mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 17:22:43 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			378 lines
		
	
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			378 lines
		
	
	
	
		
			18 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2021-2022, Linus Groh <linusg@serenityos.org>
 | |
|  * Copyright (c) 2023, stelar7 <dudedbz@gmail.com>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #include <LibCrypto/Hash/HashManager.h>
 | |
| #include <LibJS/Runtime/ArrayBuffer.h>
 | |
| #include <LibJS/Runtime/Promise.h>
 | |
| #include <LibWeb/Bindings/ExceptionOrUtils.h>
 | |
| #include <LibWeb/Bindings/Intrinsics.h>
 | |
| #include <LibWeb/Crypto/SubtleCrypto.h>
 | |
| #include <LibWeb/HTML/Scripting/TemporaryExecutionContext.h>
 | |
| #include <LibWeb/Platform/EventLoopPlugin.h>
 | |
| #include <LibWeb/WebIDL/AbstractOperations.h>
 | |
| #include <LibWeb/WebIDL/Buffers.h>
 | |
| #include <LibWeb/WebIDL/ExceptionOr.h>
 | |
| #include <LibWeb/WebIDL/Promise.h>
 | |
| 
 | |
| namespace Web::Crypto {
 | |
| 
 | |
| JS_DEFINE_ALLOCATOR(SubtleCrypto);
 | |
| 
 | |
| JS::NonnullGCPtr<SubtleCrypto> SubtleCrypto::create(JS::Realm& realm)
 | |
| {
 | |
|     return realm.heap().allocate<SubtleCrypto>(realm, realm);
 | |
| }
 | |
| 
 | |
| SubtleCrypto::SubtleCrypto(JS::Realm& realm)
 | |
|     : PlatformObject(realm)
 | |
| {
 | |
| }
 | |
| 
 | |
| SubtleCrypto::~SubtleCrypto() = default;
 | |
| 
 | |
| void SubtleCrypto::initialize(JS::Realm& realm)
 | |
| {
 | |
|     Base::initialize(realm);
 | |
|     set_prototype(&Bindings::ensure_web_prototype<Bindings::SubtleCryptoPrototype>(realm, "SubtleCrypto"_fly_string));
 | |
| }
 | |
| 
 | |
| // https://w3c.github.io/webcrypto/#dfn-normalize-an-algorithm
 | |
| JS::ThrowCompletionOr<Bindings::Algorithm> SubtleCrypto::normalize_an_algorithm(AlgorithmIdentifier const& algorithm, String operation)
 | |
| {
 | |
|     auto& realm = this->realm();
 | |
| 
 | |
|     // If alg is an instance of a DOMString:
 | |
|     if (algorithm.has<String>()) {
 | |
|         // Return the result of running the normalize an algorithm algorithm,
 | |
|         // with the alg set to a new Algorithm dictionary whose name attribute is alg, and with the op set to op.
 | |
|         auto dictionary = JS::make_handle(JS::Object::create(realm, realm.intrinsics().object_prototype()));
 | |
|         TRY(dictionary->create_data_property("name", JS::PrimitiveString::create(realm.vm(), algorithm.get<String>())));
 | |
|         TRY(dictionary->create_data_property("op", JS::PrimitiveString::create(realm.vm(), operation)));
 | |
| 
 | |
|         return normalize_an_algorithm(dictionary, operation);
 | |
|     }
 | |
| 
 | |
|     // If alg is an object:
 | |
|     // 1. Let registeredAlgorithms be the associative container stored at the op key of supportedAlgorithms.
 | |
|     // NOTE: There should always be a container at the op key.
 | |
|     auto internal_object = supported_algorithms();
 | |
|     auto maybe_registered_algorithms = internal_object.get(operation);
 | |
|     auto registered_algorithms = maybe_registered_algorithms.value();
 | |
| 
 | |
|     // 2. Let initialAlg be the result of converting the ECMAScript object represented by alg to
 | |
|     // the IDL dictionary type Algorithm, as defined by [WebIDL].
