diff options
author | 2022-10-23 20:25:18 -0700 | |
---|---|---|
committer | 2022-10-23 20:25:18 -0700 | |
commit | 76652ac3cad64dbc2fd54e976ce4bad0a37caa03 (patch) | |
tree | 179865bc417dc6bf2f224dd310b77b931ee45c73 /src/bun.js/bindings/webcrypto/CryptoAlgorithmHMAC.cpp | |
parent | 14cec299f5170b8ed35eed28e53b88724b8cc04f (diff) | |
download | bun-76652ac3cad64dbc2fd54e976ce4bad0a37caa03.tar.gz bun-76652ac3cad64dbc2fd54e976ce4bad0a37caa03.tar.zst bun-76652ac3cad64dbc2fd54e976ce4bad0a37caa03.zip |
Add Web Crypto API (#1384)
* Add Web Crypto API
* Duplicate symbols
* Update c_cpp_properties.json
Co-authored-by: Jarred Sumner <709451+Jarred-Sumner@users.noreply.github.com>
Diffstat (limited to 'src/bun.js/bindings/webcrypto/CryptoAlgorithmHMAC.cpp')
-rw-r--r-- | src/bun.js/bindings/webcrypto/CryptoAlgorithmHMAC.cpp | 202 |
1 files changed, 202 insertions, 0 deletions
diff --git a/src/bun.js/bindings/webcrypto/CryptoAlgorithmHMAC.cpp b/src/bun.js/bindings/webcrypto/CryptoAlgorithmHMAC.cpp new file mode 100644 index 000000000..58eaf1b0d --- /dev/null +++ b/src/bun.js/bindings/webcrypto/CryptoAlgorithmHMAC.cpp @@ -0,0 +1,202 @@ +/* + * Copyright (C) 2013 Apple Inc. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, + * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF + * THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "config.h" +#include "CryptoAlgorithmHMAC.h" + +#if ENABLE(WEB_CRYPTO) + +#include "CryptoAlgorithmHmacKeyParams.h" +#include "CryptoKeyHMAC.h" +#include <variant> + +namespace WebCore { + +namespace CryptoAlgorithmHMACInternal { +static constexpr auto ALG1 = "HS1"_s; +static constexpr auto ALG224 = "HS224"_s; +static constexpr auto ALG256 = "HS256"_s; +static constexpr auto ALG384 = "HS384"_s; +static constexpr auto ALG512 = "HS512"_s; +} + +static inline bool usagesAreInvalidForCryptoAlgorithmHMAC(CryptoKeyUsageBitmap usages) +{ + return usages & (CryptoKeyUsageEncrypt | CryptoKeyUsageDecrypt | CryptoKeyUsageDeriveKey | CryptoKeyUsageDeriveBits | CryptoKeyUsageWrapKey | CryptoKeyUsageUnwrapKey); +} + +Ref<CryptoAlgorithm> CryptoAlgorithmHMAC::create() +{ + return adoptRef(*new CryptoAlgorithmHMAC); +} + +CryptoAlgorithmIdentifier CryptoAlgorithmHMAC::identifier() const +{ + return s_identifier; +} + +void CryptoAlgorithmHMAC::sign(const CryptoAlgorithmParameters&, Ref<CryptoKey>&& key, Vector<uint8_t>&& data, VectorCallback&& callback, ExceptionCallback&& exceptionCallback, ScriptExecutionContext& context, WorkQueue& workQueue) +{ + dispatchOperationInWorkQueue(workQueue, context, WTFMove(callback), WTFMove(exceptionCallback), + [key = WTFMove(key), data = WTFMove(data)] { + return platformSign(downcast<CryptoKeyHMAC>(key.get()), data); + }); +} + +void CryptoAlgorithmHMAC::verify(const CryptoAlgorithmParameters&, Ref<CryptoKey>&& key, Vector<uint8_t>&& signature, Vector<uint8_t>&& data, BoolCallback&& callback, ExceptionCallback&& exceptionCallback, ScriptExecutionContext& context, WorkQueue& workQueue) +{ + dispatchOperationInWorkQueue(workQueue, context, WTFMove(callback), WTFMove(exceptionCallback), + [key = WTFMove(key), signature = WTFMove(signature), data = WTFMove(data)] { + return platformVerify(downcast<CryptoKeyHMAC>(key.get()), signature, data); + }); +} + +void CryptoAlgorithmHMAC::generateKey(const CryptoAlgorithmParameters& parameters, bool extractable, CryptoKeyUsageBitmap usages, KeyOrKeyPairCallback&& callback, ExceptionCallback&& exceptionCallback, ScriptExecutionContext&) +{ + const auto& hmacParameters = downcast<CryptoAlgorithmHmacKeyParams>(parameters); + + if (usagesAreInvalidForCryptoAlgorithmHMAC(usages)) { + exceptionCallback(SyntaxError); + return; + } + + if (hmacParameters.length && !hmacParameters.length.value()) { + exceptionCallback(OperationError); + return; + } + + auto result = CryptoKeyHMAC::generate(hmacParameters.length.value_or(0), hmacParameters.hashIdentifier, extractable, usages); + if (!result) { + exceptionCallback(OperationError); + return; + } + + callback(WTFMove(result)); +} + +void CryptoAlgorithmHMAC::importKey(CryptoKeyFormat format, KeyData&& data, const CryptoAlgorithmParameters& parameters, bool extractable, CryptoKeyUsageBitmap usages, KeyCallback&& callback, ExceptionCallback&& exceptionCallback) +{ + using namespace CryptoAlgorithmHMACInternal; + + const auto& hmacParameters = downcast<CryptoAlgorithmHmacKeyParams>(parameters); + + if (usagesAreInvalidForCryptoAlgorithmHMAC(usages)) { + exceptionCallback(SyntaxError); + return; + } + + RefPtr<CryptoKeyHMAC> result; + switch (format) { + case CryptoKeyFormat::Raw: + result = CryptoKeyHMAC::importRaw(hmacParameters.length.value_or(0), hmacParameters.hashIdentifier, WTFMove(std::get<Vector<uint8_t>>(data)), extractable, usages); + break; + case CryptoKeyFormat::Jwk: { + auto checkAlgCallback = [](CryptoAlgorithmIdentifier hash, const String& alg) -> bool { + switch (hash) { + case CryptoAlgorithmIdentifier::SHA_1: + return alg.isNull() || alg == ALG1; + case CryptoAlgorithmIdentifier::SHA_224: + return alg.isNull() || alg == ALG224; + case CryptoAlgorithmIdentifier::SHA_256: + return alg.isNull() || alg == ALG256; + case CryptoAlgorithmIdentifier::SHA_384: + return alg.isNull() || alg == ALG384; + case CryptoAlgorithmIdentifier::SHA_512: + return alg.isNull() || alg == ALG512; + default: + return false; + } + return false; + }; + result = CryptoKeyHMAC::importJwk(hmacParameters.length.value_or(0), hmacParameters.hashIdentifier, WTFMove(std::get<JsonWebKey>(data)), extractable, usages, WTFMove(checkAlgCallback)); + break; + } + default: + exceptionCallback(NotSupportedError); + return; + } + if (!result) { + exceptionCallback(DataError); + return; + } + + callback(*result); +} + +void CryptoAlgorithmHMAC::exportKey(CryptoKeyFormat format, Ref<CryptoKey>&& key, KeyDataCallback&& callback, ExceptionCallback&& exceptionCallback) +{ + using namespace CryptoAlgorithmHMACInternal; + const auto& hmacKey = downcast<CryptoKeyHMAC>(key.get()); + + if (hmacKey.key().isEmpty()) { + exceptionCallback(OperationError); + return; + } + + KeyData result; + switch (format) { + case CryptoKeyFormat::Raw: + result = Vector<uint8_t>(hmacKey.key()); + break; + case CryptoKeyFormat::Jwk: { + JsonWebKey jwk = hmacKey.exportJwk(); + switch (hmacKey.hashAlgorithmIdentifier()) { + case CryptoAlgorithmIdentifier::SHA_1: + jwk.alg = String(ALG1); + break; + case CryptoAlgorithmIdentifier::SHA_224: + jwk.alg = String(ALG224); + break; + case CryptoAlgorithmIdentifier::SHA_256: + jwk.alg = String(ALG256); + break; + case CryptoAlgorithmIdentifier::SHA_384: + jwk.alg = String(ALG384); + break; + case CryptoAlgorithmIdentifier::SHA_512: + jwk.alg = String(ALG512); + break; + default: + ASSERT_NOT_REACHED(); + } + result = WTFMove(jwk); + break; + } + default: + exceptionCallback(NotSupportedError); + return; + } + + callback(format, WTFMove(result)); +} + +ExceptionOr<size_t> CryptoAlgorithmHMAC::getKeyLength(const CryptoAlgorithmParameters& parameters) +{ + return CryptoKeyHMAC::getKeyLength(parameters); +} + +} + +#endif // ENABLE(WEB_CRYPTO) |