::Decrypt && usage != Bindings::KeyUsage::Unwrapkey) {
|
||||
return WebIDL::SyntaxError::create(m_realm, MUST(String::formatted("Invalid key usage '{}'", idl_enum_to_string(usage))));
|
||||
}
|
||||
}
|
||||
|
||||
VERIFY(key_data.has<ByteBuffer>());
|
||||
|
||||
// 2. Let privateKeyInfo be the result of running the parse a privateKeyInfo algorithm over keyData.
|
||||
// 3. If an error occurred while parsing, then throw a DataError.
|
||||
auto private_key_info = TRY(parse_a_private_key_info(m_realm, key_data.get<ByteBuffer>()));
|
||||
|
||||
// 4. If the algorithm object identifier field of the privateKeyAlgorithm PrivateKeyAlgorithm field of privateKeyInfo
|
||||
// is not equal to the rsaEncryption object identifier defined in [RFC3447], then throw a DataError.
|
||||
if (private_key_info.algorithm.identifier != TLS::rsa_encryption_oid)
|
||||
return WebIDL::DataError::create(m_realm, "Algorithm object identifier is not the rsaEncryption object identifier"_fly_string);
|
||||
|
||||
// 5. Let rsaPrivateKey be the result of performing the parse an ASN.1 structure algorithm,
|
||||
// with data as the privateKey field of privateKeyInfo, structure as the RSAPrivateKey structure
|
||||
// specified in Section A.1.2 of [RFC3447], and exactData set to true.
|
||||
// NOTE: We already did this in parse_a_private_key_info
|
||||
auto& rsa_private_key = private_key_info.rsa;
|
||||
|
||||
// 6. If an error occurred while parsing, or if rsaPrivateKey is not
|
||||
// a valid RSA private key according to [RFC3447], then throw a DataError.
|
||||
// FIXME: Validate the private key
|
||||
|
||||
// 7. Let key be a new CryptoKey that represents the RSA private key identified by rsaPrivateKey.
|
||||
key = CryptoKey::create(m_realm, CryptoKey::InternalKeyData { rsa_private_key });
|
||||
|
||||
// 8. Set the [[type]] internal slot of key to "private"
|
||||
key->set_type(Bindings::KeyType::Private);
|
||||
}
|
||||
|
||||
// -> If format is "jwk":
|
||||
else if (key_format == Bindings::KeyFormat::Jwk) {
|
||||
// 1. -> If keyData is a JsonWebKey dictionary:
|
||||
// Let jwk equal keyData.
|
||||
// -> Otherwise:
|
||||
// Throw a DataError.
|
||||
if (!key_data.has<Bindings::JsonWebKey>())
|
||||
return WebIDL::DataError::create(m_realm, "keyData is not a JsonWebKey dictionary"_fly_string);
|
||||
auto& jwk = key_data.get<Bindings::JsonWebKey>();
|
||||
|
||||
// 2. If the d field of jwk is present and usages contains an entry which is not "decrypt" or "unwrapKey", then throw a SyntaxError.
|
||||
if (jwk.d.has_value()) {
|
||||
for (auto const& usage : usages) {
|
||||
if (usage != Bindings::KeyUsage::Decrypt && usage != Bindings::KeyUsage::Unwrapkey) {
|
||||
return WebIDL::SyntaxError::create(m_realm, MUST(String::formatted("Invalid key usage '{}'", Bindings::idl_enum_to_string(usage))));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// 3. If the d field of jwk is not present and usages contains an entry which is not "encrypt" or "wrapKey", then throw a SyntaxError.
|
||||
if (!jwk.d.has_value()) {
|
||||
for (auto const& usage : usages) {
|
||||
if (usage != Bindings::KeyUsage::Encrypt && usage != Bindings::KeyUsage::Wrapkey) {
|
||||
return WebIDL::SyntaxError::create(m_realm, MUST(String::formatted("Invalid key usage '{}'", Bindings::idl_enum_to_string(usage))));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// 4. If the kty field of jwk is not a case-sensitive string match to "RSA", then throw a DataError.
|
||||
if (jwk.kty != "RSA"_string)
|
||||
return WebIDL::DataError::create(m_realm, "Invalid key type"_fly_string);
|
||||
|
||||
// 5. If usages is non-empty and the use field of jwk is present and is not a case-sensitive string match to "enc", then throw a DataError.
|
||||
if (!usages.is_empty() && jwk.use.has_value() && *jwk.use != "enc"_string)
|
||||
return WebIDL::DataError::create(m_realm, "Invalid use field"_fly_string);
|
||||
|
||||
// 6. If the key_ops field of jwk is present, and is invalid according to the requirements of JSON Web Key [JWK]
|
||||
// or does not contain all of the specified usages values, then throw a DataError.