 | |
|     // FIXME: How do we turn this into an "Algorithm" in a nice way?
 | |
|     // NOTE: For now, we just use the object as-is.
 | |
|     auto initial_algorithm = algorithm.get<JS::Handle<JS::Object>>();
 | |
| 
 | |
|     // 3. If an error occurred, return the error and terminate this algorithm.
 | |
|     auto has_name = TRY(initial_algorithm->has_property("name"));
 | |
|     if (!has_name) {
 | |
|         return realm.vm().throw_completion<JS::TypeError>(JS::ErrorType::NotAnObjectOfType, "Algorithm");
 | |
|     }
 | |
| 
 | |
|     // 4. Let algName be the value of the name attribute of initialAlg.
 | |
|     auto algorithm_name = TRY(TRY(initial_algorithm->get("name")).to_string(realm.vm()));
 | |
| 
 | |
|     String desired_type;
 | |
| 
 | |
|     // 5. If registeredAlgorithms contains a key that is a case-insensitive string match for algName:
 | |
|     if (registered_algorithms.contains(algorithm_name)) {
 | |
|         // 1. Set algName to the value of the matching key.
 | |
|         auto it = registered_algorithms.find(algorithm_name);
 | |
|         algorithm_name = (*it).key;
 | |
| 
 | |
|         // 2. Let desiredType be the IDL dictionary type stored at algName in registeredAlgorithms.
 | |
|         desired_type = (*it).value;
 | |
|     } else {
 | |
|         // Otherwise:
 | |
|         // Return a new NotSupportedError and terminate this algorithm.
 | |
|         // FIXME: This should be a DOMException
 | |
|         return realm.vm().throw_completion<JS::TypeError>(JS::ErrorType::NotImplemented, algorithm_name);
 | |
|     }
 | |
| 
 | |
|     // 8. Let normalizedAlgorithm be the result of converting the ECMAScript object represented by alg
 | |
|     // to the IDL dictionary type desiredType, as defined by [WebIDL].
 | |
|     // FIXME: Should IDL generate a struct for each of these?
 | |
|     Bindings::Algorithm normalized_algorithm;
 | |
| 
 | |
|     // 9. Set the name attribute of normalizedAlgorithm to algName.
 | |
|     normalized_algorithm.name = algorithm_name;
 | |
| 
 | |
|     // 10. If an error occurred, return the error and terminate this algorithm.
 | |
| 
 | |
|     // FIXME: 11. Let dictionaries be a list consisting of the IDL dictionary type desiredType
 | |
|     // and all of desiredType's inherited dictionaries, in order from least to most derived.
 | |
|     // FIXME: 12. For each dictionary dictionary in dictionaries:
 | |
| 
 | |
|     // 13. Return normalizedAlgorithm.
 | |
|     return normalized_algorithm;
 | |
| }
 | |
| 
 | |
| // https://w3c.github.io/webcrypto/#dfn-SubtleCrypto-method-digest
 | |
| JS::NonnullGCPtr<JS::Promise> SubtleCrypto::digest(AlgorithmIdentifier const& algorithm, JS::Handle<WebIDL::BufferSource> const& data)
 | |
| {
 | |
|     auto& realm = this->realm();
 | |
| 
 | |
|     // 1. Let algorithm be the algorithm parameter passed to the digest() method.
 | |
| 
 | |
|     // 2. Let data be the result of getting a copy of the bytes held by the data parameter passed to the digest() method.
 | |
|     auto data_buffer_or_error = WebIDL::get_buffer_source_copy(*data->raw_object());
 | |
|     if (data_buffer_or_error.is_error()) {
 | |
|         auto promise = WebIDL::create_rejected_promise(realm, WebIDL::OperationError::create(realm, "Failed to copy bytes from ArrayBuffer"_fly_string));
 | |
|         return verify_cast<JS::Promise>(*promise->promise());
 | |
|     }
 | |
|     auto data_buffer = data_buffer_or_error.release_value();
 | |
| 
 | |
|     // 3. Let normalizedAlgorithm be the result of normalizing an algorithm, with alg set to algorithm and op set to "digest".
