Skip to content

Commit

Permalink
feat(ext/crypto): support JWK export for HMAC (denoland#11864)
Browse files Browse the repository at this point in the history
  • Loading branch information
littledivy committed Aug 29, 2021
1 parent 8a09741 commit 5ee2110
Show file tree
Hide file tree
Showing 3 changed files with 61 additions and 7 deletions.
11 changes: 8 additions & 3 deletions cli/tests/unit/webcrypto_test.ts
Original file line number Diff line number Diff line change
Expand Up @@ -254,6 +254,8 @@ const jwk: JsonWebKey = {
// unpadded base64 for rawKey.
k: "AQIDBAUGBwgJCgsMDQ4PEA",
alg: "HS256",
ext: true,
"key_ops": ["sign"],
};

unitTest(async function subtleCryptoHmacImportExport() {
Expand Down Expand Up @@ -297,7 +299,10 @@ unitTest(async function subtleCryptoHmacImportExport() {
new Uint8Array(actual2),
expected,
);
// TODO(@littledivy): Add a test for exporting JWK key when supported.
const exportedKey = await crypto.subtle.exportKey("raw", key1);
assertEquals(new Uint8Array(exportedKey), rawKey);

const exportedKey1 = await crypto.subtle.exportKey("raw", key1);
assertEquals(new Uint8Array(exportedKey1), rawKey);

const exportedKey2 = await crypto.subtle.exportKey("jwk", key2);
assertEquals(exportedKey2, jwk);
});
49 changes: 47 additions & 2 deletions ext/crypto/00_crypto.js
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
const core = window.Deno.core;
const webidl = window.__bootstrap.webidl;
const { DOMException } = window.__bootstrap.domException;
const { atob } = window.__bootstrap.base64;
const { atob, btoa } = window.__bootstrap.base64;

const {
ArrayPrototypeFind,
Expand Down Expand Up @@ -122,6 +122,13 @@
return keyBytes;
}

function unpaddedBase64(bytes) {
const binaryString = core.decode(bytes);
const base64String = btoa(binaryString);

return StringPrototypeReplace(base64String, /=/g, "");
}

// See https://www.w3.org/TR/WebCryptoAPI/#dfn-normalize-an-algorithm
// 18.4.4
function normalizeAlgorithm(algorithm, op) {
Expand Down Expand Up @@ -970,10 +977,48 @@
// 4-5.
return bits.buffer;
}
// TODO(@littledivy): jwk
case "jwk": {
// 1-3.
const jwk = {
kty: "oct",
k: unpaddedBase64(innerKey.data),
};
// 4.
const algorithm = key[_algorithm];
// 5.
const hash = algorithm.hash;
// 6.
switch (hash.name) {
case "SHA-1":
jwk.alg = "HS1";
break;
case "SHA-256":
jwk.alg = "HS256";
break;
case "SHA-384":
jwk.alg = "HS384";
break;
case "SHA-512":
jwk.alg = "HS512";
break;
default:
throw new DOMException(
"Hash algorithm not supported",
"NotSupportedError",
);
}
// 7.
jwk.key_ops = key.usages;
// 8.
jwk.ext = key[_extractable];
// 9.
return jwk;
}
default:
throw new DOMException("Not implemented", "NotSupportedError");
}
// TODO(@littledivy): Redundant break but deno_lint complains without it
break;
}
// TODO(@littledivy): RSASSA-PKCS1-v1_5
// TODO(@littledivy): RSA-PSS
Expand Down
8 changes: 6 additions & 2 deletions ext/crypto/lib.deno_crypto.d.ts
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ type KeyUsage =
| "unwrapKey"
| "verify"
| "wrapKey";

type KeyFormat = "jwk" | "pkcs8" | "raw" | "spki";
type NamedCurve = string;

interface RsaOtherPrimesInfo {
Expand Down Expand Up @@ -164,7 +164,11 @@ interface SubtleCrypto {
extractable: boolean,
keyUsages: KeyUsage[],
): Promise<CryptoKey>;
exportKey(format: "raw", key: CryptoKey): Promise<ArrayBuffer>;
exportKey(format: "jwk", key: CryptoKey): Promise<JsonWebKey>;
exportKey(
format: Exclude<KeyFormat, "jwk">,
key: CryptoKey,
): Promise<ArrayBuffer>;
sign(
algorithm: AlgorithmIdentifier | RsaPssParams | EcdsaParams,
key: CryptoKey,
Expand Down

0 comments on commit 5ee2110

Please sign in to comment.