mirror of
https://github.com/SerenityOS/serenity
synced 2026-05-13 18:37:37 +02:00
LibWeb: Fix crash when importing malformed RSAOAEP key
This fixes a crash in WPT: WebCryptoAPI/import_export/rsa_importKey.https.any This allows us to pass 240 tests! (cherry picked from commit 124bd115a1342d9b4a7536fa62acedee279a12c9)
This commit is contained in:
committed by
Nico Weber
parent
b57e502d21
commit
806f30d1d2
@@ -0,0 +1,4 @@
|
||||
true
|
||||
RSA-OAEP
|
||||
SHA-1
|
||||
1,0,1
|
||||
@@ -0,0 +1,23 @@
|
||||
<!DOCTYPE html>
|
||||
<script src="../include.js"></script>
|
||||
<script>
|
||||
asyncTest(async done => {
|
||||
var subtle = self.crypto.subtle;
|
||||
var key = await subtle.importKey(
|
||||
"jwk",
|
||||
{
|
||||
kty: "RSA",
|
||||
n: "zZn4sRGfjQos56yL_Qy1R9NI-THMnFynn94g5RxA6wGrJh4BJT3x6I9x0IbpS3q-d4ORA6R2vuDMh8dDFRr9RDH6XY-gUScc9U5Jz3UA2KmVfsCbnUPvcAmMV_ENA7_TF0ivVjuIFodyDTx7EKHNVTrHHSlrbt7spbmcivs23Zc",
|
||||
e: "AQAB",
|
||||
},
|
||||
{ name: "RSA-OAEP", hash: "SHA-1" },
|
||||
true,
|
||||
["encrypt", "wrapKey"]
|
||||
);
|
||||
println(key.extractable);
|
||||
println(key.algorithm.name);
|
||||
println(key.algorithm.hash);
|
||||
println(key.algorithm.publicExponent);
|
||||
done();
|
||||
});
|
||||
</script>
|
||||
@@ -653,9 +653,11 @@ WebIDL::ExceptionOr<JS::NonnullGCPtr<CryptoKey>> RSAOAEP::import_key(Web::Crypto
|
||||
|
||||
// 6. If the key_ops field of jwk is present, and is invalid according to the requirements of JSON Web Key [JWK]
|
||||
// or does not contain all of the specified usages values, then throw a DataError.
|
||||
for (auto const& usage : usages) {
|
||||
if (!jwk.key_ops->contains_slow(Bindings::idl_enum_to_string(usage)))
|
||||
return WebIDL::DataError::create(m_realm, MUST(String::formatted("Missing key_ops field: {}", Bindings::idl_enum_to_string(usage))));
|
||||
if (jwk.key_ops.has_value()) {
|
||||
for (auto const& usage : usages) {
|
||||
if (!jwk.key_ops->contains_slow(Bindings::idl_enum_to_string(usage)))
|
||||
return WebIDL::DataError::create(m_realm, MUST(String::formatted("Missing key_ops field: {}", Bindings::idl_enum_to_string(usage))));
|
||||
}
|
||||
}
|
||||
// FIXME: Validate jwk.key_ops against requirements in https://www.rfc-editor.org/rfc/rfc7517#section-4.3
|
||||
|
||||
@@ -669,7 +671,7 @@ WebIDL::ExceptionOr<JS::NonnullGCPtr<CryptoKey>> RSAOAEP::import_key(Web::Crypto
|
||||
// Let hash be undefined.
|
||||
}
|
||||
// -> If the alg field of jwk is equal to "RSA-OAEP":
|
||||
if (jwk.alg == "RSA-OAEP"sv) {
|
||||
else if (jwk.alg == "RSA-OAEP"sv) {
|
||||
// Let hash be the string "SHA-1".
|
||||
hash = "SHA-1"_string;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user