 | |
|     auto normalized_algorithm = normalize_an_algorithm(algorithm, "digest"_string);
 | |
| 
 | |
|     // 4. If an error occurred, return a Promise rejected with normalizedAlgorithm.
 | |
|     // FIXME: Spec bug: link to https://webidl.spec.whatwg.org/#a-promise-rejected-with
 | |
|     if (normalized_algorithm.is_error()) {
 | |
|         auto promise = WebIDL::create_rejected_promise(realm, normalized_algorithm.release_error().release_value().value());
 | |
|         return verify_cast<JS::Promise>(*promise->promise());
 | |
|     }
 | |
| 
 | |
|     // 5. Let promise be a new Promise.
 | |
|     auto promise = WebIDL::create_promise(realm);
 | |
| 
 | |
|     // 6. Return promise and perform the remaining steps in parallel.
 | |
|     Platform::EventLoopPlugin::the().deferred_invoke([&realm, algorithm_object = normalized_algorithm.release_value(), promise, data_buffer = move(data_buffer)]() -> void {
 | |
|         HTML::TemporaryExecutionContext context(Bindings::host_defined_environment_settings_object(realm), HTML::TemporaryExecutionContext::CallbacksEnabled::Yes);
 | |
| 
 | |
|         // 7. If the following steps or referenced procedures say to throw an error, reject promise with the returned error and then terminate the algorithm.
 | |
|         // FIXME: Need spec reference to https://webidl.spec.whatwg.org/#reject
 | |
| 
 | |
|         // 8. Let result be the result of performing the digest operation specified by normalizedAlgorithm using algorithm, with data as message.
 | |
|         auto algorithm_name = algorithm_object.name;
 | |
| 
 | |
|         ::Crypto::Hash::HashKind hash_kind;
 | |
|         if (algorithm_name.equals_ignoring_ascii_case("SHA-1"sv)) {
 | |
|             hash_kind = ::Crypto::Hash::HashKind::SHA1;
 | |
|         } else if (algorithm_name.equals_ignoring_ascii_case("SHA-256"sv)) {
 | |
|             hash_kind = ::Crypto::Hash::HashKind::SHA256;
 | |
|         } else if (algorithm_name.equals_ignoring_ascii_case("SHA-384"sv)) {
 | |
|             hash_kind = ::Crypto::Hash::HashKind::SHA384;
 | |
|         } else if (algorithm_name.equals_ignoring_ascii_case("SHA-512"sv)) {
 | |
|             hash_kind = ::Crypto::Hash::HashKind::SHA512;
 | |
|         } else {
 | |
|             WebIDL::reject_promise(realm, promise, WebIDL::NotSupportedError::create(realm, MUST(String::formatted("Invalid hash function '{}'", algorithm_name))));
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         ::Crypto::Hash::Manager hash { hash_kind };
 | |
|         hash.update(data_buffer);
 | |
| 
 | |
|         auto digest = hash.digest();
 | |
|         auto result_buffer = ByteBuffer::copy(digest.immutable_data(), hash.digest_size());
 | |
|         if (result_buffer.is_error()) {
 | |
|             WebIDL::reject_promise(realm, promise, WebIDL::OperationError::create(realm, "Failed to create result buffer"_fly_string));
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         auto result = JS::ArrayBuffer::create(realm, result_buffer.release_value());
 | |
| 
 | |
|         // 9. Resolve promise with result.
