Compare commits
354 Commits
v9.2.0.97
...
feature/ex
| Author | SHA1 | Date | |
|---|---|---|---|
| 6f8ec5dee5 | |||
| 79f14203dd | |||
| e4800b8c54 | |||
| b8fda7871c | |||
| 9a2ad514db | |||
| ce3fdfdf8a | |||
| 672c629fdf | |||
| 68447041f3 | |||
| 43b0ecfa19 | |||
| ff6a201f78 | |||
| e10c0b73ca | |||
| 4a51b18279 | |||
| ee56819e63 | |||
| d6490a1671 | |||
| 2138e38d00 | |||
| 9f6e3be634 | |||
| 71f648c694 | |||
| 3f2ad2dfd7 | |||
| 4e28069ec9 | |||
| 615a73e7eb | |||
| 01786f307c | |||
| d1d94f481d | |||
| 82eb921f05 | |||
| 84847f1e74 | |||
| 8391667147 | |||
| 39da47bc21 | |||
| 3a201b8b28 | |||
| bbfbe4a149 | |||
| 0c1c57ccb3 | |||
| 7a3464b985 | |||
| 49924e23ac | |||
| 1eaac39e48 | |||
| 7624e24027 | |||
| 44ffa4b72e | |||
| 10bdf2703a | |||
| c488384dbc | |||
| b1b3e1fb7c | |||
| d78487e0f5 | |||
| 5069b68247 | |||
| 31433e20de | |||
| 86d0d2113e | |||
| 8f2b4e4153 | |||
| 0be867c47d | |||
| 78aae7e9d0 | |||
| 10e63543dc | |||
| 900cf01902 | |||
| f6a52876ce | |||
| 45ad566eb1 | |||
| 5bbea51848 | |||
| 28a1828000 | |||
| 816430e0e2 | |||
| 29a29cc818 | |||
| bf66c1d9c0 | |||
| 2a3982a884 | |||
| b5fb8a34dc | |||
| 11f0c937f4 | |||
| 5e435d322f | |||
| 842d17f79e | |||
| d48a28fe1d | |||
| 2a22c5e1f3 | |||
| 629a35213e | |||
| a056b2e4a9 | |||
| 2dd35a7d81 | |||
| 080d89c8a0 | |||
| 1809f7f4c2 | |||
| 4bfd4f0a08 | |||
| 3ef5651dfd | |||
| 8231809ef0 | |||
| 7f3d073d63 | |||
| 5f09e91944 | |||
| f4359e0b7f | |||
| ca9cf4ee61 | |||
| f52538f66a | |||
| 15359be125 | |||
| fc2a12c6f2 | |||
| 42030372fe | |||
| bbf6c2d8e9 | |||
| cb15cc18eb | |||
| 389bf976a9 | |||
| 4d1b516cc9 | |||
| 600a59c966 | |||
| 66b2f3c828 | |||
| 64e077da19 | |||
| 499fe52b8c | |||
| 6f9c376040 | |||
| 1e18352e77 | |||
| c3f4f32702 | |||
| 6df7a7e01e | |||
| 6167f23a08 | |||
| 7c544729bc | |||
| d60c102dbb | |||
| d709598563 | |||
| 7afad1fe49 | |||
| aa53d6302f | |||
| 7f665b96a5 | |||
| 8926c15908 | |||
| 033c45b7a0 | |||
| 16d75fe498 | |||
| fe2e1568fa | |||
| 7e057bab6e | |||
| 4bf8308bff | |||
| 6af3f2fe35 | |||
| b61d8df484 | |||
| fc3748e516 | |||
| 468dcd7ba4 | |||
| 238cdc8084 | |||
| 580283ef45 | |||
| fd648a7dd3 | |||
| 4d4f3be717 | |||
| 6e481f6a34 | |||
| 2059e4bb95 | |||
| 6a5186c411 | |||
| b5ea9d68e2 | |||
| d9be0df8fb | |||
| 3cee4b0212 | |||
| cfb62d599d | |||
| 919d117a1f | |||
| d4b289d0ca | |||
| 270e8e41dd | |||
| 751b82dc51 | |||
| 320e30c857 | |||
| a6898c8235 | |||
| 463ca05404 | |||
| 548cee436a | |||
| b1a36d546b | |||
| 07d3f371a2 | |||
| 278cac8a61 | |||
| 07fd1e87d7 | |||
| 817ee4dde0 | |||
| d93bd27896 | |||
| be56209baf | |||
| 6a573d0da7 | |||
| e936e330d9 | |||
| bda95fc03d | |||
| c0c0289ffb | |||
| 5c110799a6 | |||
| 1b6c81407b | |||
| 1e0d662838 | |||
| ae2680c419 | |||
| 1b61353b2e | |||
| 7777048790 | |||
| fd6c0907bd | |||
| 2aef5daf12 | |||
| 317e21af6a | |||
| 4f6daaae67 | |||
| 8203492999 | |||
| 910f453ce8 | |||
| 54fb5a7891 | |||
| 93b96e5555 | |||
| 9e57f8c3b1 | |||
| 57221c0e32 | |||
| 76b7099a37 | |||
| 85f428fda6 | |||
| d97a62442f | |||
| 41fb12d58b | |||
| ed0811d8ab | |||
| 84cc97f035 | |||
| 984807d611 | |||
| 2796fbed8b | |||
| 9ccbb25acd | |||
| 954d86ed0f | |||
| 47e0a0c9e7 | |||
| 2d7c5ec2df | |||
| 38079e8692 | |||
| ac75675367 | |||
| a0fc634f5f | |||
| 8d19851865 | |||
| 2ebade4413 | |||
| 5e9f99e960 | |||
| d98d3a211f | |||
| a67935908a | |||
| da1bc5d2d6 | |||
| 9d5388a7bf | |||
| 2cdb04656d | |||
| 3934c28eb8 | |||
| f6337bb12c | |||
| 1d88830b38 | |||
| 9737038776 | |||
| 915c3497e4 | |||
| 53c4f320f6 | |||
| 1aec69965d | |||
| afdac778b0 | |||
| fbc42a514f | |||
| c567c9739c | |||
| 686b719bff | |||
| f05fa7c0ee | |||
| 0d646a32c4 | |||
| 917c33e76d | |||
| 1937895a56 | |||
| 01fbf07c9e | |||
| d208215814 | |||
| c45c63f914 | |||
| 5c5a18de0d | |||
| 9f24bda011 | |||
| fdb9eaa2a5 | |||
| 3e9b0ffbda | |||
| eb2ba042ef | |||
| 1111f421d9 | |||
| e2bda52737 | |||
| 6c9c2cf538 | |||
| 62d826d8c6 | |||
| dfbdb869d7 | |||
| ed7a50855e | |||
| 9f5b821c83 | |||
| 526a21da57 | |||
| fb6bda209b | |||
| 4b0f79a1ab | |||
| dbf46c8692 | |||
| d3e27eda98 | |||
| e5953066a1 | |||
| e5946892c9 | |||
| d399027127 | |||
| 2e732ce62f | |||
| c98942b871 | |||
| 44e6774c5a | |||
| 7ddb363d60 | |||
| ecd333e238 | |||
| b377493ecb | |||
| afeeeab564 | |||
| e5caeed16c | |||
| 460abc0d55 | |||
| 790c92c30b | |||
| 01b2aaedb2 | |||
| 580c896b72 | |||
| 879007c270 | |||
| 03a1d9fa4c | |||
| 61d199a0c1 | |||
| 24de9afbfb | |||
| 4ea31dcb00 | |||
| 54a0c7f231 | |||
| a4d60a1ae1 | |||
| b7b3e0dd65 | |||
| c28a6bf1ea | |||
| 9f24254cc7 | |||
| 8c4f2468a3 | |||
| e105eca426 | |||
| 02a923afb4 | |||
| c7a0996a6c | |||
| 49ca47d777 | |||
| 54a4c2b6fd | |||
| 5f95ca7bfc | |||
| e66ecb52ad | |||
| 45e7b323ad | |||
| 6d27231e15 | |||
| a2a5ef8fcd | |||
| 1c877ebe59 | |||
| f03248ca86 | |||
| a4005412a7 | |||
| e50016259a | |||
| d5a6c935e5 | |||
| aa3d4cb3ce | |||
| 73fa9b6aac | |||
| c9a0d6e4e5 | |||
| b58ac033cf | |||
| 130de28e4b | |||
| cd53c06be3 | |||
| 122a54f510 | |||
| b425405744 | |||
| 28ffd27fca | |||
| 9bc9d86dd6 | |||
| a1891b597f | |||
| bf9ce4f535 | |||
| 508d8f25db | |||
| efbfcaed37 | |||
| d1fc31ac28 | |||
| b8efe6c554 | |||
| 13410f8467 | |||
| 3a389147dd | |||
| ba203f734d | |||
| 758454747d | |||
| bf175e92a3 | |||
| 0c9b5821e7 | |||
| 98dae842ae | |||
| ff53c1b474 | |||
| 334f9602b4 | |||
| fed94358fe | |||
| 89b669e319 | |||
| db213d3ae4 | |||
| 79df81301f | |||
| 197bbf7027 | |||
| a466592bc2 | |||
| 4bce73d81d | |||
| ed13e54d26 | |||
| e371f7ccf1 | |||
| 14a0e4713c | |||
| 74b9a426c2 | |||
| 43c7e2c9a8 | |||
| 39b9c28607 | |||
| 6e57d7e4e7 | |||
| f831d9a22d | |||
| 7f54430813 | |||
| ea42899b9e | |||
| b420fd731f | |||
| dbbf4d04f9 | |||
| 62132c27bd | |||
| e4449d7aa9 | |||
| cb304293b7 | |||
| ffb62243a9 | |||
| 63a80580cc | |||
| fed142690b | |||
| 8d368ca91c | |||
| 2cc2434982 | |||
| f5989b979a | |||
| 62955d5f6e | |||
| 9fc3fcabcb | |||
| 6af0b89c1d | |||
| c34b9e00e5 | |||
| e715da8680 | |||
| 7a26c345c5 | |||
| 2a6e76a2bc | |||
| adfc79938d | |||
| c3ce1d2756 | |||
| cf5208d6a5 | |||
| 56e6a0a3b8 | |||
| 0a7ad2f560 | |||
| fede5921e1 | |||
| 897ea781b7 | |||
| f95014f46f | |||
| 92fae52a6d | |||
| afb0f44af2 | |||
| af20b1f63d | |||
| c779654a58 | |||
| d1c99891c6 | |||
| ffc94bf455 | |||
| 680c83853a | |||
| 33e698242c | |||
| e8ad643a0e | |||
| 609e3bc158 | |||
| 7e51dd143a | |||
| 31d65dea7c | |||
| 89172a9047 | |||
| 0103717241 | |||
| c012662402 | |||
| 00c3085a90 | |||
| f1fa861c8a | |||
| c37f96da2d | |||
| 89473c5ba0 | |||
| 07afc6e4c3 | |||
| 34c34018a0 | |||
| 05dd636a1c | |||
| e6158043b9 | |||
| cfd1dcc3ee | |||
| 7a2944ce58 | |||
| 8a11fa5aac | |||
| aa2127b55f | |||
| 86a2d66d83 | |||
| 3ceff2460c | |||
| c0c045f2f1 | |||
| 5953eb8f08 | |||
| 6a6cfd7b5b | |||
| 1efde9d7e2 | |||
| d6ed01e1df | |||
| 0fcf29eddc | |||
| 474a500819 |
@ -133,7 +133,7 @@ namespace NSOpenSSL
|
||||
}
|
||||
|
||||
// rsa
|
||||
bool RSA_GenerateKeys(unsigned char*& publicKey, unsigned char*& privateKey)
|
||||
bool RSA_GenerateKeys(unsigned char*& publicKey, unsigned char*& privateKey, const int keyLen)
|
||||
{
|
||||
publicKey = NULL;
|
||||
privateKey = NULL;
|
||||
@ -142,7 +142,8 @@ namespace NSOpenSSL
|
||||
BIGNUM *exponent = BN_new();
|
||||
|
||||
BN_set_word(exponent, RSA_F4);
|
||||
int result = RSA_generate_multi_prime_key(rsa, 2048, 2, exponent, NULL);
|
||||
int primes = (keyLen < 4096) ? 2 : 4;
|
||||
int result = RSA_generate_multi_prime_key(rsa, keyLen, primes, exponent, NULL);
|
||||
if (0 == result)
|
||||
return false;
|
||||
|
||||
@ -370,6 +371,27 @@ namespace NSOpenSSL
|
||||
// new algs
|
||||
bool GenerateKeysByAlgs(const std::string& alg, std::string& publicKey, std::string& privateKey)
|
||||
{
|
||||
int nRsaKeyLen = 0;
|
||||
if ("rsa2048" == alg)
|
||||
nRsaKeyLen = 2048;
|
||||
else if ("rsa4096" == alg)
|
||||
nRsaKeyLen = 4096;
|
||||
|
||||
if (nRsaKeyLen > 0)
|
||||
{
|
||||
unsigned char* publicKeyPtr = NULL;
|
||||
unsigned char* privateKeyPtr = NULL;
|
||||
if (!RSA_GenerateKeys(publicKeyPtr, privateKeyPtr))
|
||||
return false;
|
||||
|
||||
publicKey = std::string((char*)publicKeyPtr);
|
||||
privateKey = std::string((char*)privateKeyPtr);
|
||||
|
||||
openssl_free(publicKeyPtr);
|
||||
openssl_free(privateKeyPtr);
|
||||
return true;
|
||||
}
|
||||
|
||||
EVP_PKEY* pkey = NULL;
|
||||
EVP_PKEY_CTX* pctx = NULL;
|
||||
|
||||
@ -453,7 +475,7 @@ namespace NSOpenSSL
|
||||
return (1 == nResult) ? true : false;
|
||||
}
|
||||
|
||||
CMemoryData Enrypt(const unsigned char* data, const int& data_len, const std::string& publicKey)