|
||||
for (auto const& usage : usages) {
|
||||
if (!jwk.key_ops->contains_slow(Bindings::idl_enum_to_string(usage)))
|
||||
return WebIDL::DataError::create(m_realm, MUST(String::formatted("Missing key_ops field: {}", Bindings::idl_enum_to_string(usage))));
|
||||
}
|
||||
// FIXME: Validate jwk.key_ops against requirements in https://www.rfc-editor.org/rfc/rfc7517#section-4.3
|
||||
|
||||
// 7. If the ext field of jwk is present and has the value false and extractable is true, then throw a DataError.
|
||||
if (jwk.ext.has_value() && !*jwk.ext && extractable)
|
||||
return WebIDL::DataError::create(m_realm, "Invalid ext field"_fly_string);
|
||||
|
||||
Optional<String> hash = {};
|
||||
// 8. -> If the alg field of jwk is not present:
|
||||
if (!jwk.alg.has_value()) {
|
||||
// Let hash be undefined.
|
||||
}
|
||||
// -> If the alg field of jwk is equal to "RSA-OAEP":
|
||||
if (jwk.alg == "RSA-OAEP"sv) {
|
||||
// Let hash be the string "SHA-1".
|
||||
hash = "SHA-1"_string;
|
||||
}
|
||||
// -> If the alg field of jwk is equal to "RSA-OAEP-256":
|
||||
else if (jwk.alg == "RSA-OAEP-256"sv) {
|
||||
// Let hash be the string "SHA-256".
|
||||
hash = "SHA-256"_string;
|
||||
}
|
||||
// -> If the alg field of jwk is equal to "RSA-OAEP-384":
|
||||
else if (jwk.alg == "RSA-OAEP-384"sv) {
|
||||
// Let hash be the string "SHA-384".
|
||||
hash = "SHA-384"_string;
|
||||
}
|
||||
// -> If the alg field of jwk is equal to "RSA-OAEP-512":
|
||||
else if (jwk.alg == "RSA-OAEP-512"sv) {
|
||||
// Let hash be the string "SHA-512".
|
||||
hash = "SHA-512"_string;
|
||||
}
|
||||
// -> Otherwise:
|
||||
else {
|
||||
// FIXME: Support 'other applicable specifications'
|
||||
// 1. Perform any key import steps defined by other applicable specifications, passing format, jwk and obtaining hash.
|
||||
// 2. If an error occurred or there are no applicable specifications, throw a DataError.
|
||||
return WebIDL::DataError::create(m_realm, "Invalid alg field"_fly_string);
|
||||
}
|
||||
|
||||
// 9. If hash is not undefined:
|
||||
if (hash.has_value()) {
|
||||
// 1. Let normalizedHash be the result of normalize an algorithm with alg set to hash and op set to digest.
|
||||
auto normalized_hash = TRY(normalize_an_algorithm(m_realm, AlgorithmIdentifier { *hash }, "digest"_string));
|
||||
|
||||
// 2. If normalizedHash is not equal to the hash member of normalizedAlgorithm, throw a DataError.
|
||||
if (normalized_hash.parameter->name != TRY(normalized_algorithm.hash.visit([](String const& name) -> JS::ThrowCompletionOr<String> { return name; }, [&](JS::Handle<JS::Object> const& obj) -> JS::ThrowCompletionOr<String> {
|
||||
auto name_property = TRY(obj->get("name"));
|
||||
return name_property.to_string(m_realm.vm()); })))
|
||||
return WebIDL::DataError::create(m_realm, "Invalid hash"_fly_string);
|
||||
}
|
||||
|
||||
// 10. -> If the d field of jwk is present:
|
||||
if (jwk.d.has_value()) {
|
||||
// 1. If jwk does not meet the requirements of Section 6.3.2 of JSON Web Algorithms [JWA], then throw a DataError.
|
||||
bool meets_requirements = jwk.e.has_value() && jwk.n.has_value() && jwk.d.has_value();
|
||||
if (jwk.p.has_value() || jwk.q.has_value() || jwk.dp.has_value() || jwk.dq.has_value() || jwk.qi.has_value())
|
||||
meets_requirements |= jwk.p.has_value() && jwk.q.has_value() && jwk.dp.has_value() && jwk.dq.has_value() && jwk.qi.has_value();
|
||||
|
||||
if (jwk.oth.has_value()) {
|
||||
// FIXME: We don't support > 2 primes in RSA keys
|
||||
meets_requirements = false;
|
||||
}
|
||||
|
||||
if (!meets_requirements)
|
||||
return WebIDL::DataError::create(m_realm, "Invalid JWK private key"_fly_string);
|
||||
|
||||
// FIXME: Spec error, it should say 'the RSA private key identified by interpreting jwk according to section 6.3.2'
|
||||
// 2. Let privateKey represent the RSA public key identified by interpreting jwk according to Section 6.3.1 of JSON Web Algorithms [JWA].
