mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-11-25 00:50:22 +00:00
LibWeb: Implement AES-CTR.decrypt
This commit is contained in:
parent
74403d7f1e
commit
af3383df09
Notes:
github-actions[bot]
2024-10-31 07:15:52 +00:00
Author: https://github.com/stelar7 Commit: https://github.com/LadybirdBrowser/ladybird/commit/af3383df09f Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/2070
3 changed files with 33 additions and 0 deletions
|
@ -1696,6 +1696,37 @@ WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::ArrayBuffer>> AesCtr::encrypt(Algorithm
|
|||
return JS::ArrayBuffer::create(m_realm, ciphertext);
|
||||
}
|
||||
|
||||
WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::ArrayBuffer>> AesCtr::decrypt(AlgorithmParams const& params, JS::NonnullGCPtr<CryptoKey> key, ByteBuffer const& ciphertext)
|
||||
{
|
||||
// 1. If the counter member of normalizedAlgorithm does not have length 16 bytes, then throw an OperationError.
|
||||
auto const& normalized_algorithm = static_cast<AesCtrParams const&>(params);
|
||||
auto const& counter = normalized_algorithm.counter;
|
||||
if (counter.size() != 16)
|
||||
return WebIDL::OperationError::create(m_realm, "Invalid counter length"_string);
|
||||
|
||||
// 2. If the length member of normalizedAlgorithm is zero or is greater than 128, then throw an OperationError.
|
||||
auto const& length = normalized_algorithm.length;
|
||||
if (length == 0 || length > 128)
|
||||
return WebIDL::OperationError::create(m_realm, "Invalid length"_string);
|
||||
|
||||
// 3. Let plaintext be the result of performing the CTR Decryption operation described in Section 6.5 of [NIST-SP800-38A] using
|
||||
// AES as the block cipher,
|
||||
// the contents of the counter member of normalizedAlgorithm as the initial value of the counter block,
|
||||
// the length member of normalizedAlgorithm as the input parameter m to the standard counter block incrementing function defined in Appendix B.1 of [NIST-SP800-38A]
|
||||
// and the contents of ciphertext as the input ciphertext.
|
||||
auto& aes_algorithm = static_cast<AesKeyAlgorithm const&>(*key->algorithm());
|
||||
auto key_length = aes_algorithm.length();
|
||||
auto key_bytes = key->handle().get<ByteBuffer>();
|
||||
|
||||
::Crypto::Cipher::AESCipher::CTRMode cipher(key_bytes, key_length, ::Crypto::Cipher::Intent::Decryption);
|
||||
ByteBuffer plaintext = TRY_OR_THROW_OOM(m_realm->vm(), ByteBuffer::create_zeroed(ciphertext.size()));
|
||||
Bytes plaintext_span = plaintext.bytes();
|
||||
cipher.decrypt(ciphertext, plaintext_span, counter);
|
||||
|
||||
// 4. Return the result of creating an ArrayBuffer containing plaintext.
|
||||
return JS::ArrayBuffer::create(m_realm, plaintext);
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webcrypto/#hkdf-operations
|
||||
WebIDL::ExceptionOr<JS::NonnullGCPtr<CryptoKey>> HKDF::import_key(AlgorithmParams const&, Bindings::KeyFormat format, CryptoKey::InternalKeyData key_data, bool extractable, Vector<Bindings::KeyUsage> const& key_usages)
|
||||
{
|
||||
|
|
|
@ -350,6 +350,7 @@ public:
|
|||
virtual WebIDL::ExceptionOr<JS::Value> get_key_length(AlgorithmParams const&) override;
|
||||
virtual WebIDL::ExceptionOr<Variant<JS::NonnullGCPtr<CryptoKey>, JS::NonnullGCPtr<CryptoKeyPair>>> generate_key(AlgorithmParams const&, bool, Vector<Bindings::KeyUsage> const&) override;
|
||||
virtual WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::ArrayBuffer>> encrypt(AlgorithmParams const&, JS::NonnullGCPtr<CryptoKey>, ByteBuffer const&) override;
|
||||
virtual WebIDL::ExceptionOr<JS::NonnullGCPtr<JS::ArrayBuffer>> decrypt(AlgorithmParams const&, JS::NonnullGCPtr<CryptoKey>, ByteBuffer const&) override;
|
||||
|
||||
static NonnullOwnPtr<AlgorithmMethods> create(JS::Realm& realm) { return adopt_own(*new AesCtr(realm)); }
|
||||
|
||||
|
|
|
@ -778,6 +778,7 @@ SupportedAlgorithmsMap supported_algorithms()
|
|||
|
||||
// https://w3c.github.io/webcrypto/#aes-ctr-registration
|
||||
define_an_algorithm<AesCtr, AesCtrParams>("encrypt"_string, "AES-CTR"_string);
|
||||
define_an_algorithm<AesCtr, AesCtrParams>("decrypt"_string, "AES-CTR"_string);
|
||||
define_an_algorithm<AesCtr>("importKey"_string, "AES-CTR"_string);
|
||||
define_an_algorithm<AesCtr>("exportKey"_string, "AES-CTR"_string);
|
||||
define_an_algorithm<AesCtr, AesDerivedKeyParams>("get key length"_string, "AES-CTR"_string);
|
||||
|
|
Loading…
Reference in a new issue