|
||||
CMemoryData Encrypt(const unsigned char* data, const int& data_len, const std::string& publicKey, const bool& isLenToBuffer)
|
||||
{
|
||||
CMemoryData returnData;
|
||||
|
||||
@ -477,8 +499,19 @@ namespace NSOpenSSL
|
||||
|
||||
size_t ciphertextLen = 0;
|
||||
EVP_PKEY_encrypt(ctx, NULL, &ciphertextLen, data, (size_t)data_len);
|
||||
returnData.Alloc(ciphertextLen);
|
||||
EVP_PKEY_encrypt(ctx, returnData.Data, &returnData.Size, data, (size_t)data_len);
|
||||
|
||||
if (isLenToBuffer)
|
||||
{
|
||||
returnData.Alloc(ciphertextLen + 4);
|
||||
EVP_PKEY_encrypt(ctx, returnData.Data + 4, &returnData.Size, data, (size_t)data_len);
|
||||
int nLen = (int)returnData.Size;
|
||||
memcpy(returnData.Data, &nLen, 4);
|
||||
}
|
||||
else
|
||||
{
|
||||
returnData.Alloc(ciphertextLen);
|
||||
EVP_PKEY_encrypt(ctx, returnData.Data, &returnData.Size, data, (size_t)data_len);
|
||||
}
|
||||
|
||||
EVP_PKEY_free(pkey);
|
||||
EVP_PKEY_CTX_free(ctx);
|
||||
@ -486,7 +519,7 @@ namespace NSOpenSSL
|
||||
return returnData;
|
||||
}
|
||||
|
||||
CMemoryData Decrypt(const unsigned char* data, const int& data_len, const std::string& privateKey)
|
||||
CMemoryData Decrypt(const unsigned char* data, const int& data_len, const std::string& privateKey, const bool& isLenToBuffer)
|
||||
{
|
||||
CMemoryData returnData;
|
||||
|
||||
@ -510,8 +543,19 @@ namespace NSOpenSSL
|
||||
|
||||
size_t ciphertextLen = 0;
|
||||
EVP_PKEY_decrypt(ctx, NULL, &ciphertextLen, data, (size_t)data_len);
|
||||
returnData.Alloc(ciphertextLen);
|
||||
EVP_PKEY_decrypt(ctx, returnData.Data, &returnData.Size, data, (size_t)data_len);
|
||||
|
||||
if (isLenToBuffer)
|
||||
{
|
||||
returnData.Alloc(ciphertextLen + 4);
|
||||
EVP_PKEY_decrypt(ctx, returnData.Data + 4, &returnData.Size, data, (size_t)data_len);
|
||||
int nLen = (int)returnData.Size;
|
||||
memcpy(returnData.Data, &nLen, 4);
|
||||
}
|
||||
else
|
||||
{
|
||||
returnData.Alloc(ciphertextLen);
|
||||
EVP_PKEY_decrypt(ctx, returnData.Data, &returnData.Size, data, (size_t)data_len);
|
||||
}
|
||||
|
||||
EVP_PKEY_free(pkey);
|
||||
EVP_PKEY_CTX_free(ctx);
|
||||
|
||||
@ -75,7 +75,7 @@ namespace NSOpenSSL
|
||||
OPENSSL_DECL unsigned char* GetHash(const unsigned char* data, const unsigned int& size, const int& alg, unsigned int& len);
|
||||
|
||||
// rsa
|
||||
OPENSSL_DECL bool RSA_GenerateKeys(unsigned char*& publicKey, unsigned char*& privateKey);
|
||||
OPENSSL_DECL bool RSA_GenerateKeys(unsigned char*& publicKey, unsigned char*& privateKey, const int keyLen = 2048);
|
||||
OPENSSL_DECL bool RSA_EncryptPublic(const unsigned char* publicKey, const unsigned char* data, const unsigned int& size, unsigned char*& data_crypt, unsigned int& data_crypt_len);
|
||||
OPENSSL_DECL bool RSA_DecryptPrivate(const unsigned char* privateKey, const unsigned char* data, const unsigned int& size, unsigned char*& data_decrypt, unsigned int& data_decrypt_len);
|
||||
|
||||
@ -91,8 +91,8 @@ namespace NSOpenSSL
|
||||
OPENSSL_DECL CMemoryData Sign(const unsigned char* data, const int& len, const std::string& privateKey);
|
||||
OPENSSL_DECL bool Verify(const unsigned char* data, const int& data_len, const std::string& publicKey,
|
||||
const unsigned char* signature, const int& signature_len);
|
||||
OPENSSL_DECL CMemoryData Enrypt(const unsigned char* data, const int& data_len, const std::string& publicKey);
|
||||
OPENSSL_DECL CMemoryData Decrypt(const unsigned char* data, const int& data_len, const std::string& privateKey);
|
||||
OPENSSL_DECL CMemoryData Encrypt(const unsigned char* data, const int& data_len, const std::string& publicKey, const bool& isLenToBuffer = false);
|
||||
OPENSSL_DECL CMemoryData Decrypt(const unsigned char* data, const int& data_len, const std::string& privateKey, const bool& isLenToBuffer = false);
|
||||
|
||||
// aes
|
||||
OPENSSL_DECL int AES_GetKeySize(int type);
|
||||
|
||||
@ -1,5 +0,0 @@
|
||||
<<<<<<<
|
||||
if((c >= 'a' && c <= 'z') || (c>= 'A' && c<= 'Z') || (c >= '0' && c<= '9')){
|
||||
=======
|
||||
if((c >= 'a' && c <= 'z') || (c>= 'A' && c<= 'Z') || (c >= '0' && c<= '9') || ('-' == c) || ('_' == c) || ('.' == c) || ('~' == c)){
|
||||
>>>>>>>
|
||||
@ -74,6 +74,7 @@ public:
|
||||
bool isDocFormatFile(const std::wstring& fileName);
|
||||
bool isXlsFormatFile(const std::wstring& fileName);
|
||||
|
||||
bool isCompoundFile (POLE::Storage* storage);
|
||||
bool isOleObjectFile(POLE::Storage* storage);
|
||||
bool isDocFormatFile(POLE::Storage* storage);
|
||||
bool isXlsFormatFile(POLE::Storage* storage);
|
||||
|
||||
@ -552,6 +552,15 @@ bool COfficeFileFormatChecker::isPptFormatFile(POLE::Storage *storage)
|
||||
return true;
|
||||
}
|
||||
|
||||
bool COfficeFileFormatChecker::isCompoundFile(POLE::Storage* storage)
|
||||
{
|
||||
if (storage == NULL) return false;
|
||||
|
||||
if (storage->GetAllStreams(L"/").size() == 1) return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
std::wstring COfficeFileFormatChecker::getDocumentID(const std::wstring &_fileName)
|
||||
{
|
||||
#if defined(_WIN32) || defined(_WIN32_WCE) || defined(_WIN64)
|
||||
@ -749,6 +758,11 @@ bool COfficeFileFormatChecker::isOfficeFile(const std::wstring &_fileName)
|
||||
nFileType = AVS_OFFICESTUDIO_FILE_OTHER_MS_VBAPROJECT;
|
||||
return true;
|
||||
}
|
||||
else if (isCompoundFile(&storage))
|
||||
{
|
||||
nFileType = AVS_OFFICESTUDIO_FILE_OTHER_COMPOUND;
|
||||
return true;
|
||||
}
|
||||
else if (isHwpFile(&storage))
|
||||
{
|
||||
nFileType = AVS_OFFICESTUDIO_FILE_DOCUMENT_HWP;
|
||||
|
||||
@ -136,6 +136,7 @@
|
||||
#define AVS_OFFICESTUDIO_FILE_OTHER_MS_MITCRYPTO AVS_OFFICESTUDIO_FILE_OTHER + 0x000b
|
||||
#define AVS_OFFICESTUDIO_FILE_OTHER_MS_VBAPROJECT AVS_OFFICESTUDIO_FILE_OTHER + 0x000c
|
||||
#define AVS_OFFICESTUDIO_FILE_OTHER_PACKAGE_IN_OLE AVS_OFFICESTUDIO_FILE_OTHER + 0x000d
|
||||
#define AVS_OFFICESTUDIO_FILE_OTHER_COMPOUND AVS_OFFICESTUDIO_FILE_OTHER + 0x000e
|
||||
|
||||
#define AVS_OFFICESTUDIO_FILE_TEAMLAB 0x1000
|
||||
#define AVS_OFFICESTUDIO_FILE_TEAMLAB_DOCY AVS_OFFICESTUDIO_FILE_TEAMLAB + 0x0001
|
||||
|
||||
@ -33,8 +33,7 @@ OO_BUILD_BRANDING = $$(OO_BRANDING)
|
||||
OO_DESTDIR_BUILD_OVERRIDE = $$(DESTDIR_BUILD_OVERRIDE)
|
||||
|
||||
win32 {
|
||||
CURRENT_YEAR = $$system(wmic PATH Win32_LocalTime GET ^Year /FORMAT:VALUE | find \"=\")
|
||||
CURRENT_YEAR = $$replace(CURRENT_YEAR, "Year=", "")
|
||||
CURRENT_YEAR = $$system(powershell -NoLogo -NoProfile -Command "(Get-Date).Year")
|
||||
CURRENT_YEAR = $$replace(CURRENT_YEAR, "\r", "")
|
||||
CURRENT_YEAR = $$replace(CURRENT_YEAR, "\n", "")
|
||||
CURRENT_YEAR = $$replace(CURRENT_YEAR, "\t", "")
|
||||
|
||||
@ -10,6 +10,8 @@ import common
|
||||
|
||||
base.configure_common_apps()
|
||||
|
||||
python_binary = sys.executable
|
||||
|
||||
# fetch emsdk
|
||||
command_prefix = "" if ("windows" == base.host_platform()) else "./"
|
||||
if not base.is_dir("emsdk"):
|
||||
@ -141,9 +143,9 @@ for param in argv:
|
||||
if json_data["run_before"]:
|
||||
base.print_info("before")
|
||||
if base.is_file(work_dir + json_data["run_before"]):
|
||||
base.cmd_in_dir(work_dir, "python", [json_data["run_before"]])
|
||||
base.cmd_in_dir(work_dir, python_binary, [json_data["run_before"]])
|
||||
else:
|
||||
base.cmd_in_dir(work_dir, "python", ["-c", json_data["run_before"]])
|
||||
base.cmd_in_dir(work_dir, python_binary, ["-c", json_data["run_before"]])
|
||||
|
||||
# remove previous version
|
||||
common.clear_dir(work_dir + "/o")
|
||||
@ -169,6 +171,6 @@ for param in argv:
|
||||
if json_data["run_after"]:
|
||||
base.print_info("after")
|
||||
if base.is_file(work_dir + json_data["run_after"]):
|
||||
base.cmd_in_dir(work_dir, "python", [json_data["run_after"]])
|
||||
base.cmd_in_dir(work_dir, python_binary, [json_data["run_after"]])
|
||||
else:
|
||||
base.cmd_in_dir(work_dir, "python", ["-c", json_data["run_after"]])
|
||||
base.cmd_in_dir(work_dir, python_binary, ["-c", json_data["run_after"]])
|
||||
|
||||
@ -245,7 +245,18 @@ public:
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
bool CheckOwnerPassword(const std::wstring& sPassword)
|
||||
{
|
||||
if (m_nType == 0)
|
||||
return ((CPdfFile*)m_pFile)->CheckOwnerPassword(sPassword);
|
||||
return true;
|
||||
}
|
||||
bool CheckPerm(int nPerm)
|
||||
{
|
||||
if (m_nType == 0)
|
||||
return ((CPdfFile*)m_pFile)->CheckPerm(nPerm);
|
||||
return true;
|
||||
}
|
||||
BYTE* GetInfo()
|
||||
{
|
||||
NSWasm::CData oRes;
|
||||
|
||||
@ -30,6 +30,8 @@
|
||||
-(JSValue*) SplitPages : (JSValue*)arrPageIndexes : (JSValue*)data;
|
||||
-(JSValue*) MergePages : (JSValue*)data : (JSValue*)nMaxID : (JSValue*)sPrefixForm;
|
||||
-(JSValue*) UnmergePages;
|
||||
-(JSValue*) RedactPage : (JSValue*)nPageIndex : (JSValue*)arrRedactBox : (JSValue*)dataFiller;
|
||||
-(JSValue*) UndoRedact;
|
||||
@end
|
||||
|
||||
@interface CJSCDrawingFileEmbed : NSObject<IJSCDrawingFileEmbed, JSEmbedObjectProtocol>
|
||||
@ -67,6 +69,8 @@ FUNCTION_WRAPPER_JS_1(FreeWasmData, FreeWasmData)
|
||||
FUNCTION_WRAPPER_JS_2(SplitPages, SplitPages)
|
||||
FUNCTION_WRAPPER_JS_3(MergePages, MergePages)
|
||||
FUNCTION_WRAPPER_JS_0(UnmergePages, UnmergePages)
|
||||
FUNCTION_WRAPPER_JS_3(RedactPage, RedactPage)
|
||||
FUNCTION_WRAPPER_JS_0(UndoRedact, UndoRedact)
|
||||
@end
|
||||
|
||||
class CDrawingFileEmbedAdapter : public CJSEmbedObjectAdapterJSC
|
||||
|
||||
@ -67,7 +67,7 @@ namespace NSDrawingFileEmbed
|
||||
NSV8Objects::Template_Set(result, "SplitPages", _SplitPages);
|
||||
NSV8Objects::Template_Set(result, "MergePages", _MergePages);
|
||||
NSV8Objects::Template_Set(result, "UnmergePages", _UnmergePages);
|
||||
NSV8Objects::Template_Set(result, "RedactPage", _RedactPage);
|
||||
NSV8Objects::Template_Set(result, "RedactPage", _RedactPage);
|
||||
NSV8Objects::Template_Set(result, "UndoRedact", _UndoRedact);
|
||||
|
||||
return handle_scope.Escape(result);
|
||||
|
||||
@ -886,17 +886,17 @@ namespace Aggplus
|
||||
if (isCurve)
|
||||
{
|
||||
std::vector<PointD> points = GetPoints(idx, 4);
|
||||
area = (points[3].Y - points[0].Y) * (points[1].X + points[2].X)
|
||||
- (points[3].X - points[0].X) * (points[1].Y + points[2].Y)
|
||||
+ points[1].Y * (points[0].X - points[2].X)
|
||||
- points[1].X * (points[0].Y - points[2].Y)
|
||||
+ points[3].Y * (points[2].X + points[0].X / 3.0)
|
||||
- points[3].X * (points[2].Y + points[0].Y / 3.0);
|
||||
area = 3.0 * (points[3].Y - points[0].Y) * (points[1].X + points[2].X)
|
||||
- (points[3].X - points[0].X) * (points[1].Y + points[2].Y)
|
||||
+ points[1].Y * (points[0].X - points[2].X)
|
||||
- points[1].X * (points[0].Y - points[2].Y)
|
||||
+ points[3].Y * (points[2].X + points[0].X / 3.0)
|
||||
- points[3].X * (points[2].Y + points[0].Y / 3.0) / 20.0;
|
||||
}
|
||||
else
|
||||
{
|
||||
std::vector<PointD> points = GetPoints(idx, 2);
|
||||
area = 4.0 * (points[1].Y * points[0].X - points[1].X * points[0].Y) / 3.0;
|
||||
area = (points[1].Y * points[0].X - points[1].X * points[0].Y) / 2.0;
|
||||
}
|
||||
|
||||
return area;
|
||||
|
||||
@ -179,7 +179,6 @@ CHeadings::CHeading::CHeading()
|
||||
nPage = 0;
|
||||
dX = 0.0;
|
||||
dY = 0.0;
|
||||
pParent = NULL;
|
||||
}
|
||||
CHeadings::CHeading::~CHeading()
|
||||
{
|
||||
@ -196,35 +195,26 @@ CHeadings::~CHeadings()
|
||||
const std::vector<CHeadings::CHeading*>& CHeadings::GetHeading() { return m_arrHeading; }
|
||||
bool CHeadings::Read(NSOnlineOfficeBinToPdf::CBufferReader* pReader, IMetafileToRenderter* pCorrector)
|
||||
{
|
||||
int nPredLevel = 0, nHeaderLevel = 0;
|
||||
std::vector<CHeading*>* arrHeading = &m_arrHeading;
|
||||
CHeading* pParent = NULL;
|
||||
std::vector<CHeading*> arrParentStack;
|
||||
int nHeadings = pReader->ReadInt();
|
||||
for (int i = 0; i < nHeadings; ++i)
|
||||
{
|
||||
int nLevel = pReader->ReadInt();
|
||||
if (nLevel > nPredLevel && i > 0)
|
||||
{
|
||||
nHeaderLevel = nPredLevel;
|
||||
pParent = arrHeading->back();
|
||||
arrHeading = &pParent->arrHeading;
|
||||
}
|
||||
else if (nLevel < nPredLevel && nLevel <= nHeaderLevel)
|
||||
{
|
||||
nHeaderLevel = nLevel;
|
||||
pParent = pParent ? pParent->pParent : NULL;
|
||||
arrHeading = pParent ? &pParent->arrHeading : &m_arrHeading;
|
||||
}
|
||||
nPredLevel = nLevel;
|
||||
|
||||
CHeading* pHeading = new CHeading();
|
||||
pHeading->nPage = pReader->ReadInt();
|
||||
pHeading->dX = pReader->ReadDouble();
|
||||
pHeading->dY = pReader->ReadDouble();
|
||||
pHeading->wsTitle = pReader->ReadString();
|
||||
pHeading->pParent = pParent;
|
||||
|
||||
arrHeading->push_back(pHeading);
|
||||
while (arrParentStack.size() > nLevel)
|
||||
arrParentStack.pop_back();
|
||||
|
||||
if (arrParentStack.empty())
|
||||
m_arrHeading.push_back(pHeading);
|
||||
else
|
||||
arrParentStack.back()->arrHeading.push_back(pHeading);
|
||||
|
||||
arrParentStack.push_back(pHeading);
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
@ -181,7 +181,6 @@ public:
|
||||
int nPage;
|
||||
double dX;
|
||||
double dY;
|
||||
CHeading* pParent;
|
||||
std::vector<CHeading*> arrHeading;
|
||||
|
||||
CHeading();
|
||||
|
||||
@ -56,6 +56,8 @@
|
||||
"_UnmergePages",
|
||||
"_RedactPage",
|
||||
"_UndoRedact",
|
||||
"_CheckOwnerPassword",
|
||||
"_CheckPerm",
|
||||
"_GetImageBase64",
|
||||
"_GetImageBase64Len",
|
||||
"_GetImageBase64Ptr",
|
||||
|
||||
@ -145,6 +145,14 @@ CFile.prototype["isNeedPassword"] = function()
|
||||
{
|
||||
return this._isNeedPassword;
|
||||
};
|
||||
CFile.prototype["CheckOwnerPassword"] = function(password)
|
||||
{
|
||||
return this._CheckOwnerPassword(password);
|
||||
};
|
||||
CFile.prototype["CheckPerm"] = function(perm)
|
||||
{
|
||||
return this._CheckPerm(perm);
|
||||
};
|
||||
CFile.prototype["SplitPages"] = function(arrOriginIndex, arrayBufferChanges)
|
||||
{
|
||||
let ptr = this._SplitPages(arrOriginIndex, arrayBufferChanges);
|
||||
|
||||
@ -146,6 +146,16 @@ CFile.prototype._UndoRedact = function()
|
||||
return g_native_drawing_file["UndoRedact"]();
|
||||
};
|
||||
|
||||
CFile.prototype._CheckOwnerPassword = function(password)
|
||||
{
|
||||
return true;
|
||||
}
|
||||
|
||||
CFile.prototype._CheckPerm = function(perm)
|
||||
{
|
||||
return true;
|
||||
}
|
||||
|
||||
// FONTS
|
||||
CFile.prototype._isNeedCMap = function()
|
||||
{
|
||||
|
||||
@ -224,6 +224,29 @@ CFile.prototype._UndoRedact = function()
|
||||
return Module["_UndoRedact"](this.nativeFile) == 1;
|
||||
};
|
||||
|
||||
CFile.prototype._CheckOwnerPassword = function(password)
|
||||
{
|
||||
let passwordPtr = 0;
|
||||
if (password)
|
||||
{
|
||||
let passwordBuf = password.toUtf8();
|
||||
passwordPtr = Module["_malloc"](passwordBuf.length);
|
||||
Module["HEAP8"].set(passwordBuf, passwordPtr);
|
||||
}
|
||||
|
||||
let bRes = Module["_CheckOwnerPassword"](this.nativeFile, passwordPtr);
|
||||
|
||||
if (passwordPtr)
|
||||
Module["_free"](passwordPtr);
|
||||
|
||||
return bRes == 1;
|
||||
}
|
||||
|
||||
CFile.prototype._CheckPerm = function(perm)
|
||||
{
|
||||
return Module["_CheckPerm"](this.nativeFile, perm) == 1;
|
||||
}
|
||||
|
||||
// FONTS
|
||||
CFile.prototype._isNeedCMap = function()
|
||||
{
|
||||
|
||||
@ -191,6 +191,17 @@ WASM_EXPORT int UndoRedact(CDrawingFile* pFile)
|
||||
{
|
||||
return pFile->UndoRedact() ? 1 : 0;
|
||||
}
|
||||
WASM_EXPORT int CheckOwnerPassword(CDrawingFile* pFile, const char* password)
|
||||
{
|
||||
std::wstring sPassword = L"";
|
||||
if (NULL != password)
|
||||
sPassword = NSFile::CUtf8Converter::GetUnicodeStringFromUTF8((BYTE*)password, strlen(password));
|
||||
return pFile->CheckOwnerPassword(sPassword) ? 1 : 0;
|
||||
}
|
||||
WASM_EXPORT int CheckPerm(CDrawingFile* pFile, int nPermFlag)
|
||||
{
|
||||
return pFile->CheckPerm(nPermFlag) ? 1 : 0;
|
||||
}
|
||||
|
||||
WASM_EXPORT void* GetImageBase64(CDrawingFile* pFile, int rId)
|
||||
{
|
||||
|
||||
@ -1125,6 +1125,18 @@ int main(int argc, char* argv[])
|
||||
}
|
||||
}
|
||||
|
||||
// OWNER PASSWORD
|
||||
if (false)
|
||||
{
|
||||
std::string sPassword = "gfhjkmgfhjkm";
|
||||
std::cout << "CheckPerm 4 Edit " << CheckPerm(pGrFile, 4) << std::endl;
|
||||
std::cout << "CheckPerm 4 Print " << CheckPerm(pGrFile, 3) << std::endl;
|
||||
|
||||
std::cout << "CheckOwnerPassword " << CheckOwnerPassword(pGrFile, sPassword.c_str()) << std::endl;
|
||||
std::cout << "CheckPerm 4 Edit " << CheckPerm(pGrFile, 4) << std::endl;
|
||||
std::cout << "CheckPerm 4 Print " << CheckPerm(pGrFile, 3) << std::endl;
|
||||
}
|
||||
|
||||
BYTE* pColor = new BYTE[12] { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
|
||||
// REDACT
|
||||
if (false)
|
||||
@ -1164,7 +1176,7 @@ int main(int argc, char* argv[])
|
||||
free(pInfo);
|
||||
|
||||
// LINKS
|
||||
if (true && nPagesCount > 0)
|
||||
if (false && nPagesCount > 0)
|
||||
{
|
||||
BYTE* pLinks = GetLinks(pGrFile, nTestPage);
|
||||
nLength = READ_INT(pLinks);
|
||||
@ -1200,7 +1212,7 @@ int main(int argc, char* argv[])
|
||||
}
|
||||
|
||||
// STRUCTURE
|
||||
if (true)
|
||||
if (false)
|
||||
{
|
||||
BYTE* pStructure = GetStructure(pGrFile);
|
||||
nLength = READ_INT(pStructure);
|
||||
|
||||
@ -202,6 +202,19 @@ bool CImageFileFormatChecker::isWbcFile(BYTE* pBuffer,DWORD dwBytes)
|
||||
|
||||
return false;
|
||||
}
|
||||
//raster graphics file format developed by Google
|
||||
bool CImageFileFormatChecker::isWebPFile(BYTE* pBuffer, DWORD dwBytes)
|
||||
{
|
||||
if (eFileType)return false;
|
||||
|
||||
if ((20 <= dwBytes) && ('R' == pBuffer[0] && 'I' == pBuffer[1] && 'F' == pBuffer[2] && 'F' == pBuffer[3]
|
||||
//4–7 length + 12
|
||||
&& 'W' == pBuffer[8] && 'E' == pBuffer[9] && 'B' == pBuffer[10] && 'P' == pBuffer[11])
|
||||
&& 'V' == pBuffer[12] && 'P' == pBuffer[13] && '8' == pBuffer[14])
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
//webshot(wb ver 1) HEX 57 57 42 42 31 31 31 31
|
||||
//webshot (wb ver 2) HEX 00 00 02 00 02 10 c9 00 02 00 c8 06 4c 00 02 00
|
||||
bool CImageFileFormatChecker::isWbFile(BYTE* pBuffer,DWORD dwBytes)
|
||||
@ -509,6 +522,10 @@ bool CImageFileFormatChecker::isImageFile(const std::wstring& fileName)
|
||||
{
|
||||
eFileType = _CXIMAGE_FORMAT_WB;
|
||||
}
|
||||
else if (isWebPFile(buffer, sizeRead))
|
||||
{
|
||||
eFileType = _CXIMAGE_FORMAT_WEBP;
|
||||
}
|
||||
else if (isPsdFile(buffer,sizeRead))
|
||||
{
|
||||
eFileType = _CXIMAGE_FORMAT_PSD;
|
||||
|
||||
@ -64,6 +64,7 @@ enum __ENUM_CXIMAGE_FORMATS
|
||||
_CXIMAGE_FORMAT_SVG = 24,
|
||||
_CXIMAGE_FORMAT_PIC = 25,
|
||||
_CXIMAGE_FORMAT_HEIF = 26,
|
||||
_CXIMAGE_FORMAT_WEBP = 27
|
||||
};
|
||||
|
||||
class GRAPHICS_DECL CImageFileFormatChecker
|
||||
@ -96,6 +97,7 @@ public:
|
||||
bool isTiffFile(BYTE* pBuffer,DWORD dwBytes);
|
||||
bool isJpgFile(BYTE* pBuffer,DWORD dwBytes);
|
||||
bool isWbFile(BYTE* pBuffer,DWORD dwBytes);
|
||||
bool isWebPFile(BYTE* pBuffer, DWORD dwBytes);
|
||||
|
||||
bool isIcoFile(BYTE* pBuffer,DWORD dwBytes);
|
||||
bool isRasFile(BYTE* pBuffer,DWORD dwBytes);
|
||||
|
||||
@ -72,6 +72,11 @@ public:
|
||||
}
|
||||
|
||||
public:
|
||||
bool Sign(unsigned char* pData, unsigned int nSize, unsigned char*& pDataDst, unsigned int& nSizeDst)
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
std::string Sign(unsigned char* pData, unsigned int nSize)
|
||||
{
|
||||
NSOpenSSL::CMemoryData data = NSOpenSSL::Sign(pData, (int)nSize, m_pem_key);
|
||||
|
||||
13
DesktopEditor/xmlsec/src/wasm/extension/after.py
Normal file
@ -0,0 +1,13 @@
|
||||
import sys;
|
||||
sys.path.append("../../../../../../build_tools/scripts");
|
||||
import base;
|
||||
|
||||
base.replaceInFile("./deploy/engine.js", "__ATPOSTRUN__=[];", "__ATPOSTRUN__=[function(){window.cryptoJS.onLoad();}];");
|
||||
base.replaceInFile("./deploy/engine.js", "__ATPOSTRUN__ = [];", "__ATPOSTRUN__=[function(){window.cryptoJS.onLoad();}];");
|
||||
base.replaceInFile("./deploy/engine.js", "function getBinaryPromise()", "function getBinaryPromise2()");
|
||||
|
||||
base.replaceInFile("./deploy/engine_ie.js", "__ATPOSTRUN__=[];", "__ATPOSTRUN__=[function(){window.cryptoJS.onLoad();}];");
|
||||
base.replaceInFile("./deploy/engine_ie.js", "__ATPOSTRUN__ = [];", "__ATPOSTRUN__=[function(){window.cryptoJS.onLoad();}];");
|
||||
base.replaceInFile("./deploy/engine_ie.js", "function getBinaryPromise()", "function getBinaryPromise2()");
|
||||
|
||||
base.delete_file("./engine.wasm.js")
|
||||
7
DesktopEditor/xmlsec/src/wasm/extension/before.py
Normal file
@ -0,0 +1,7 @@
|
||||
import sys
|
||||
sys.path.append("../../../../../../build_tools/scripts")
|
||||
import base
|
||||
|
||||
base.cmd_in_dir("./../3rdParty", sys.executable, ["openssl.py"])
|
||||
|
||||
base.copy_file("./extension/engine.wasm.js", "./engine.wasm.js")
|
||||
224
DesktopEditor/xmlsec/src/wasm/extension/deploy/engine.js
Normal file
BIN
DesktopEditor/xmlsec/src/wasm/extension/deploy/engine.wasm
Executable file
238
DesktopEditor/xmlsec/src/wasm/extension/deploy/engine_ie.js
Normal file
56
DesktopEditor/xmlsec/src/wasm/extension/engine.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"name": "engine",
|
||||
"res_folder": "./deploy",
|
||||
"wasm": true,
|
||||
"asm": true,
|
||||
"embed_mem_file": true,
|
||||
"run_before": "before.py",
|
||||
"run_after": "after.py",
|
||||
"base_js_content": "./engine.wasm.js",
|
||||
|
||||
"compiler_flags": [
|
||||
"-O3",
|
||||
"-Wno-unused-command-line-argument",
|
||||
"-s ALLOW_MEMORY_GROWTH=1",
|
||||
"-s FILESYSTEM=0",
|
||||
"-s ENVIRONMENT='web'",
|
||||
"-s ASSERTIONS",
|
||||
"-s LLD_REPORT_UNDEFINED",
|
||||
"-s TOTAL_MEMORY=4MB"
|
||||
],
|
||||
"exported_functions": [
|
||||
"_malloc",
|
||||
"_free",
|
||||
"_Crypto_Malloc",
|
||||
"_Crypto_Free",
|
||||
"_Crypto_CreateKeys",
|
||||
"_Crypto_Sign",
|
||||
"_Crypto_ChangePassword",
|
||||
"_Crypto_Decrypt",
|
||||
"_Crypto_Encrypt"
|
||||
],
|
||||
"include_path": [
|
||||
"./../3rdParty/openssl/include", "./../3rdParty/openssl"
|
||||
],
|
||||
"define": [
|
||||
"__linux__", "_LINUX"
|
||||
],
|
||||
"compile_files_array": [
|
||||
{
|
||||
"name": "a",
|
||||
"folder": "../../../../common/",
|
||||
"files": ["Base64.cpp", "File.cpp"]
|
||||
},
|
||||
{
|
||||
"name": "b",
|
||||
"folder": "../../../../../Common/3dParty/openssl/common/",
|
||||
"files": ["common_openssl.cpp"]
|
||||
},
|
||||
{
|
||||
"name": "c",
|
||||
"folder": "./",
|
||||
"files": ["main.cpp"]
|
||||
}
|
||||
],
|
||||
"sources": ["./../3rdParty/openssl/libcrypto.a"]
|
||||
}
|
||||
48
DesktopEditor/xmlsec/src/wasm/extension/extension.pro
Normal file
@ -0,0 +1,48 @@
|
||||
QT -= core gui
|
||||
|
||||
TARGET = wasm
|
||||
TEMPLATE = app
|
||||
CONFIG += console
|
||||
CONFIG -= app_bundle
|
||||
|
||||
DEFINES += TEST_AS_EXECUTABLE
|
||||
|
||||
CORE_ROOT_DIR = $$PWD/../../../../..
|
||||
PWD_ROOT_DIR = $$PWD
|
||||
include($$CORE_ROOT_DIR/Common/base.pri)
|
||||
|
||||
DEFINES += KERNEL_NO_USE_DYNAMIC_LIBRARY
|
||||
DEFINES += COMMON_OPENSSL_BUILDING_INTERNAL
|
||||
|
||||
SOURCES += \
|
||||
$$CORE_ROOT_DIR/DesktopEditor/common/File.cpp \
|
||||
$$CORE_ROOT_DIR/DesktopEditor/common/Base64.cpp
|
||||
|
||||
HEADERS += \
|
||||
$$CORE_ROOT_DIR/DesktopEditor/xmlsec/src/include/Certificate.h \
|
||||
$$CORE_ROOT_DIR/DesktopEditor/xmlsec/src/include/CertificateCommon.h
|
||||
|
||||
SOURCES += \
|
||||
$$CORE_ROOT_DIR/DesktopEditor/xmlsec/src/src/CertificateCommon.cpp
|
||||
|
||||
DEFINES += SUPPORT_OFORM
|
||||
HEADERS += $$CORE_ROOT_DIR/DesktopEditor/xmlsec/src/src/Certificate_oform.h
|
||||
|
||||
# OPENSSL
|
||||
CONFIG += open_ssl_common
|
||||
include($$CORE_ROOT_DIR/Common/3dParty/openssl/openssl.pri)
|
||||
|
||||
core_windows {
|
||||
LIBS += -lcrypt32
|
||||
LIBS += -lcryptui
|
||||
LIBS += -lAdvapi32
|
||||
LIBS += -lws2_32
|
||||
LIBS += -lUser32
|
||||
}
|
||||
|
||||
core_linux {
|
||||
LIBS += -ldl
|
||||
}
|
||||
|
||||
# WASM EXPORT
|
||||
SOURCES += main.cpp
|
||||
587
DesktopEditor/xmlsec/src/wasm/extension/extension/background.js
Normal file
@ -0,0 +1,24 @@
|
||||
function KeyStorage()
|
||||
{
|
||||
|
||||
}
|
||||
|
||||
chrome.runtime.onMessage.addListener((message, sender, sendResponse) => {
|
||||
console.log("reseived in background:", message);
|
||||
|
||||
// Отображение всплывающего окна
|
||||
chrome.action.openPopup();
|
||||
|
||||
// Посылаем событие обратно на страницу
|
||||
if (sender.tab) {
|
||||
chrome.scripting.executeScript({
|
||||
target: { tabId: sender.tab.id },
|
||||
func: (msg) => {
|
||||
document.dispatchEvent(new CustomEvent("customEventFromExtension", { detail: msg }));
|
||||
},
|
||||
args: [message]
|
||||
});
|
||||
}
|
||||
|
||||
sendResponse({ status: "received" });
|
||||
});
|
||||
37
DesktopEditor/xmlsec/src/wasm/extension/extension/content.js
Normal file
@ -0,0 +1,37 @@
|
||||
function sendEventToPage(id, data) {
|
||||
document.dispatchEvent(new CustomEvent("olala", { detail: data }));
|
||||
}
|
||||
|
||||
var ENGINE_VERSION = 1;
|
||||
var ENGINE_MESSAGE_CHECK = "onlyoffice-engine-check";
|
||||
var ENGINE_MESSAGE_DATA = "onlyoffice-engine-data";
|
||||
|
||||
chrome.runtime.onMessage.addListener((message, sender, sendResponse) => {
|
||||
if (message.action === "popupMessage") {
|
||||
console.log("Сообщение из popup:", message.text);
|
||||
|
||||
if (window.pluginEngine && window.pluginEngine.onMessageFromPlugin)
|
||||
window.pluginEngine.onMessageFromPlugin(message);
|
||||
|
||||
sendResponse({ status: "Сообщение получено!" });
|
||||
|
||||
sendEventToPage({ message: "Привет от content.js" });
|
||||
}
|
||||
});
|
||||
|
||||
// event from page with info about engine (is exist, version...)
|
||||
document.addEventListener(ENGINE_MESSAGE_CHECK + "-page", (event) => {
|
||||
document.dispatchEvent(new CustomEvent(ENGINE_MESSAGE_CHECK + "-content", { detail: { version : ENGINE_VERSION } }));
|
||||
});
|
||||
|
||||
// event from page with action (proxy to background)
|
||||
document.addEventListener(ENGINE_MESSAGE_DATA + "-page", (event) => {
|
||||
chrome.runtime.sendMessage({
|
||||
id : ENGINE_MESSAGE_DATA + "-engine",
|
||||
data : event.detail
|
||||
});
|
||||
});
|
||||
|
||||
document.addEventListener(ENGINE_MESSAGE_DATA + "-engine", (event) => {
|
||||
document.dispatchEvent(new CustomEvent(ENGINE_MESSAGE_DATA + "-content", event.detail));
|
||||
});
|
||||
31
DesktopEditor/xmlsec/src/wasm/extension/extension/engine.js
Normal file
@ -0,0 +1,31 @@
|
||||
(function(window, undefined){
|
||||
|
||||
function Engine()
|
||||
{
|
||||
}
|
||||
|
||||
Engine.prototype.generateKeys = async function(alg, password, salt)
|
||||
{
|
||||
};
|
||||
|
||||
Engine.prototype.changePassword = async function(privateKey, passwordOld, passwordNew, salt)
|
||||
{
|
||||
};
|
||||
|
||||
Engine.prototype.sign = async function(privateKey, password, salt, xml)
|
||||
{
|
||||
};
|
||||
|
||||
// ENCRYPT
|
||||
Engine.prototype.decrypt = async function(privateKeyEnc, password, salt, data)
|
||||
{
|
||||
};
|
||||
|
||||
Engine.prototype.encrypt = async function(publicKey, data)
|
||||
{
|
||||
};
|
||||
|
||||
window.cryptoJS = new Engine();
|
||||
|
||||
})(window, undefined);
|
||||
|
||||
BIN
DesktopEditor/xmlsec/src/wasm/extension/extension/engine.wasm
Normal file
223
DesktopEditor/xmlsec/src/wasm/extension/extension/engine.wasm.js
Normal file
@ -0,0 +1,223 @@
|
||||
(function(window, undefined){
|
||||
WebAssembly.instantiateStreaming = undefined;
|
||||
|
||||
function MemoryData(ptr) {
|
||||
this.ptr = ptr;
|
||||
}
|
||||
MemoryData.prototype.isValid = function() {
|
||||
return (this.ptr === 0) ? false : true;
|
||||
};
|
||||
MemoryData.prototype.free = function() {
|
||||
if (0 != this.ptr)
|
||||
Module["_Crypto_Free"](this.ptr);
|
||||
};
|
||||
MemoryData.prototype.getData = function() {
|
||||
let lenArray = new Int32Array(Module["HEAP8"].buffer, this.ptr, 4);
|
||||
let len = lenArray[0];
|
||||
return new Uint8Array(Module["HEAP8"].buffer, this.ptr + 4, len);
|
||||
};
|
||||
|
||||
function StringPointer(pointer, len) {
|
||||
this.ptr = pointer;
|
||||
this.length = len;
|
||||
}
|
||||
StringPointer.prototype.free = function() {
|
||||
if (0 !== this.ptr)
|
||||
Module["_free"](this.ptr);
|
||||
};
|
||||
|
||||
String.prototype.toUtf8Pointer = function(isNoEndNull) {
|
||||
var tmp = this.toUtf8(isNoEndNull, true);
|
||||
var pointer = Module["_malloc"](tmp.length);
|
||||
if (0 == pointer)
|
||||
return null;
|
||||
|
||||
Module["HEAP8"].set(tmp, pointer);
|
||||
return new StringPointer(pointer,tmp.length);
|
||||
};
|
||||
|
||||
function typedArrayToMemory(data)
|
||||
{
|
||||
var pointer = Module["_malloc"](data.length);
|
||||
Module["HEAP8"].set(data, langBuffer);
|
||||
return pointer;
|
||||
}
|
||||
|
||||
function Engine()
|
||||
{
|
||||
this.isInit = false;
|
||||
this.waitResolvers = [];
|
||||
}
|
||||
|
||||
Engine.prototype.onLoad = function()
|
||||
{
|
||||
this.isInit = true;
|
||||
|
||||
for (let i = 0, len = this.waitResolvers.length; i < len; i++)
|
||||
this.waitResolvers[i]();
|
||||
|
||||
this.waitResolvers = [];
|
||||
};
|
||||
|
||||
Engine.prototype.init = async function()
|
||||
{
|
||||
if (this.isInit)
|
||||
return;
|
||||
|
||||
return new Promise(resolve => (function(){
|
||||
window.CryptoJS.waitResolvers.push(resolve);
|
||||
})());
|
||||
};
|
||||
|
||||
// SIGN
|
||||
Engine.prototype.generateKeys = async function(alg, password, salt)
|
||||
{
|
||||
await this.init();
|
||||
|
||||
if (!salt)
|
||||
salt = window.UtilsJS.toBase64(window.UtilsJS.random(32));
|
||||
|
||||
let algPtr = "ed25519".toUtf8Pointer();
|
||||
let passwordPtr = password.toUtf8Pointer();
|
||||
let saltPtr = salt.toUtf8Pointer();
|
||||
|
||||
let keys = Module["_Crypto_CreateKeys"](algPtr.ptr, passwordPtr.ptr, saltPtr.ptr);
|
||||
|
||||
algPtr.free();
|
||||
passwordPtr.free();
|
||||
saltPtr.free();
|
||||
|
||||
if (keys === 0)
|
||||
return null;
|
||||
|
||||
let heap = Module["HEAP8"];
|
||||
|
||||
let currentStart = keys;
|
||||
let currentEnd = currentStart;
|
||||
while (heap[currentEnd] != 0)
|
||||
currentEnd++;
|
||||
let publicKey = "".fromUtf8(heap, currentStart, currentEnd - currentStart);
|
||||
|
||||
currentStart = currentEnd + 1;
|
||||
currentEnd = currentStart;
|
||||
while (heap[currentEnd] != 0)
|
||||
currentEnd++;
|
||||
let privateKey = "".fromUtf8(heap, currentStart, currentEnd - currentStart);
|
||||
|
||||
Module["_Crypto_Free"](keys);
|
||||
|
||||
return {
|
||||
"salt": salt,
|
||||
"privateKey": privateKey,
|
||||
"publicKey": publicKey
|
||||
};
|
||||
};
|
||||
|
||||
Engine.prototype.changePassword = async function(privateKey, passwordOld, passwordNew, salt)
|
||||
{
|
||||
await this.init();
|
||||
|
||||
let privateKeyPtr = privateKey.toUtf8Pointer();
|
||||
let passwordOldPtr = passwordOld.toUtf8Pointer();
|
||||
let passwordNewPtr = passwordNew.toUtf8Pointer();
|
||||
let saltPtr = salt.toUtf8Pointer();
|
||||
|
||||
let privateKeyEnc = Module["_Crypto_ChangePassword"](privateKeyPtr.ptr, passwordOldPtr.ptr, passwordNewPtr.ptr, saltPtr.ptr);
|
||||
|
||||
privateKeyPtr.free();
|
||||
passwordOldPtr.free();
|
||||
passwordNewPtr.free();
|
||||
saltPtr.free();
|
||||
|
||||
if (privateKeyEnc === 0)
|
||||
return null;
|
||||
|
||||
let heap = Module["HEAP8"];
|
||||
|
||||
let currentStart = privateKeyEnc;
|
||||
let currentEnd = currentStart;
|
||||
while (heap[currentEnd] != 0)
|
||||
currentEnd++;
|
||||
|
||||
let privateKeyString = "".fromUtf8(heap, currentStart, currentEnd - currentStart);
|
||||
|
||||
Module["_Crypto_Free"](privateKeyEnc);
|
||||
return privateKeyString;
|
||||
};
|
||||
|
||||
Engine.prototype.sign = async function(privateKey, password, salt, xml)
|
||||
{
|
||||
await this.init();
|
||||
|
||||
let privateKeyPtr = privateKey.toUtf8Pointer();
|
||||
let passwordPtr = password.toUtf8Pointer();
|
||||
let saltPtr = salt.toUtf8Pointer();
|
||||
let xmlPtr = xml.toUtf8Pointer();
|
||||
|
||||
let signData = Module["_Crypto_Sign"](privateKeyPtr.ptr, passwordPtr.ptr, saltPtr.ptr, xmlPtr.ptr, xmlPtr.length);
|
||||
|
||||
privateKeyPtr.free();
|
||||
passwordPtr.free();
|
||||
saltPtr.free();
|
||||
xmlPtr.free();
|
||||
|
||||
if (signData === 0)
|
||||
return null;
|
||||
|
||||
let heap = Module["HEAP8"];
|
||||
|
||||
let currentStart = signData;
|
||||
let currentEnd = currentStart;
|
||||
while (heap[currentEnd] != 0)
|
||||
currentEnd++;
|
||||
|
||||
let signString = "".fromUtf8(heap, currentStart, currentEnd - currentStart);
|
||||
|
||||
Module["_Crypto_Free"](signData);
|
||||
return signString;
|
||||
};
|
||||
|
||||
// ENCRYPT
|
||||
Engine.prototype.decrypt = async function(privateKeyEnc, password, salt, data)
|
||||
{
|
||||
await this.init();
|
||||
|
||||
let privateKeyEncPtr = privateKeyEnc.toUtf8Pointer();
|
||||
let passwordPtr = password.toUtf8Pointer();
|
||||
let saltPtr = salt.toUtf8Pointer();
|
||||
|
||||
let dataPtr = typedArrayToMemory(data);
|
||||
|
||||
let decryptData = Module["_Crypto_Decrypt"](privateKeyEncPtr, passwordPtr, saltPtr.ptr, dataPtr, data.length);
|
||||
let memoryData = new CMemoryData(decryptData);
|
||||
|
||||
privateKeyEncPtr.free();
|
||||
passwordPtr.free();
|
||||
saltPtr.free();
|
||||
|
||||
Module["_free"](dataPtr);
|
||||
|
||||
return memoryData;
|
||||
};
|
||||
|
||||
Engine.prototype.encrypt = async function(publicKey, data)
|
||||
{
|
||||
await this.init();
|
||||
|
||||
let publicKeyEncPtr = publicKey.toUtf8Pointer();
|
||||
let dataPtr = typedArrayToMemory(data);
|
||||
|
||||
let encryptData = Module["_Crypto_Encrypt"](publicKeyEncPtr, dataPtr, data.length);
|
||||
let memoryData = new CMemoryData(decryptData);
|
||||
|
||||
publicKeyEncPtr.free();
|
||||
Module["_free"](dataPtr);
|
||||
|
||||
return memoryData;
|
||||
};
|
||||
|
||||
window.cryptoJS = new Engine();
|
||||
|
||||
//module
|
||||
|
||||
});
|
||||
|
After Width: | Height: | Size: 29 KiB |
|
After Width: | Height: | Size: 999 B |
|
After Width: | Height: | Size: 2.9 KiB |
|
After Width: | Height: | Size: 5.1 KiB |
|
After Width: | Height: | Size: 8.4 KiB |
@ -0,0 +1,43 @@
|
||||
{
|
||||
"manifest_version": 3,
|
||||
"name": "ONLYOFFICE Keychain",
|
||||
"version": "1.0",
|
||||
"permissions": ["tabs", "scripting"],
|
||||
"icons": {
|
||||
"16": "icons/icon16.png",
|
||||
"32": "icons/icon32.png",
|
||||
"48": "icons/icon48.png",
|
||||
"64": "icons/icon64.png",
|
||||
"128": "icons/icon128.png"
|
||||
},
|
||||
"background": {
|
||||
"service_worker": "background.js"
|
||||
},
|
||||
"host_permissions": ["<all_urls>"],
|
||||
"action": {
|
||||
"default_icon": {
|
||||
"16": "icons/icon16.png",
|
||||
"32": "icons/icon32.png",
|
||||
"48": "icons/icon48.png",
|
||||
"64": "icons/icon64.png",
|
||||
"128": "icons/icon128.png"
|
||||
},
|
||||
"default_popup": "popup.html"
|
||||
},
|
||||
"content_scripts": [
|
||||
{
|
||||
"matches": ["<all_urls>"],
|
||||
"js": ["content.js"]
|
||||
}
|
||||
],
|
||||
"web_accessible_resources": [
|
||||
{
|
||||
"resources": ["engine.wasm"],
|
||||
"matches": ["<all_urls>"]
|
||||
}
|
||||
],
|
||||
"content_security_policy": {
|
||||
"extension_pages" : "script-src 'self' 'wasm-unsafe-eval'; object-src 'self'"
|
||||
}
|
||||
}
|
||||
|
||||
14
DesktopEditor/xmlsec/src/wasm/extension/extension/popup.html
Normal file
@ -0,0 +1,14 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="ru">
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>Popup</title>
|
||||
</head>
|
||||
<body>
|
||||
<h2>Сообщение получено!</h2>
|
||||
<div id="message"></div>
|
||||
<button id="testButton">buttton</button>
|
||||
<script src="popup.js"></script>
|
||||
</body>
|
||||
</html>
|
||||
17
DesktopEditor/xmlsec/src/wasm/extension/extension/popup.js
Normal file
@ -0,0 +1,17 @@
|
||||
chrome.runtime.onMessage.addListener((message, sender, sendResponse) => {
|
||||
document.getElementById("message").innerText = JSON.stringify(message);
|
||||
});
|
||||
|
||||
document.addEventListener("DOMContentLoaded", (event) => {
|
||||
|
||||
document.getElementById("testButton").onclick = function(e) {
|
||||
chrome.tabs.query({ active: true, currentWindow: true }, (tabs) => {
|
||||
if (tabs.length === 0) return;
|
||||
|
||||
chrome.tabs.sendMessage(tabs[0].id, { action: "popupMessage", text: "Привет от Popup!" }, (response) => {
|
||||
console.log("Ответ от контентного скрипта:", response);
|
||||
});
|
||||
});
|
||||
};
|
||||
|
||||
});
|
||||
@ -0,0 +1,22 @@
|
||||
import sys
|
||||
sys.path.append("../../../../../../../build_tools/scripts")
|
||||
import base
|
||||
import argparse
|
||||
|
||||
parser = argparse.ArgumentParser(description='Generate background script for debug')
|
||||
|
||||
parser.add_argument("--wasm", action="store_true")
|
||||
args = parser.parse_args()
|
||||
|
||||
content = base.readFile("./utils.js") + "\n\n"
|
||||
|
||||
if args.wasm:
|
||||
content = content + "\n\n" + base.readFile("./../deploy/engine.js")
|
||||
base.copy_file("./../deploy/engine.wasm", "./engine.wasm")
|
||||
else:
|
||||
content = content + "\n\n" + base.readFile("./engine.js")
|
||||
|
||||
content = content + "\n\n" + base.readFile("./background_base.js")
|
||||
|
||||
base.delete_file("./background.js")
|
||||
base.writeFile("./background.js", content)
|
||||
334
DesktopEditor/xmlsec/src/wasm/extension/extension/utils.js
Normal file
@ -0,0 +1,334 @@
|
||||
(function(window, undefined) {
|
||||
if (undefined !== String.prototype.fromUtf8 && undefined !== String.prototype.toUtf8)
|
||||
return;
|
||||
|
||||
var STRING_UTF8_BUFFER_LENGTH = 1024;
|
||||
var STRING_UTF8_BUFFER = new ArrayBuffer(STRING_UTF8_BUFFER_LENGTH);
|
||||
|
||||
/**
|
||||
* Read string from utf8
|
||||
* @param {Uint8Array} buffer
|
||||
* @param {number} [start=0]
|
||||
* @param {number} [len]
|
||||
* @returns {string}
|
||||
*/
|
||||
String.prototype.fromUtf8 = function(buffer, start, len) {
|
||||
if (undefined === start)
|
||||
start = 0;
|
||||
if (undefined === len)
|
||||
len = buffer.length - start;
|
||||
|
||||
var result = "";
|
||||
var index = start;
|
||||
var end = start + len;
|
||||
while (index < end) {
|
||||
var u0 = buffer[index++];
|
||||
if (!(u0 & 128)) {
|
||||
result += String.fromCharCode(u0);
|
||||
continue;
|
||||
}
|
||||
var u1 = buffer[index++] & 63;
|
||||
if ((u0 & 224) == 192) {
|
||||
result += String.fromCharCode((u0 & 31) << 6 | u1);
|
||||
continue;
|
||||
}
|
||||
var u2 = buffer[index++] & 63;
|
||||
if ((u0 & 240) == 224)
|
||||
u0 = (u0 & 15) << 12 | u1 << 6 | u2;
|
||||
else
|
||||
u0 = (u0 & 7) << 18 | u1 << 12 | u2 << 6 | buffer[index++] & 63;
|
||||
if (u0 < 65536)
|
||||
result += String.fromCharCode(u0);
|
||||
else {
|
||||
var ch = u0 - 65536;
|
||||
result += String.fromCharCode(55296 | ch >> 10, 56320 | ch & 1023);
|
||||
}
|
||||
}
|
||||
return result;
|
||||
};
|
||||
|
||||
/**
|
||||
* Convert string to utf8 array
|
||||
* @returns {Uint8Array}
|
||||
*/
|
||||
String.prototype.toUtf8 = function(isNoEndNull, isUseBuffer) {
|
||||
var inputLen = this.length;
|
||||
var testLen = 6 * inputLen + 1;
|
||||
var tmpStrings = (isUseBuffer && testLen < STRING_UTF8_BUFFER_LENGTH) ? STRING_UTF8_BUFFER : new ArrayBuffer(testLen);
|
||||
|
||||
var code = 0;
|
||||
var index = 0;
|
||||
|
||||
var outputIndex = 0;
|
||||
var outputDataTmp = new Uint8Array(tmpStrings);
|
||||
var outputData = outputDataTmp;
|
||||
|
||||
while (index < inputLen) {
|
||||
code = this.charCodeAt(index++);
|
||||
if (code >= 0xD800 && code <= 0xDFFF && index < inputLen)
|
||||
code = 0x10000 + (((code & 0x3FF) << 10) | (0x03FF & this.charCodeAt(index++)));
|
||||
|
||||
if (code < 0x80)
|
||||
outputData[outputIndex++] = code;
|
||||
else if (code < 0x0800) {
|
||||
outputData[outputIndex++] = 0xC0 | (code >> 6);
|
||||
outputData[outputIndex++] = 0x80 | (code & 0x3F);
|
||||
} else if (code < 0x10000) {
|
||||
outputData[outputIndex++] = 0xE0 | (code >> 12);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 6) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | (code & 0x3F);
|
||||
} else if (code < 0x1FFFFF) {
|
||||
outputData[outputIndex++] = 0xF0 | (code >> 18);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 12) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 6) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | (code & 0x3F);
|
||||
} else if (code < 0x3FFFFFF) {
|
||||
outputData[outputIndex++] = 0xF8 | (code >> 24);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 18) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 12) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 6) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | (code & 0x3F);
|
||||
} else if (code < 0x7FFFFFFF) {
|
||||
outputData[outputIndex++] = 0xFC | (code >> 30);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 24) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 18) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 12) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | ((code >> 6) & 0x3F);
|
||||
outputData[outputIndex++] = 0x80 | (code & 0x3F);
|
||||
}
|
||||
}
|
||||
|
||||
if (isNoEndNull !== true)
|
||||
outputData[outputIndex++] = 0;
|
||||
|
||||
return new Uint8Array(tmpStrings,0,outputIndex);
|
||||
};
|
||||
|
||||
window.UtilsJS = {};
|
||||
|
||||
var charA = "A".charCodeAt(0);
|
||||
var charZ = "Z".charCodeAt(0);
|
||||
var chara = "a".charCodeAt(0);
|
||||
var charz = "z".charCodeAt(0);
|
||||
var char0 = "0".charCodeAt(0);
|
||||
var char9 = "9".charCodeAt(0);
|
||||
var charp = "+".charCodeAt(0);
|
||||
var chars = "/".charCodeAt(0);
|
||||
var char_break = ";".charCodeAt(0);
|
||||
|
||||
function decodeBase64Char(ch)
|
||||
{
|
||||
if (ch >= charA && ch <= charZ)
|
||||
return ch - charA + 0;
|
||||
if (ch >= chara && ch <= charz)
|
||||
return ch - chara + 26;
|
||||
if (ch >= char0 && ch <= char9)
|
||||
return ch - char0 + 52;
|
||||
if (ch == charp)
|
||||
return 62;
|
||||
if (ch == chars)
|
||||
return 63;
|
||||
return -1;
|
||||
}
|
||||
|
||||
var stringBase64 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
|
||||
var arrayBase64 = [];
|
||||
for (var index64 = 0; index64 < stringBase64.length; index64++)
|
||||
{
|
||||
arrayBase64.push(stringBase64.charAt(index64));
|
||||
}
|
||||
|
||||
window.UtilsJS.Base64 = {};
|
||||
|
||||
window.UtilsJS.Base64.decodeData = function(input, input_offset, input_len, output, output_offset)
|
||||
{
|
||||
var isBase64 = typeof input === "string";
|
||||
if (undefined === input_len) input_len = input.length;
|
||||
var writeIndex = (undefined === output_offset) ? 0 : output_offset;
|
||||
var index = (undefined === input_offset) ? 0 : input_offset;
|
||||
|
||||
while (index < input_len)
|
||||
{
|
||||
var dwCurr = 0;
|
||||
var i;
|
||||
var nBits = 0;
|
||||
for (i=0; i<4; i++)
|
||||
{
|
||||
if (index >= input_len)
|
||||
break;
|
||||
var nCh = decodeBase64Char(isBase64 ? input.charCodeAt(index) : input[index]);
|
||||
index++;
|
||||
if (nCh == -1)
|
||||
{
|
||||
i--;
|
||||
continue;
|
||||
}
|
||||
dwCurr <<= 6;
|
||||
dwCurr |= nCh;
|
||||
nBits += 6;
|
||||
}
|
||||
|
||||
dwCurr <<= 24-nBits;
|
||||
for (i=0; i<(nBits>>3); i++)
|
||||
{
|
||||
output[writeIndex++] = ((dwCurr & 0x00ff0000) >>> 16);
|
||||
dwCurr <<= 8;
|
||||
}
|
||||
}
|
||||
return writeIndex;
|
||||
};
|
||||
|
||||
window.UtilsJS.Base64.decode = function(input, isUsePrefix, dstlen, offset)
|
||||
{
|
||||
var srcLen = input.length;
|
||||
var index = (undefined === offset) ? 0 : offset;
|
||||
var dstLen = (undefined === dstlen) ? srcLen : dstlen;
|
||||
|
||||
var isBase64 = typeof input === "string";
|
||||
|
||||
if (isUsePrefix && isBase64)
|
||||
{
|
||||
dstLen = 0;
|
||||
var maxLen = Math.max(11, srcLen); // > 4 Gb
|
||||
while (index < maxLen)
|
||||
{
|
||||
var c = input.charCodeAt(index++);
|
||||
if (c == char_break)
|
||||
break;
|
||||
|
||||
dstLen *= 10;
|
||||
dstLen += (c - char0);
|
||||
}
|
||||
|
||||
if (index == maxLen)
|
||||
{
|
||||
index = 0;
|
||||
dstLen = srcLen;
|
||||
}
|
||||
}
|
||||
|
||||
var dst = new Uint8Array(dstLen);
|
||||
var writeIndex = window.AscCommon.Base64.decodeData(input, index, srcLen, dst, 0);
|
||||
|
||||
if (writeIndex == dstLen)
|
||||
return dst;
|
||||
|
||||
return new Uint8Array(dst.buffer, 0, writeIndex);
|
||||
};
|
||||
|
||||
window.UtilsJS.Base64.encode = function(input, offset, length, isUsePrefix)
|
||||
{
|
||||
var srcLen = (undefined === length) ? input.length : length;
|
||||
var index = (undefined === offset) ? 0 : offset;
|
||||
|
||||
var len1 = (((srcLen / 3) >> 0) * 4);
|
||||
var len2 = (len1 / 76) >> 0;
|
||||
var len3 = 19;
|
||||
var dstArray = [];
|
||||
|
||||
var sTemp = "";
|
||||
var dwCurr = 0;
|
||||
for (var i = 0; i <= len2; i++)
|
||||
{
|
||||
if (i == len2)
|
||||
len3 = ((len1 % 76) / 4) >> 0;
|
||||
|
||||
for (var j = 0; j < len3; j++)
|
||||
{
|
||||
dwCurr = 0;
|
||||
for (var n = 0; n < 3; n++)
|
||||
{
|
||||
dwCurr |= input[index++];
|
||||
dwCurr <<= 8;
|
||||
}
|
||||
|
||||
sTemp = "";
|
||||
for (var k = 0; k < 4; k++)
|
||||
{
|
||||
var b = (dwCurr >>> 26) & 0xFF;
|
||||
sTemp += arrayBase64[b];
|
||||
dwCurr <<= 6;
|
||||
dwCurr &= 0xFFFFFFFF;
|
||||
}
|
||||
dstArray.push(sTemp);
|
||||
}
|
||||
}
|
||||
len2 = (srcLen % 3 != 0) ? (srcLen % 3 + 1) : 0;
|
||||
if (len2)
|
||||
{
|
||||
dwCurr = 0;
|
||||
for (var n = 0; n < 3; n++)
|
||||
{
|
||||
if (n < (srcLen % 3))
|
||||
dwCurr |= input[index++];
|
||||
dwCurr <<= 8;
|
||||
}
|
||||
|
||||
sTemp = "";
|
||||
for (var k = 0; k < len2; k++)
|
||||
{
|
||||
var b = (dwCurr >>> 26) & 0xFF;
|
||||
sTemp += arrayBase64[b];
|
||||
dwCurr <<= 6;
|
||||
}
|
||||
|
||||
len3 = (len2 != 0) ? 4 - len2 : 0;
|
||||
for (var j = 0; j < len3; j++)
|
||||
{
|
||||
sTemp += '=';
|
||||
}
|
||||
dstArray.push(sTemp);
|
||||
}
|
||||
|
||||
return isUsePrefix ? (("" + srcLen + ";") + dstArray.join("")) : dstArray.join("");
|
||||
};
|
||||
|
||||
window.UtilsJS.Hex = {};
|
||||
|
||||
window.UtilsJS.Hex.decode = function(input)
|
||||
{
|
||||
var hexToByte = function(c) {
|
||||
if (c >= 48 && c <= 57) return c - 48; // 0..9
|
||||
if (c >= 97 && c <= 102) return c - 87;
|
||||
if (c >= 65 && c <= 70) return c - 55;
|
||||
return 0;
|
||||
};
|
||||
|
||||
var len = input.length;
|
||||
if (len & 0x01) len -= 1;
|
||||
var result = new Uint8Array(len >> 1);
|
||||
var resIndex = 0;
|
||||
for (var i = 0; i < len; i += 2)
|
||||
{
|
||||
result[resIndex++] = hexToByte(input.charCodeAt(i)) << 4 | hexToByte(input.charCodeAt(i + 1));
|
||||
}
|
||||
return result;
|
||||
};
|
||||
|
||||
window.UtilsJS.Hex.encode = function(input, isUpperCase)
|
||||
{
|
||||
var byteToHex = new Array(256);
|
||||
for (var i = 0; i < 16; i++)
|
||||
byteToHex[i] = "0" + (isUpperCase ? i.toString(16).toUpperCase() : i.toString(16));
|
||||
for (var i = 16; i < 256; i++)
|
||||
byteToHex[i] = isUpperCase ? i.toString(16).toUpperCase() : i.toString(16);
|
||||
|
||||
var result = "";
|
||||
for (var i = 0, len = input.length; i < len; i++)
|
||||
result += byteToHex[input[i]];
|
||||
|
||||
return result;
|
||||
};
|
||||
|
||||
window.UtilsJS.random = function(length) {
|
||||
let byteArray = new Uint8Array(length);
|
||||
let engine = window.crypto || window.msCrypto;
|
||||
if (engine)
|
||||
engine.getRandomValues(byteArray);
|
||||
else {
|
||||
for (let i = 0; i < length; i++)
|
||||
byteArray[i] = (Math.random() * 256) >> 0;
|
||||
}
|
||||
return byteArray;
|
||||
};
|
||||
})(self);
|
||||
24
DesktopEditor/xmlsec/src/wasm/extension/extension2/.gitignore
vendored
Normal file
@ -0,0 +1,24 @@
|
||||
# Logs
|
||||
logs
|
||||
*.log
|
||||
npm-debug.log*
|
||||
yarn-debug.log*
|
||||
yarn-error.log*
|
||||
pnpm-debug.log*
|
||||
lerna-debug.log*
|
||||
|
||||
node_modules
|
||||
dist
|
||||
dist-ssr
|
||||
*.local
|
||||
|
||||
# Editor directories and files
|
||||
.vscode/*
|
||||
!.vscode/extensions.json
|
||||
.idea
|
||||
.DS_Store
|
||||
*.suo
|
||||
*.ntvs*
|
||||
*.njsproj
|
||||
*.sln
|
||||
*.sw?