 | |
|         WebIDL::resolve_promise(realm, promise, result);
 | |
|     });
 | |
| 
 | |
|     return verify_cast<JS::Promise>(*promise->promise());
 | |
| }
 | |
| 
 | |
| // https://w3c.github.io/webcrypto/#SubtleCrypto-method-importKey
 | |
| JS::ThrowCompletionOr<JS::NonnullGCPtr<JS::Promise>> SubtleCrypto::import_key(Bindings::KeyFormat format, KeyDataType key_data, AlgorithmIdentifier algorithm, bool extractable, Vector<Bindings::KeyUsage> key_usages)
 | |
| {
 | |
|     auto& realm = this->realm();
 | |
| 
 | |
|     // 1. Let format, algorithm, extractable and usages, be the format, algorithm, extractable
 | |
|     // and key_usages parameters passed to the importKey() method, respectively.
 | |
| 
 | |
|     Variant<ByteBuffer, Bindings::JsonWebKey, Empty> real_key_data;
 | |
|     // 2. If format is equal to the string "raw", "pkcs8", or "spki":
 | |
|     if (format == Bindings::KeyFormat::Raw || format == Bindings::KeyFormat::Pkcs8 || format == Bindings::KeyFormat::Spki) {
 | |
|         // 1. If the keyData parameter passed to the importKey() method is a JsonWebKey dictionary, throw a TypeError.
 | |
|         if (key_data.has<Bindings::JsonWebKey>()) {
 | |
|             return realm.vm().throw_completion<JS::TypeError>(JS::ErrorType::NotAnObjectOfType, "BufferSource");
 | |
|         }
 | |
| 
 | |
|         // 2. Let keyData be the result of getting a copy of the bytes held by the keyData parameter passed to the importKey() method.
 | |
|         real_key_data = MUST(WebIDL::get_buffer_source_copy(*key_data.get<JS::Handle<WebIDL::BufferSource>>()->raw_object()));
 | |
|     }
 | |
| 
 | |
|     if (format == Bindings::KeyFormat::Jwk) {
 | |
|         // 1. If the keyData parameter passed to the importKey() method is not a JsonWebKey dictionary, throw a TypeError.
 | |
|         if (!key_data.has<Bindings::JsonWebKey>()) {
 | |
|             return realm.vm().throw_completion<JS::TypeError>(JS::ErrorType::NotAnObjectOfType, "JsonWebKey");
 | |
|         }
 | |
| 
 | |
|         // 2. Let keyData be the keyData parameter passed to the importKey() method.
 | |
|         real_key_data = key_data.get<Bindings::JsonWebKey>();
 | |
|     }
 | |
| 
 | |
|     // NOTE: The spec jumps to 5 here for some reason?
 | |
|     // 5. Let normalizedAlgorithm be the result of normalizing an algorithm, with alg set to algorithm and op set to "importKey".
 | |
|     auto normalized_algorithm = normalize_an_algorithm(algorithm, "importKey"_string);
 | |
| 
 | |
|     // 6. If an error occurred, return a Promise rejected with normalizedAlgorithm.
 | |
|     if (normalized_algorithm.is_error()) {
 | |
|         auto promise = WebIDL::create_rejected_promise(realm, normalized_algorithm.release_error().release_value().value());
 | |
|         return verify_cast<JS::Promise>(*promise->promise());
 | |
|     }
 | |
| 
 | |
|     // 7. Let promise be a new Promise.
 | |
|     auto promise = WebIDL::create_promise(realm);
 | |
| 
 | |
|     // 8. Return promise and perform the remaining steps in parallel.
 | |
|     Platform::EventLoopPlugin::the().deferred_invoke([&realm, this, real_key_data = move(real_key_data), normalized_algorithm = normalized_algorithm.release_value(), promise, format, extractable, key_usages = move(key_usages), algorithm = move(algorithm)]() -> void {
 | |
|         HTML::TemporaryExecutionContext context(Bindings::host_defined_environment_settings_object(realm), HTML::TemporaryExecutionContext::CallbacksEnabled::Yes);
 | |
| 
 | |
|         // 9. If the following steps or referenced procedures say to throw an error, reject promise with the returned error and then terminate the algorithm.
 | |
| 
 | |
|         // 10. Let result be the CryptoKey object that results from performing the import key operation
 | |
|         // specified by normalizedAlgorithm using keyData, algorithm, format, extractable and usages.