|
||||
auto private_key = TRY(parse_jwk_rsa_private_key(realm, jwk));
|
||||
|
||||
// FIXME: Spec error, it should say 'not to be a valid RSA private key'
|
||||
// 3. If privateKey can be determined to not be a valid RSA public key according to [RFC3447], then throw a DataError.
|
||||
// FIXME: Validate the private key
|
||||
|
||||
// 4. Let key be a new CryptoKey representing privateKey.
|
||||
key = CryptoKey::create(m_realm, CryptoKey::InternalKeyData { private_key });
|
||||
|
||||
// 5. Set the [[type]] internal slot of key to "private"
|
||||
key->set_type(Bindings::KeyType::Private);
|
||||
}
|
||||
|
||||
// -> Otherwise:
|
||||
else {
|
||||
// 1. If jwk does not meet the requirements of Section 6.3.1 of JSON Web Algorithms [JWA], then throw a DataError.
|
||||
if (!jwk.e.has_value() || !jwk.n.has_value())
|
||||
return WebIDL::DataError::create(m_realm, "Invalid JWK public key"_fly_string);
|
||||
|
||||
// 2. Let publicKey represent the RSA public key identified by interpreting jwk according to Section 6.3.1 of JSON Web Algorithms [JWA].
|
||||
auto public_key = TRY(parse_jwk_rsa_public_key(realm, jwk));
|
||||
|
||||
// 3. If publicKey can be determined to not be a valid RSA public key according to [RFC3447], then throw a DataError.
|
||||
// FIXME: Validate the public key
|
||||
|
||||
// 4. Let key be a new CryptoKey representing publicKey.
|
||||
key = CryptoKey::create(m_realm, CryptoKey::InternalKeyData { public_key });
|
||||
|
||||
// 5. Set the [[type]] internal slot of key to "public"
|
||||
key->set_type(Bindings::KeyType::Public);
|
||||
}
|
||||
}
|
||||
|
||||
// -> Otherwise: throw a NotSupportedError.
|
||||
else {
|
||||
return WebIDL::NotSupportedError::create(m_realm, "Unsupported key format"_fly_string);
|
||||
}
|
||||
|
||||
// 3. Let algorithm be a new RsaHashedKeyAlgorithm.
|
||||
auto algorithm = RsaHashedKeyAlgorithm::create(m_realm);
|
||||
|
||||
// 4. Set the name attribute of algorithm to "RSA-OAEP"
|
||||
algorithm->set_name("RSA-OAEP"_string);
|
||||
|
||||
// 5. Set the modulusLength attribute of algorithm to the length, in bits, of the RSA public modulus.
|
||||
// 6. Set the publicExponent attribute of algorithm to the BigInteger representation of the RSA public exponent.
|
||||
TRY(key->handle().visit(
|
||||
[&](::Crypto::PK::RSAPublicKey<> const& public_key) -> WebIDL::ExceptionOr<void> {
|
||||
algorithm->set_modulus_length(public_key.length());
|
||||
TRY(algorithm->set_public_exponent(public_key.public_exponent()));
|
||||
return {};
|
||||
},
|
||||
[&](::Crypto::PK::RSAPrivateKey<> const& private_key) -> WebIDL::ExceptionOr<void> {
|
||||
algorithm->set_modulus_length(private_key.length());
|
||||
TRY(algorithm->set_public_exponent(private_key.public_exponent()));
|
||||
return {};
|
||||
},
|
||||
[](auto) -> WebIDL::ExceptionOr<void> { VERIFY_NOT_REACHED(); }));
|
||||
|
||||
// 7. Set the hash attribute of algorithm to the hash member of normalizedAlgorithm.
|
||||
algorithm->set_hash(normalized_algorithm.hash);
|
||||
|
||||
// 8. Set the [[algorithm]] internal slot of key to algorithm
|
||||
key->set_algorithm(algorithm);
|
||||
|
||||
// 9. Return key.