|
||||
@ -0,0 +1,6 @@
|
||||
# Onlyoffice keychain extension
|
||||
|
||||
To run the dev build:
|
||||
1. Go to the extension2 folder
|
||||
2. Run ```npm run dev```
|
||||
3. Upload the dist folder as an unpacked extension to the browser
|
||||
@ -0,0 +1,26 @@
|
||||
import js from '@eslint/js'
|
||||
import globals from 'globals'
|
||||
import reactHooks from 'eslint-plugin-react-hooks'
|
||||
import reactRefresh from 'eslint-plugin-react-refresh'
|
||||
import tseslint from 'typescript-eslint'
|
||||
import { globalIgnores } from 'eslint/config'
|
||||
|
||||
export default tseslint.config([
|
||||
globalIgnores(['dist']),
|
||||
{
|
||||
files: ['**/*.{ts,tsx}'],
|
||||
extends: [
|
||||
js.configs.recommended,
|
||||
tseslint.configs.recommended,
|
||||
reactHooks.configs['recommended-latest'],
|
||||
reactRefresh.configs.vite,
|
||||
],
|
||||
languageOptions: {
|
||||
ecmaVersion: 2020,
|
||||
globals: globals.browser,
|
||||
},
|
||||
rules: {
|
||||
'@typescript-eslint/no-unused-vars': ['error', { argsIgnorePattern: '^_' }],
|
||||
}
|
||||
},
|
||||
])
|
||||
@ -0,0 +1,34 @@
|
||||
import { defineManifest } from '@crxjs/vite-plugin';
|
||||
import pkg from "./package.json";
|
||||
|
||||
export default defineManifest({
|
||||
manifest_version: 3,
|
||||
name: pkg.name,
|
||||
version: pkg.version,
|
||||
icons: {
|
||||
16: "public/icons/icon16.png",
|
||||
32: "public/icons/icon32.png",
|
||||
48: "public/icons/icon48.png",
|
||||
64: "public/icons/icon64.png",
|
||||
128: "public/icons/icon128.png",
|
||||
},
|
||||
action: {
|
||||
default_icon: {
|
||||
16: "public/icons/icon16.png",
|
||||
32: "public/icons/icon32.png",
|
||||
48: "public/icons/icon48.png",
|
||||
64: "public/icons/icon64.png",
|
||||
128: "public/icons/icon128.png",
|
||||
},
|
||||
default_popup: 'src/popup/index.html',
|
||||
},
|
||||
content_scripts: [{
|
||||
js: ['src/content/content.ts'],
|
||||
matches: ['<all_urls>'],
|
||||
run_at: "document_end"
|
||||
}],
|
||||
background: {
|
||||
service_worker: "src/background/background.ts"
|
||||
},
|
||||
permissions: ["storage"],
|
||||
});
|
||||
2995
DesktopEditor/xmlsec/src/wasm/extension/extension2/package-lock.json
generated
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"name": "ONLYOFFICE Keychain",
|
||||
"private": true,
|
||||
"version": "1.0.0",
|
||||
"type": "module",
|
||||
"scripts": {
|
||||
"dev": "vite",
|
||||
"build": "tsc && vite build",
|
||||
"lint": "eslint .",
|
||||
"preview": "vite preview"
|
||||
},
|
||||
"dependencies": {
|
||||
"react": "^19.1.1",
|
||||
"react-dom": "^19.1.1",
|
||||
"webextension-polyfill": "^0.12.0"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@crxjs/vite-plugin": "^2.2.0",
|
||||
"@eslint/js": "^9.33.0",
|
||||
"@types/react": "^19.1.10",
|
||||
"@types/react-dom": "^19.1.7",
|
||||
"@types/webextension-polyfill": "^0.12.3",
|
||||
"@vitejs/plugin-react": "^5.0.0",
|
||||
"chrome-types": "^0.1.375",
|
||||
"eslint": "^9.33.0",
|
||||
"eslint-plugin-react-hooks": "^5.2.0",
|
||||
"eslint-plugin-react-refresh": "^0.4.20",
|
||||
"globals": "^16.3.0",
|
||||
"typescript": "~5.8.3",
|
||||
"typescript-eslint": "^8.39.1",
|
||||
"vite": "^7.1.5"
|
||||
}
|
||||
}
|
||||
|
After Width: | Height: | Size: 29 KiB |
|
After Width: | Height: | Size: 999 B |
|
After Width: | Height: | Size: 2.9 KiB |
|
After Width: | Height: | Size: 5.1 KiB |
|
After Width: | Height: | Size: 8.4 KiB |
@ -0,0 +1,5 @@
|
||||
import {initCheckOpenedPopup} from "./utils.ts";
|
||||
import initTaskManager from "./task-manager/task-manager.ts";
|
||||
|
||||
initTaskManager();
|
||||
initCheckOpenedPopup();
|
||||
@ -0,0 +1,31 @@
|
||||
import browser from "webextension-polyfill";
|
||||
import {messageTypes} from "../../common/message-const.ts";
|
||||
import {generatePopupKeys, selectSignKeys, signData, verifyData} from "./tasks.ts";
|
||||
import {isBackgroundMessageType} from "../../common/message-types.ts";
|
||||
|
||||
const initTaskManager = () => {
|
||||
browser.runtime.onMessage.addListener((message: unknown) => {
|
||||
if (!isBackgroundMessageType(message)) {
|
||||
return false;
|
||||
}
|
||||
const data = message.data;
|
||||
switch (data.type) {
|
||||
case messageTypes.GENERATE_KEYS: {
|
||||
return generatePopupKeys();
|
||||
}
|
||||
case messageTypes.SELECT_SIGN_KEYS: {
|
||||
return selectSignKeys();
|
||||
}
|
||||
case messageTypes.SIGN_DATA: {
|
||||
return signData(data.base64Data, data.guid);
|
||||
}
|
||||
case messageTypes.VERIFY_DATA: {
|
||||
return verifyData(data.base64Data, data.base64Signature, data.guid);
|
||||
}
|
||||
default:
|
||||
return false;
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
export default initTaskManager;
|
||||
@ -0,0 +1,43 @@
|
||||
import {openPopup} from "../utils.ts";
|
||||
import {messageTypes} from "../../common/message-const.ts";
|
||||
import {sendToPopup} from "../../content/messenger.ts";
|
||||
// @ts-ignore
|
||||
import {StorageManager} from "../../common/storage.ts";
|
||||
import {ab2base64, base642ui} from "../../common/utils.ts";
|
||||
import getCrypto from "../../common/crypto.ts";
|
||||
|
||||
export const generatePopupKeys = async () => {
|
||||
await openPopup();
|
||||
await sendToPopup({type: messageTypes.WAIT_ENTER_PASSWORD});
|
||||
return true;
|
||||
}
|
||||
|
||||
export const selectSignKeys = async () => {
|
||||
await openPopup();
|
||||
await sendToPopup({type: messageTypes.WAIT_ENTER_PASSWORD});
|
||||
return await sendToPopup({type: messageTypes.SELECT_SIGN_KEYS});
|
||||
};
|
||||
|
||||
export const signData = async (base64Data: string , guid: string) => {
|
||||
const keyStorage = new StorageManager();
|
||||
await keyStorage.loadKeysFromStorage();
|
||||
const keyPair = keyStorage.getKeyByGuid(guid);
|
||||
if (!keyPair) {
|
||||
throw new Error("Key pair is not found");
|
||||
}
|
||||
const data = base642ui(base64Data);
|
||||
const signData = await keyPair.sign(data);
|
||||
return ab2base64(signData);
|
||||
}
|
||||
|
||||
export const verifyData = async (base64Data: string, base64Signature: string, guid: string) => {
|
||||
const keyStorage = new StorageManager();
|
||||
await keyStorage.loadKeysFromStorage();
|
||||
const keyPair = keyStorage.getKeyByGuid(guid);
|
||||
if (!keyPair) {
|
||||
throw new Error("Key pair is not found");
|
||||
}
|
||||
const data = base642ui(base64Data);
|
||||
const signature = base642ui(base64Signature);
|
||||
return await keyPair.verify(signature, data);
|
||||
}
|
||||
@ -0,0 +1,52 @@
|
||||
import browser from "webextension-polyfill";
|
||||
import getCrypto from "../common/crypto.ts";
|
||||
|
||||
export const initCheckOpenedPopup = () => {
|
||||
browser.runtime.onConnect.addListener((port) => {
|
||||
if (port.name === "popup") {
|
||||
browser.storage.session.set({isOpenPopup: true});
|
||||
|
||||
port.onDisconnect.addListener(() => {
|
||||
browser.storage.session.set({isOpenPopup: false});
|
||||
});
|
||||
}
|
||||
});
|
||||
};
|
||||
|
||||
const isOpenedPopup = async () => {
|
||||
const isOpenPopupItem = await browser.storage.session.get("isOpenPopup");
|
||||
return !!(isOpenPopupItem && isOpenPopupItem.isOpenPopup);
|
||||
};
|
||||
|
||||
const waitClosingPopup = async () => {
|
||||
const isOpenPopup = await isOpenedPopup();
|
||||
if (!isOpenPopup) {
|
||||
return true;
|
||||
}
|
||||
return new Promise(resolve => {
|
||||
browser.storage.session.onChanged.addListener(function handler(change) {
|
||||
if (change.isOpenPopup && !change.isOpenPopup.newValue) {
|
||||
browser.storage.session.onChanged.removeListener(handler);
|
||||
resolve(true);
|
||||
}
|
||||
});
|
||||
});
|
||||
};
|
||||
|
||||
export const openPopup = async () => {
|
||||
await waitClosingPopup();
|
||||
await browser.action.openPopup();
|
||||
return new Promise(resolve => {
|
||||
browser.storage.session.onChanged.addListener(function handler(change) {
|
||||
if (change.isOpenPopup && change.isOpenPopup.newValue) {
|
||||
browser.storage.session.onChanged.removeListener(handler);
|
||||
resolve(true);
|
||||
}
|
||||
});
|
||||
});
|
||||
};
|
||||
type TGuid = `{${string}-${string}-${string}-${string}-${string}}`
|
||||
export const getGUID = (): TGuid => {
|
||||
const crypto = getCrypto();
|
||||
return `{${crypto.randomUUID()}}`;
|
||||
}
|
||||
@ -0,0 +1,138 @@
|
||||
import {Key, KeyPair, KeyUsages, PrivateKey, PublicKey, SymmetricKey} from "./keys/keys.ts";
|
||||
import {
|
||||
type DigestType,
|
||||
digestTypes,
|
||||
type ExportKeyFormat,
|
||||
exportKeyFormats,
|
||||
type KeyGenParams,
|
||||
type KeyParams
|
||||
} from "./keys/key-types.ts";
|
||||
import {AesGcmGenParams, type AesGcmParams} from "./keys/params.ts";
|
||||
|
||||
const pbkdf2Parameters = {
|
||||
iterations: 150000,
|
||||
hash: digestTypes.SHA256,
|
||||
saltLength: 16
|
||||
};
|
||||
// type DecryptKey = PrivateKey | SymmetricKey;
|
||||
// type EncryptKey = PublicKey | SymmetricKey;
|
||||
abstract class CCryptoBase {
|
||||
abstract sign(key: PrivateKey, data: ArrayBuffer): Promise<ArrayBuffer>;
|
||||
abstract digest(algorithm: DigestType, data: ArrayBuffer): Promise<ArrayBuffer>;
|
||||
abstract verify(key: PublicKey, signature: ArrayBuffer, data: ArrayBuffer): Promise<boolean>;
|
||||
// abstract decrypt(key: DecryptKey, data: ArrayBuffer): Promise<ArrayBuffer>;
|
||||
// abstract encrypt(key: EncryptKey, data: ArrayBuffer): Promise<ArrayBuffer>;
|
||||
abstract generateKey(params: KeyGenParams, keyUsage: KeyUsages): Promise<SymmetricKey | KeyPair>;
|
||||
abstract wrapKey(format: ExportKeyFormat, key: Key, masterPassword: ArrayBuffer, salt: ArrayBuffer, aesParams: AesGcmParams, keyUsage: KeyUsages): Promise<ArrayBuffer>
|
||||
abstract unwrapKey(format: ExportKeyFormat, key: ArrayBuffer, masterPassword: ArrayBuffer, salt: ArrayBuffer, aesParams: AesGcmParams, keyParams: KeyParams, keyUsage: KeyUsages): Promise<ArrayBuffer>
|
||||
abstract getRandomValues(length: number): ArrayBuffer;
|
||||
abstract randomUUID(): string;
|
||||
}
|
||||
class CWebCrypto extends CCryptoBase {
|
||||
crypto = globalThis.crypto;
|
||||
subtle = this.crypto.subtle;
|
||||
constructor() {
|
||||
super();
|
||||
}
|
||||
getRandomValues(length: number) {
|
||||
const ui = new Uint8Array(length);
|
||||
return this.crypto.getRandomValues(ui);
|
||||
}
|
||||
async getAesCryptoKey(masterPassword: ArrayBuffer, salt: ArrayBuffer) {
|
||||
const pwKey = await this.subtle.importKey(
|
||||
'raw',
|
||||
masterPassword,
|
||||
{ name: 'PBKDF2' },
|
||||
false,
|
||||
['deriveKey']
|
||||
);
|
||||
return this.subtle.deriveKey(
|
||||
{
|
||||
name: 'PBKDF2',
|
||||
salt: salt,
|
||||
iterations: pbkdf2Parameters.iterations,
|
||||
hash: pbkdf2Parameters.hash
|
||||
},
|
||||
pwKey,
|
||||
new AesGcmGenParams(),
|
||||
false,
|
||||
['wrapKey', 'unwrapKey']
|
||||
);
|
||||
};
|
||||
async wrapKey(format: ExportKeyFormat, key: Key, masterPassword: ArrayBuffer, salt: ArrayBuffer, aesParams: AesGcmParams, keyUsage: KeyUsages) {
|
||||
const cryptoAesKey = await this.getAesCryptoKey(masterPassword, salt);
|
||||
const importKey = await this.getCryptoKeyFromWrapper(key, keyUsage);
|
||||
return this.subtle.wrapKey(format, importKey, cryptoAesKey, aesParams);