 | |
|         if (normalized_algorithm.name != "PBKDF2"sv) {
 | |
|             WebIDL::reject_promise(realm, promise, WebIDL::NotSupportedError::create(realm, MUST(String::formatted("Invalid algorithm '{}'", normalized_algorithm.name))));
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         auto maybe_result = pbkdf2_import_key(real_key_data, algorithm, format, extractable, key_usages);
 | |
|         if (maybe_result.is_error()) {
 | |
|             WebIDL::reject_promise(realm, promise, Bindings::dom_exception_to_throw_completion(realm.vm(), maybe_result.release_error()).release_value().value());
 | |
|             return;
 | |
|         }
 | |
|         auto result = maybe_result.release_value();
 | |
| 
 | |
|         // 11. If the [[type]] internal slot of result is "secret" or "private" and usages is empty, then throw a SyntaxError.
 | |
|         if ((result->type() == Bindings::KeyType::Secret || result->type() == Bindings::KeyType::Private) && key_usages.is_empty()) {
 | |
|             WebIDL::reject_promise(realm, promise, WebIDL::SyntaxError::create(realm, "usages must not be empty"_fly_string));
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         // 12. Set the [[extractable]] internal slot of result to extractable.
 | |
|         result->set_extractable(extractable);
 | |
| 
 | |
|         // 13. Set the [[usages]] internal slot of result to the normalized value of usages.
 | |
|         // FIXME: result->set_usages(key_usages);
 | |
| 
 | |
|         // 14. Resolve promise with result.
 | |
|         WebIDL::resolve_promise(realm, promise, result);
 | |
|     });
 | |
| 
 | |
|     return verify_cast<JS::Promise>(*promise->promise());
 | |
| }
 | |
| 
 | |
| SubtleCrypto::SupportedAlgorithmsMap& SubtleCrypto::supported_algorithms_internal()
 | |
| {
 | |
|     static SubtleCrypto::SupportedAlgorithmsMap s_supported_algorithms;
 | |
|     return s_supported_algorithms;
 | |
| }
 | |
| 
 | |
| // https://w3c.github.io/webcrypto/#algorithm-normalization-internalS
 | |
| SubtleCrypto::SupportedAlgorithmsMap SubtleCrypto::supported_algorithms()
 | |
| {
 | |
|     auto& internal_object = supported_algorithms_internal();
 | |
| 
 | |
|     if (!internal_object.is_empty()) {
 | |
|         return internal_object;
 | |
|     }
 | |
| 
 | |
|     // 1. For each value, v in the List of supported operations,
 | |
|     // set the v key of the internal object supportedAlgorithms to a new associative container.
 | |
|     auto supported_operations = Vector {
 | |
|         "encrypt"_string,
 | |
|         "decrypt"_string,
 | |
|         "sign"_string,
 | |
|         "verify"_string,
 | |
|         "digest"_string,
 | |
|         "deriveBits"_string,
 | |
|         "wrapKey"_string,
 | |
|         "unwrapKey"_string,
 | |
|         "generateKey"_string,
 | |
|         "importKey"_string,
 | |
|         "exportKey"_string,
 | |
|         "get key length"_string,
 | |
|     };
 | |
| 
 | |
|     for (auto& operation : supported_operations) {
 | |
|         internal_object.set(operation, {});
 | |
|     }
 | |
| 
 | |
|     // https://w3c.github.io/webcrypto/#algorithm-conventions
 | |
|     // https://w3c.github.io/webcrypto/#sha
 | |
|     define_an_algorithm("digest"_string, "SHA1"_string, ""_string);
 | |
|     define_an_algorithm("digest"_string, "SHA-256"_string, ""_string);
 | |
|     define_an_algorithm("digest"_string, "SHA-384"_string, ""_string);
 | |
|     define_an_algorithm("digest"_string, "SHA-512"_string, ""_string);
 | |
| 
 | |
|     // https://w3c.github.io/webcrypto/#pbkdf2
 | |
|     define_an_algorithm("importKey"_string, "PBKDF2"_string, ""_string);
 | |
|     // FIXME: define_an_algorithm("deriveBits"_string, "PBKDF2"_string, "Pbkdf2Params"_string);
 | |
|     // FIXME: define_an_algorithm("get key length"_string, "PBKDF2"_string, ""_string);
 | |
| 
 | |
|     return internal_object;
 | |
| }
 | |
| 
 | |
| // https://w3c.github.io/webcrypto/#concept-define-an-algorithm
 | |
| void SubtleCrypto::define_an_algorithm(String op, String algorithm, String type)
 | |
| {
 | |
|     auto& internal_object = supported_algorithms_internal();
 | |
| 
 | |
|     // 1. Let registeredAlgorithms be the associative container stored at the op key of supportedAlgorithms.