|
||||
return JS::NonnullGCPtr { *key };
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#rsa-oaep-operations
|
||||
WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::Object>> RSAOAEP::export_key(Bindings::KeyFormat format, JS::NonnullGCPtr<CryptoKey> key)
|
||||
{
|
||||
|
@ -348,7 +742,11 @@ WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::Object>> RSAOAEP::export_key(Bindings::
|
|||
// 11. If the [[type]] internal slot of key is "private":
|
||||
// 1. Set the attributes named d, p, q, dp, dq, and qi of jwk according to the corresponding definitions in JSON Web Algorithms [JWA], Section 6.3.2.
|
||||
jwk.d = TRY(base64_url_uint_encode(private_key.private_exponent()));
|
||||
// FIXME: Add p, q, dq, qi
|
||||
jwk.p = TRY(base64_url_uint_encode(private_key.prime1()));
|
||||
jwk.q = TRY(base64_url_uint_encode(private_key.prime2()));
|
||||
jwk.dp = TRY(base64_url_uint_encode(private_key.exponent1()));
|
||||
jwk.dq = TRY(base64_url_uint_encode(private_key.exponent2()));
|
||||
jwk.qi = TRY(base64_url_uint_encode(private_key.coefficient()));
|
||||
|
||||
// 12. If the underlying RSA private key represented by the [[handle]] internal slot of key is represented by more than two primes,
|
||||
// set the attribute named oth of jwk according to the corresponding definition in JSON Web Algorithms [JWA], Section 6.3.2.7
|
||||
|
|
|
@ -87,6 +87,21 @@ struct RsaHashedKeyGenParams : public RsaKeyGenParams {
|
|||
static JS::ThrowCompletionOr<NonnullOwnPtr<AlgorithmParams>> from_value(JS::VM&, JS::Value);
|
||||
};
|
||||
|
||||
// https://w3c.github.io/webcrypto/#dfn-RsaHashedImportParams
|
||||
struct RsaHashedImportParams : public AlgorithmParams {
|
||||
virtual ~RsaHashedImportParams() override;
|
||||
|
||||
RsaHashedImportParams(String name, HashAlgorithmIdentifier hash)
|
||||
: AlgorithmParams(move(name))
|
||||
, hash(move(hash))
|
||||
{
|
||||
}
|
||||
|
||||
HashAlgorithmIdentifier hash;
|
||||
|
||||
static JS::ThrowCompletionOr<NonnullOwnPtr<AlgorithmParams>> from_value(JS::VM&, JS::Value);
|
||||
};
|
||||
|
||||
class AlgorithmMethods {
|
||||
public:
|
||||
virtual ~AlgorithmMethods();
|
||||
|
@ -125,6 +140,8 @@ protected:
|
|||
class RSAOAEP : public AlgorithmMethods {
|
||||
public:
|
||||
virtual WebIDL::ExceptionOr<Variant<JS::NonnullGCPtr<CryptoKey>, JS::NonnullGCPtr<CryptoKeyPair>>> generate_key(AlgorithmParams const&, bool, Vector<Bindings::KeyUsage> const&) override;
|
||||
|
||||
virtual WebIDL::ExceptionOr<JS::NonnullGCPtr<CryptoKey>> import_key(AlgorithmParams const&, Bindings::KeyFormat, CryptoKey::InternalKeyData, bool, Vector<Bindings::KeyUsage> const&) override;
|
||||
virtual WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::Object>> export_key(Bindings::KeyFormat, JS::NonnullGCPtr<CryptoKey>) override;
|
||||
|
||||
static NonnullOwnPtr<AlgorithmMethods> create(JS::Realm& realm) { return adopt_own(*new RSAOAEP(realm)); }
|
||||
|
@ -163,5 +180,6 @@ private:
|
|||
};
|
||||
|
||||
ErrorOr<String> base64_url_uint_encode(::Crypto::UnsignedBigInteger);
|
||||
WebIDL::ExceptionOr<::Crypto::UnsignedBigInteger> base64_url_uint_decode(JS::Realm&, String const& base64_url_string);
|
||||
|
||||
}
|
||||
|
|
|
@ -397,7 +397,8 @@ SupportedAlgorithmsMap supported_algorithms()
|
|||
// https://w3c.github.io/webcrypto/#rsa-oaep
|
||||
define_an_algorithm<RSAOAEP, RsaHashedKeyGenParams>("generateKey"_string, "RSA-OAEP"_string);
|
||||
define_an_algorithm<RSAOAEP>("exportKey"_string, "RSA-OAEP"_string);
|
||||
// FIXME: encrypt, decrypt, importKey
|
||||
define_an_algorithm<RSAOAEP, RsaHashedImportParams>("importKey"_string, "RSA-OAEP"_string);
|
||||
// FIXME: encrypt, decrypt
|
||||
|
||||
return internal_object;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue