summaryrefslogtreecommitdiffstats
path: root/dom/push/test/webpush.js
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
commit0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d (patch)
treea31f07c9bcca9d56ce61e9a1ffd30ef350d513aa /dom/push/test/webpush.js
parentInitial commit. (diff)
downloadfirefox-esr-0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d.tar.xz
firefox-esr-0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d.zip
Adding upstream version 115.8.0esr.upstream/115.8.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/push/test/webpush.js')
-rw-r--r--dom/push/test/webpush.js228
1 files changed, 228 insertions, 0 deletions
diff --git a/dom/push/test/webpush.js b/dom/push/test/webpush.js
new file mode 100644
index 0000000000..b97e465a8b
--- /dev/null
+++ b/dom/push/test/webpush.js
@@ -0,0 +1,228 @@
+/*
+ * Browser-based Web Push client for the application server piece.
+ *
+ * Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/licenses/publicdomain/
+ *
+ * Uses the WebCrypto API.
+ *
+ * Note that this test file uses the old, deprecated aesgcm128 encryption
+ * scheme. PushCrypto.encrypt() exists and uses the later aes128gcm, but
+ * there's no good reason to upgrade this at this time (and having mochitests
+ * use PushCrypto directly is easier said than done.)
+ */
+
+(function (g) {
+ "use strict";
+
+ var P256DH = {
+ name: "ECDH",
+ namedCurve: "P-256",
+ };
+ var webCrypto = g.crypto.subtle;
+ var ENCRYPT_INFO = new TextEncoder().encode("Content-Encoding: aesgcm128");
+ var NONCE_INFO = new TextEncoder().encode("Content-Encoding: nonce");
+
+ function chunkArray(array, size) {
+ var start = array.byteOffset || 0;
+ array = array.buffer || array;
+ var index = 0;
+ var result = [];
+ while (index + size <= array.byteLength) {
+ result.push(new Uint8Array(array, start + index, size));
+ index += size;
+ }
+ if (index < array.byteLength) {
+ result.push(new Uint8Array(array, start + index));
+ }
+ return result;
+ }
+
+ /* I can't believe that this is needed here, in this day and age ...
+ * Note: these are not efficient, merely expedient.
+ */
+ var base64url = {
+ _strmap: "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_",
+ encode(data) {
+ data = new Uint8Array(data);
+ var len = Math.ceil((data.length * 4) / 3);
+ return chunkArray(data, 3)
+ .map(chunk =>
+ [
+ chunk[0] >>> 2,
+ ((chunk[0] & 0x3) << 4) | (chunk[1] >>> 4),
+ ((chunk[1] & 0xf) << 2) | (chunk[2] >>> 6),
+ chunk[2] & 0x3f,
+ ]
+ .map(v => base64url._strmap[v])
+ .join("")
+ )
+ .join("")
+ .slice(0, len);
+ },
+ _lookup(s, i) {
+ return base64url._strmap.indexOf(s.charAt(i));
+ },
+ decode(str) {
+ var v = new Uint8Array(Math.floor((str.length * 3) / 4));
+ var vi = 0;
+ for (var si = 0; si < str.length; ) {
+ var w = base64url._lookup(str, si++);
+ var x = base64url._lookup(str, si++);
+ var y = base64url._lookup(str, si++);
+ var z = base64url._lookup(str, si++);
+ v[vi++] = (w << 2) | (x >>> 4);
+ v[vi++] = (x << 4) | (y >>> 2);
+ v[vi++] = (y << 6) | z;
+ }
+ return v;
+ },
+ };
+
+ g.base64url = base64url;
+
+ /* Coerces data into a Uint8Array */
+ function ensureView(data) {
+ if (typeof data === "string") {
+ return new TextEncoder().encode(data);
+ }
+ if (data instanceof ArrayBuffer) {
+ return new Uint8Array(data);
+ }
+ if (ArrayBuffer.isView(data)) {
+ return new Uint8Array(data.buffer);
+ }
+ throw new Error("webpush() needs a string or BufferSource");
+ }
+
+ function bsConcat(arrays) {
+ var size = arrays.reduce((total, a) => total + a.byteLength, 0);
+ var index = 0;
+ return arrays.reduce((result, a) => {
+ result.set(new Uint8Array(a), index);
+ index += a.byteLength;
+ return result;
+ }, new Uint8Array(size));
+ }
+
+ function hmac(key) {
+ this.keyPromise = webCrypto.importKey(
+ "raw",
+ key,
+ { name: "HMAC", hash: "SHA-256" },
+ false,
+ ["sign"]
+ );
+ }
+ hmac.prototype.hash = function (input) {
+ return this.keyPromise.then(k => webCrypto.sign("HMAC", k, input));
+ };
+
+ function hkdf(salt, ikm) {
+ this.prkhPromise = new hmac(salt).hash(ikm).then(prk => new hmac(prk));
+ }
+
+ hkdf.prototype.generate = function (info, len) {
+ var input = bsConcat([info, new Uint8Array([1])]);
+ return this.prkhPromise
+ .then(prkh => prkh.hash(input))
+ .then(h => {
+ if (h.byteLength < len) {
+ throw new Error("Length is too long");
+ }
+ return h.slice(0, len);
+ });
+ };
+
+ /* generate a 96-bit IV for use in GCM, 48-bits of which are populated */
+ function generateNonce(base, index) {
+ var nonce = base.slice(0, 12);
+ for (var i = 0; i < 6; ++i) {
+ nonce[nonce.length - 1 - i] ^= (index / Math.pow(256, i)) & 0xff;
+ }
+ return nonce;
+ }
+
+ function encrypt(localKey, remoteShare, salt, data) {
+ return webCrypto
+ .importKey("raw", remoteShare, P256DH, false, ["deriveBits"])
+ .then(remoteKey =>
+ webCrypto.deriveBits(
+ { name: P256DH.name, public: remoteKey },
+ localKey,
+ 256
+ )
+ )
+ .then(rawKey => {
+ var kdf = new hkdf(salt, rawKey);
+ return Promise.all([
+ kdf
+ .generate(ENCRYPT_INFO, 16)
+ .then(gcmBits =>
+ webCrypto.importKey("raw", gcmBits, "AES-GCM", false, ["encrypt"])
+ ),
+ kdf.generate(NONCE_INFO, 12),
+ ]);
+ })
+ .then(([key, nonce]) => {
+ if (data.byteLength === 0) {
+ // Send an authentication tag for empty messages.
+ return webCrypto
+ .encrypt(
+ {
+ name: "AES-GCM",
+ iv: generateNonce(nonce, 0),
+ },
+ key,
+ new Uint8Array([0])
+ )
+ .then(value => [value]);
+ }
+ // 4096 is the default size, though we burn 1 for padding
+ return Promise.all(
+ chunkArray(data, 4095).map((slice, index) => {
+ var padded = bsConcat([new Uint8Array([0]), slice]);
+ return webCrypto.encrypt(
+ {
+ name: "AES-GCM",
+ iv: generateNonce(nonce, index),
+ },
+ key,
+ padded
+ );
+ })
+ );
+ })
+ .then(bsConcat);
+ }
+
+ function webPushEncrypt(subscription, data) {
+ data = ensureView(data);
+
+ var salt = g.crypto.getRandomValues(new Uint8Array(16));
+ return webCrypto
+ .generateKey(P256DH, false, ["deriveBits"])
+ .then(localKey => {
+ return Promise.all([
+ encrypt(
+ localKey.privateKey,
+ subscription.getKey("p256dh"),
+ salt,
+ data
+ ),
+ // 1337 p-256 specific haxx to get the raw value out of the spki value
+ webCrypto.exportKey("raw", localKey.publicKey),
+ ]);
+ })
+ .then(([payload, pubkey]) => {
+ return {
+ data: base64url.encode(payload),
+ encryption: "keyid=p256dh;salt=" + base64url.encode(salt),
+ encryption_key: "keyid=p256dh;dh=" + base64url.encode(pubkey),
+ encoding: "aesgcm128",
+ };
+ });
+ }
+
+ g.webPushEncrypt = webPushEncrypt;
+})(this);