 | |
|     // NOTE: There should always be a container at the op key.
 | |
|     auto maybe_registered_algorithms = internal_object.get(op);
 | |
|     auto registered_algorithms = maybe_registered_algorithms.value();
 | |
| 
 | |
|     // 2. Set the alg key of registeredAlgorithms to the IDL dictionary type type.
 | |
|     registered_algorithms.set(algorithm, type);
 | |
|     internal_object.set(op, registered_algorithms);
 | |
| }
 | |
| 
 | |
| // https://w3c.github.io/webcrypto/#pbkdf2-operations
 | |
| WebIDL::ExceptionOr<JS::NonnullGCPtr<CryptoKey>> SubtleCrypto::pbkdf2_import_key([[maybe_unused]] Variant<ByteBuffer, Bindings::JsonWebKey, Empty> key_data, [[maybe_unused]] AlgorithmIdentifier algorithm_parameter, Bindings::KeyFormat format, bool extractable, Vector<Bindings::KeyUsage> key_usages)
 | |
| {
 | |
|     auto& realm = this->realm();
 | |
| 
 | |
|     // 1. If format is not "raw", throw a NotSupportedError
 | |
|     if (format != Bindings::KeyFormat::Raw) {
 | |
|         return WebIDL::NotSupportedError::create(realm, "Only raw format is supported"_fly_string);
 | |
|     }
 | |
| 
 | |
|     // 2. If usages contains a value that is not "deriveKey" or "deriveBits", then throw a SyntaxError.
 | |
|     for (auto& usage : key_usages) {
 | |
|         if (usage != Bindings::KeyUsage::Derivekey && usage != Bindings::KeyUsage::Derivebits) {
 | |
|             return WebIDL::SyntaxError::create(realm, MUST(String::formatted("Invalid key usage '{}'", idl_enum_to_string(usage))));
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     // 3. If extractable is not false, then throw a SyntaxError.
 | |
|     if (extractable)
 | |
|         return WebIDL::SyntaxError::create(realm, "extractable must be false"_fly_string);
 | |
| 
 | |
|     // 4. Let key be a new CryptoKey representing keyData.
 | |
|     auto key = CryptoKey::create(realm);
 | |
| 
 | |
|     // 5. Set the [[type]] internal slot of key to "secret".
 | |
|     key->set_type(Bindings::KeyType::Secret);
 | |
| 
 | |
|     // 6. Set the [[extractable]] internal slot of key to false.
 | |
|     key->set_extractable(false);
 | |
| 
 | |
|     // 7. Let algorithm be a new KeyAlgorithm object.
 | |
|     auto algorithm = Bindings::KeyAlgorithm::create(realm);
 | |
| 
 | |
|     // 8. Set the name attribute of algorithm to "PBKDF2".
 | |
|     algorithm->set_name("PBKDF2"_string);
 | |
| 
 | |
|     // 9. Set the [[algorithm]] internal slot of key to algorithm.
 | |
|     key->set_algorithm(algorithm);
 | |
| 
 | |
|     // 10. Return key.
 | |
|     return key;
 | |
| }
 | |
| 
 | |
| }
 | 
