CryptoKey.cpp 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. /*
  2. * Copyright (c) 2023, stelar7 <dudedbz@gmail.com>
  3. * Copyright (c) 2024, Andrew Kaster <akaster@serenityos.org>
  4. *
  5. * SPDX-License-Identifier: BSD-2-Clause
  6. */
  7. #include <AK/Memory.h>
  8. #include <LibJS/Runtime/Array.h>
  9. #include <LibWeb/Bindings/ExceptionOrUtils.h>
  10. #include <LibWeb/Crypto/CryptoKey.h>
  11. namespace Web::Crypto {
  12. JS_DEFINE_ALLOCATOR(CryptoKey);
  13. JS_DEFINE_ALLOCATOR(CryptoKeyPair);
  14. JS::NonnullGCPtr<CryptoKey> CryptoKey::create(JS::Realm& realm, InternalKeyData key_data)
  15. {
  16. return realm.heap().allocate<CryptoKey>(realm, realm, move(key_data));
  17. }
  18. CryptoKey::CryptoKey(JS::Realm& realm, InternalKeyData key_data)
  19. : PlatformObject(realm)
  20. , m_algorithm(Object::create(realm, nullptr))
  21. , m_usages(Object::create(realm, nullptr))
  22. , m_key_data(move(key_data))
  23. {
  24. }
  25. CryptoKey::~CryptoKey()
  26. {
  27. m_key_data.visit(
  28. [](ByteBuffer& data) { secure_zero(data.data(), data.size()); },
  29. [](auto& data) { secure_zero(reinterpret_cast<u8*>(&data), sizeof(data)); });
  30. }
  31. void CryptoKey::initialize(JS::Realm& realm)
  32. {
  33. Base::initialize(realm);
  34. WEB_SET_PROTOTYPE_FOR_INTERFACE(CryptoKey);
  35. }
  36. void CryptoKey::visit_edges(Visitor& visitor)
  37. {
  38. Base::visit_edges(visitor);
  39. visitor.visit(m_algorithm);
  40. visitor.visit(m_usages);
  41. }
  42. void CryptoKey::set_usages(Vector<Bindings::KeyUsage> usages)
  43. {
  44. m_key_usages = move(usages);
  45. auto& realm = this->realm();
  46. m_usages = JS::Array::create_from<Bindings::KeyUsage>(realm, m_key_usages.span(), [&](auto& key_usage) -> JS::Value {
  47. return JS::PrimitiveString::create(realm.vm(), Bindings::idl_enum_to_string(key_usage));
  48. });
  49. }
  50. JS::NonnullGCPtr<CryptoKeyPair> CryptoKeyPair::create(JS::Realm& realm, JS::NonnullGCPtr<CryptoKey> public_key, JS::NonnullGCPtr<CryptoKey> private_key)
  51. {
  52. return realm.heap().allocate<CryptoKeyPair>(realm, realm, public_key, private_key);
  53. }
  54. CryptoKeyPair::CryptoKeyPair(JS::Realm& realm, JS::NonnullGCPtr<CryptoKey> public_key, JS::NonnullGCPtr<CryptoKey> private_key)
  55. : Object(ConstructWithPrototypeTag::Tag, realm.intrinsics().object_prototype())
  56. , m_public_key(public_key)
  57. , m_private_key(private_key)
  58. {
  59. }
  60. void CryptoKeyPair::initialize(JS::Realm& realm)
  61. {
  62. define_native_accessor(realm, "publicKey", public_key_getter, {}, JS::Attribute::Enumerable | JS::Attribute::Configurable);
  63. define_native_accessor(realm, "privateKey", private_key_getter, {}, JS::Attribute::Enumerable | JS::Attribute::Configurable);
  64. Base::initialize(realm);
  65. }
  66. void CryptoKeyPair::visit_edges(Visitor& visitor)
  67. {
  68. Base::visit_edges(visitor);
  69. visitor.visit(m_public_key);
  70. visitor.visit(m_private_key);
  71. }
  72. static JS::ThrowCompletionOr<CryptoKeyPair*> impl_from(JS::VM& vm)
  73. {
  74. auto this_value = vm.this_value();
  75. JS::Object* this_object = nullptr;
  76. if (this_value.is_nullish())
  77. this_object = &vm.current_realm()->global_object();
  78. else
  79. this_object = TRY(this_value.to_object(vm));
  80. if (!is<CryptoKeyPair>(this_object))
  81. return vm.throw_completion<JS::TypeError>(JS::ErrorType::NotAnObjectOfType, "CryptoKeyPair");
  82. return static_cast<CryptoKeyPair*>(this_object);
  83. }
  84. JS_DEFINE_NATIVE_FUNCTION(CryptoKeyPair::public_key_getter)
  85. {
  86. auto* impl = TRY(impl_from(vm));
  87. return TRY(Bindings::throw_dom_exception_if_needed(vm, [&] { return impl->public_key(); }));
  88. }
  89. JS_DEFINE_NATIVE_FUNCTION(CryptoKeyPair::private_key_getter)
  90. {
  91. auto* impl = TRY(impl_from(vm));
  92. return TRY(Bindings::throw_dom_exception_if_needed(vm, [&] { return impl->private_key(); }));
  93. }
  94. }