crypto_key.js 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152
  1. function unusable(name, prop = 'algorithm.name') {
  2. return new TypeError(`CryptoKey does not support this operation, its ${prop} must be ${name}`);
  3. }
  4. function isAlgorithm(algorithm, name) {
  5. return algorithm.name === name;
  6. }
  7. function getHashLength(hash) {
  8. return parseInt(hash.name.slice(4), 10);
  9. }
  10. function getNamedCurve(alg) {
  11. switch (alg) {
  12. case 'ES256':
  13. return 'P-256';
  14. case 'ES384':
  15. return 'P-384';
  16. case 'ES512':
  17. return 'P-521';
  18. default:
  19. throw new Error('unreachable');
  20. }
  21. }
  22. function checkUsage(key, usages) {
  23. if (usages.length && !usages.some((expected) => key.usages.includes(expected))) {
  24. let msg = 'CryptoKey does not support this operation, its usages must include ';
  25. if (usages.length > 2) {
  26. const last = usages.pop();
  27. msg += `one of ${usages.join(', ')}, or ${last}.`;
  28. }
  29. else if (usages.length === 2) {
  30. msg += `one of ${usages[0]} or ${usages[1]}.`;
  31. }
  32. else {
  33. msg += `${usages[0]}.`;
  34. }
  35. throw new TypeError(msg);
  36. }
  37. }
  38. export function checkSigCryptoKey(key, alg, ...usages) {
  39. switch (alg) {
  40. case 'HS256':
  41. case 'HS384':
  42. case 'HS512': {
  43. if (!isAlgorithm(key.algorithm, 'HMAC'))
  44. throw unusable('HMAC');
  45. const expected = parseInt(alg.slice(2), 10);
  46. const actual = getHashLength(key.algorithm.hash);
  47. if (actual !== expected)
  48. throw unusable(`SHA-${expected}`, 'algorithm.hash');
  49. break;
  50. }
  51. case 'RS256':
  52. case 'RS384':
  53. case 'RS512': {
  54. if (!isAlgorithm(key.algorithm, 'RSASSA-PKCS1-v1_5'))
  55. throw unusable('RSASSA-PKCS1-v1_5');
  56. const expected = parseInt(alg.slice(2), 10);
  57. const actual = getHashLength(key.algorithm.hash);
  58. if (actual !== expected)
  59. throw unusable(`SHA-${expected}`, 'algorithm.hash');
  60. break;
  61. }
  62. case 'PS256':
  63. case 'PS384':
  64. case 'PS512': {
  65. if (!isAlgorithm(key.algorithm, 'RSA-PSS'))
  66. throw unusable('RSA-PSS');
  67. const expected = parseInt(alg.slice(2), 10);
  68. const actual = getHashLength(key.algorithm.hash);
  69. if (actual !== expected)
  70. throw unusable(`SHA-${expected}`, 'algorithm.hash');
  71. break;
  72. }
  73. case 'EdDSA': {
  74. if (key.algorithm.name !== 'Ed25519' && key.algorithm.name !== 'Ed448') {
  75. throw unusable('Ed25519 or Ed448');
  76. }
  77. break;
  78. }
  79. case 'ES256':
  80. case 'ES384':
  81. case 'ES512': {
  82. if (!isAlgorithm(key.algorithm, 'ECDSA'))
  83. throw unusable('ECDSA');
  84. const expected = getNamedCurve(alg);
  85. const actual = key.algorithm.namedCurve;
  86. if (actual !== expected)
  87. throw unusable(expected, 'algorithm.namedCurve');
  88. break;
  89. }
  90. default:
  91. throw new TypeError('CryptoKey does not support this operation');
  92. }
  93. checkUsage(key, usages);
  94. }
  95. export function checkEncCryptoKey(key, alg, ...usages) {
  96. switch (alg) {
  97. case 'A128GCM':
  98. case 'A192GCM':
  99. case 'A256GCM': {
  100. if (!isAlgorithm(key.algorithm, 'AES-GCM'))
  101. throw unusable('AES-GCM');
  102. const expected = parseInt(alg.slice(1, 4), 10);
  103. const actual = key.algorithm.length;
  104. if (actual !== expected)
  105. throw unusable(expected, 'algorithm.length');
  106. break;
  107. }
  108. case 'A128KW':
  109. case 'A192KW':
  110. case 'A256KW': {
  111. if (!isAlgorithm(key.algorithm, 'AES-KW'))
  112. throw unusable('AES-KW');
  113. const expected = parseInt(alg.slice(1, 4), 10);
  114. const actual = key.algorithm.length;
  115. if (actual !== expected)
  116. throw unusable(expected, 'algorithm.length');
  117. break;
  118. }
  119. case 'ECDH': {
  120. switch (key.algorithm.name) {
  121. case 'ECDH':
  122. case 'X25519':
  123. case 'X448':
  124. break;
  125. default:
  126. throw unusable('ECDH, X25519, or X448');
  127. }
  128. break;
  129. }
  130. case 'PBES2-HS256+A128KW':
  131. case 'PBES2-HS384+A192KW':
  132. case 'PBES2-HS512+A256KW':
  133. if (!isAlgorithm(key.algorithm, 'PBKDF2'))
  134. throw unusable('PBKDF2');
  135. break;
  136. case 'RSA-OAEP':
  137. case 'RSA-OAEP-256':
  138. case 'RSA-OAEP-384':
  139. case 'RSA-OAEP-512': {
  140. if (!isAlgorithm(key.algorithm, 'RSA-OAEP'))
  141. throw unusable('RSA-OAEP');
  142. const expected = parseInt(alg.slice(9), 10) || 1;
  143. const actual = getHashLength(key.algorithm.hash);
  144. if (actual !== expected)
  145. throw unusable(`SHA-${expected}`, 'algorithm.hash');
  146. break;
  147. }
  148. default:
  149. throw new TypeError('CryptoKey does not support this operation');
  150. }
  151. checkUsage(key, usages);
  152. }