|
||||
}
|
||||
async unwrapKey(format: ExportKeyFormat, key: ArrayBuffer, masterPassword: ArrayBuffer, salt: ArrayBuffer, aesParams: AesGcmParams, keyParams: KeyParams, keyUsages: KeyUsages) {
|
||||
const cryptoAesKey = await this.getAesCryptoKey(masterPassword, salt);
|
||||
const cryptoKey = await this.subtle.unwrapKey(format, key, cryptoAesKey, aesParams, keyParams, true, /*this.getKeyUsages(keyUsages)*/["sign"]);
|
||||
return this.subtle.exportKey(format, cryptoKey);
|
||||
}
|
||||
async getCryptoKeyFromWrapper(key: Key, keyUsage: KeyUsages) {
|
||||
return this.subtle.importKey(key.exportFormat, key.key, key.params, true, this.getKeyUsages(keyUsage, key));
|
||||
}
|
||||
getKeyUsages({isEncrypt, isSign}: KeyUsages, key?: Key) {
|
||||
const keyUsages: KeyUsage[] = [];
|
||||
if (isEncrypt) {
|
||||
if (key instanceof PrivateKey) {
|
||||
keyUsages.push("decrypt");
|
||||
} else if (key instanceof PublicKey) {
|
||||
keyUsages.push("encrypt");
|
||||
} else {
|
||||
keyUsages.push("encrypt", "decrypt");
|
||||
}
|
||||
}
|
||||
if (isSign) {
|
||||
if (key instanceof PrivateKey) {
|
||||
keyUsages.push("sign");
|
||||
} else if (key instanceof PublicKey) {
|
||||
keyUsages.push("verify");
|
||||
} else {
|
||||
keyUsages.push("sign", "verify");
|
||||
}
|
||||
}
|
||||
return keyUsages;
|
||||
}
|
||||
async sign(key: PrivateKey, data: ArrayBuffer): Promise<ArrayBuffer> {
|
||||
const cryptoKey = await this.getCryptoKeyFromWrapper(key, new KeyUsages(false, true));
|
||||
return this.subtle.sign(key.params, cryptoKey, data);
|
||||
}
|
||||
async digest(algorithm: DigestType, data: ArrayBuffer): Promise<ArrayBuffer> {
|
||||
return this.subtle.digest(algorithm, data);
|
||||
}
|
||||
async verify(key: PublicKey, signature: ArrayBuffer, data: ArrayBuffer): Promise<boolean> {
|
||||
const cryptoKey = await this.getCryptoKeyFromWrapper(key, new KeyUsages(false, true));
|
||||
return this.subtle.verify(key.params, cryptoKey, signature, data);
|
||||
}
|
||||
// async decrypt(key: DecryptKey, data: ArrayBuffer): Promise<ArrayBuffer> {
|
||||
// const cryptoKey = await this.getCryptoKeyFromWrapper(key);
|
||||
// return this.subtle.decrypt(cryptoKey);
|
||||
// }
|
||||
// async encrypt(key: EncryptKey, data: ArrayBuffer): Promise<ArrayBuffer> {
|
||||
// throw new Error("Method not implemented.");
|
||||
// }
|
||||
async generateKey(params: KeyGenParams, keyUsage: KeyUsages) {
|
||||
const cryptoKey = await this.subtle.generateKey(params, true, this.getKeyUsages(keyUsage));
|
||||
const importParams = params.getImportParams();
|
||||
if (("privateKey" in cryptoKey) && ("publicKey" in cryptoKey)) {
|
||||
const publicKeyBuffer = await this.subtle.exportKey(exportKeyFormats.spki, cryptoKey.publicKey);
|
||||
const publicKey = new PublicKey(publicKeyBuffer, importParams);
|
||||
const privateKeyBuffer = await this.subtle.exportKey(exportKeyFormats.pkcs8, cryptoKey.privateKey);
|
||||
const privateKey = new PrivateKey(privateKeyBuffer, importParams, this.getRandomValues(pbkdf2Parameters.saltLength));
|
||||
return new KeyPair(publicKey, privateKey, keyUsage);
|
||||
}
|
||||
const keyBuffer = await this.subtle.exportKey(exportKeyFormats.raw, cryptoKey);
|
||||
return new SymmetricKey(keyBuffer, importParams, keyUsage);
|
||||
};
|
||||
|
||||
randomUUID() {
|
||||
return this.crypto.randomUUID();
|
||||
}
|
||||
}
|
||||
|
||||
const getCrypto = () => {
|
||||
return new CWebCrypto();
|
||||
}
|
||||
|
||||
export default getCrypto;
|
||||
@ -0,0 +1,73 @@
|
||||
import {KeyStorage} from "key-storage";
|
||||
import {downloadBinary, selectBinary} from "./utils.ts";
|
||||
|
||||
export function StorageManager() {
|
||||
this.keyStorage = new KeyStorage();
|
||||
}
|
||||
StorageManager.prototype.getBinaryKeys = function () {
|
||||
return Promise.resolve(null);
|
||||
};
|
||||
StorageManager.prototype.loadKeysFromStorage = function() {
|
||||
const oThis = this;
|
||||
return Promise.all([this.getMasterPassword(), this.getBinaryKeys()]).then(function ([masterPassword, binaryData]) {
|
||||
return oThis.keyStorage.import(binaryData, masterPassword);
|
||||
});
|
||||
}
|
||||
StorageManager.prototype.changeMasterPassword = function(newMasterPassword) {
|
||||
const oThis = this;
|
||||
return this.getMasterPassword().then(function (oldMasterPassword) {
|
||||
return oThis.keyStorage.changeMasterPassword(oldMasterPassword, newMasterPassword);
|
||||
});
|
||||
};
|
||||
StorageManager.prototype.getMasterPassword = function() {
|
||||
return Promise.resolve(null);
|
||||
};
|
||||
StorageManager.prototype.writeKeys = function() {
|
||||
const oThis = this;
|
||||
return this.keyStorage.export().then(function (exportedKeys) {
|
||||
return oThis.setStorageKeys(exportedKeys);
|
||||
});
|
||||
}
|
||||
StorageManager.prototype.setStorageKeys = function (exportedKeys) {
|
||||
return Promise.resolve();
|
||||
};
|
||||
StorageManager.prototype.addNewKeys = function (keys) {
|
||||
this.keyStorage.addKeys(keys);
|
||||
return this.writeKeys();
|
||||
};
|
||||
StorageManager.prototype.deprecateKey = function (key) {
|
||||
key.setIsValid(false);
|
||||
return this.writeKeys();
|
||||
};
|
||||
|
||||
StorageManager.prototype.exportKeys = function () {
|
||||
return this.keyStorage.export().then(downloadBinary);
|
||||
};
|
||||
|
||||
StorageManager.prototype.importKeys = function (callback) {
|
||||
const oThis = this;
|
||||
return this.getMasterPassword().then(function (masterPassword) {
|
||||
selectBinary(function (file) {
|
||||
try {
|
||||
file.arrayBuffer().then(function (binaryData) {
|
||||
return oThis.keyStorage.import(binaryData, masterPassword);
|
||||
}).then(function (keyObjects) {
|
||||
return oThis.addNewKeys(keyObjects);
|
||||
}).then(function () {
|
||||
callback();
|
||||
});
|
||||
} catch (e) {
|
||||
}
|
||||
});
|
||||
})
|
||||
};
|
||||
|
||||
StorageManager.prototype.generateKeys = function (params) {
|
||||
return this.keyStorage.generateKey(params);
|
||||
};
|
||||
StorageManager.prototype.getValidKeys = function () {
|
||||
return this.keyStorage.getValidKeys();
|
||||
};
|
||||
StorageManager.prototype.getKeyByGuid = function (guid) {
|
||||
return this.keyStorage.getKeyByGuid(guid);
|
||||
};
|
||||
@ -0,0 +1,108 @@
|
||||
import {
|
||||
AesGcmParams,
|
||||
AesImportParams,
|
||||
AesKeyGenParams, Ed25519ImportParams,
|
||||
Ed25519KeyGenParams,
|
||||
type RsaImportParams,
|
||||
RSAKeyGenParams
|
||||
} from "./params.ts";
|
||||
import {Key, KeyPair, PrivateKey, PublicKey} from "./keys.ts";
|
||||
export const exportKeyFormats = {
|
||||
pkcs8: "pkcs8",
|
||||
spki: "spki",
|
||||
raw: "raw"
|
||||
} as const;
|
||||
|
||||
export const algorithmTypes = {
|
||||
AES_GCM: "AES-GCM",
|
||||
AES_CTR: "AES-CTR",
|
||||
AES_CBC: "AES-CBC",
|
||||
AES_KW: "AES-KW",
|
||||
ED25519: "Ed25519",
|
||||
RSASSA_PKCS1_v1_5: "RSASSA-PKCS1-v1_5",
|
||||
RSA_PSS: "RSA-PSS",
|
||||
RSA_OAEP: "RSA-OAEP"
|
||||
} as const;
|
||||
|
||||
export const rsaTypes = {
|
||||
RSASSA_PKCS1_v1_5: algorithmTypes.RSASSA_PKCS1_v1_5,
|
||||
RSA_PSS: algorithmTypes.RSA_PSS,
|
||||
RSA_OAEP: algorithmTypes.RSA_OAEP,
|
||||
} as const;
|
||||
|
||||
export const aesTypes = {
|
||||
AES_GCM: algorithmTypes.AES_GCM,
|
||||
AES_CTR: algorithmTypes.AES_CTR,
|
||||
AES_CBC: algorithmTypes.AES_CBC,
|
||||
AES_KW: algorithmTypes.AES_KW,
|
||||
} as const;
|
||||
|
||||
export const digestTypes = {
|
||||
SHA1: "SHA-1",
|
||||
SHA256: "SHA-256",
|
||||
SHA384: "SHA-384",
|
||||
SHA512: "SHA-512",
|
||||
} as const;
|
||||
|
||||
export const keyTypes = {
|
||||
symmetric: "symmetric",
|
||||
pair: "pair"
|
||||
} as const;
|
||||
|
||||
export const pairKeyTypes = {
|
||||
private: "private",
|
||||
public: "public",
|
||||
} as const;
|
||||
|
||||
export const signAlgorithms = {
|
||||
ED25519: algorithmTypes.ED25519
|
||||
}
|
||||
|
||||
export const cryptAlgorithms = {
|
||||
...aesTypes,
|
||||
RSA_OAEP: algorithmTypes.RSA_OAEP
|
||||
}
|
||||
|
||||
export const isRSAJson = (obj: JSONKeyParams): obj is RsaJSONType => {
|
||||
const name = obj.name;
|
||||
return Object.values(rsaTypes).includes(name as RsaType);
|
||||
}
|
||||
export const isEd25519Json = (obj: JSONKeyParams): obj is Ed25519JSONParams => {
|
||||
const name = obj.name;
|
||||
return name === algorithmTypes.ED25519;
|
||||
};
|
||||
export const isAesJson = (obj: JSONKeyParams): obj is AesJSONType => {
|
||||
const name = obj.name;
|
||||
return Object.values(aesTypes).includes(name as AesType);
|
||||
}
|
||||
|
||||
export type RsaJSONType = ReturnType<RsaImportParams["toJSON"]>;
|
||||
export type AesJSONType = ReturnType<AesImportParams["toJSON"]>;
|
||||
export type Ed25519JSONParams = ReturnType<Ed25519ImportParams["toJSON"]>;
|
||||
export type JSONAesGcmParams = ReturnType<AesGcmParams["toJSON"]>;
|
||||
export type AesKeyGenLength = 128 | 192 | 256;
|
||||
export type KeyParams = RsaImportParams | AesImportParams | Ed25519ImportParams;
|
||||
export type JSONKeyParams = RsaJSONType | AesJSONType | Ed25519JSONParams;
|
||||
export type KeyGenParams = RSAKeyGenParams | Ed25519KeyGenParams | AesKeyGenParams;
|
||||
export type DigestType = typeof digestTypes[keyof typeof digestTypes];
|
||||
export type AesType = typeof aesTypes[keyof typeof aesTypes];
|
||||
export type RsaType = typeof rsaTypes[keyof typeof rsaTypes];
|
||||
export type AlgorithmType = typeof algorithmTypes[keyof typeof algorithmTypes];
|
||||
export type ExportKeyFormat = typeof exportKeyFormats[keyof typeof exportKeyFormats];
|
||||
export type SignAlgorithm = typeof signAlgorithms[keyof typeof signAlgorithms];
|
||||
export type CryptAlgorithm = typeof cryptAlgorithms[keyof typeof cryptAlgorithms];
|
||||
export type JSONKey = Awaited<ReturnType<Key["toJSON"]>>;
|
||||
export type JSONPublicKey = Awaited<ReturnType<PublicKey["toJSON"]>>;
|
||||
export type JSONPrivateKey = Awaited<ReturnType<PrivateKey["toJSON"]>>;
|
||||
export type JSONKeyPair = Awaited<ReturnType<KeyPair["toJSON"]>>;
|
||||
export type PairKey = PrivateKey | PublicKey;
|
||||
type JSONEncryptExportKeyFormat = {
|
||||
encrypt: true;
|
||||
salt: string;
|
||||
data: string;
|
||||
};
|
||||
type JSONDecryptExportKeyFormat = {
|
||||
encrypt: false;
|
||||
data: JSONKeyPair[];
|
||||
};
|
||||
export type JSONExportKeyFormat = JSONEncryptExportKeyFormat | JSONDecryptExportKeyFormat;
|
||||
@ -0,0 +1,156 @@
|
||||
import {getGUID} from "../../background/utils.ts";
|
||||
import {ab2base64, base642ui, str2ui} from "../utils.ts";
|
||||
import {
|
||||
type ExportKeyFormat,
|
||||
exportKeyFormats, type JSONKey, type JSONKeyPair, type JSONPrivateKey, type JSONPublicKey,
|
||||
type KeyParams,
|
||||
keyTypes,
|
||||
pairKeyTypes
|
||||
} from "./key-types.ts";
|
||||
import getCrypto from "../crypto.ts";
|
||||
import {AesGcmParams, getKeyParamsFromJson} from "./params.ts";
|
||||
|
||||
export class Key {
|
||||
params: KeyParams;
|
||||
key;
|
||||
exportFormat;
|
||||
constructor(key: ArrayBuffer, params: KeyParams, exportFormat: ExportKeyFormat) {
|
||||
this.key = key;
|
||||
this.params = params;
|
||||
this.exportFormat = exportFormat;
|
||||
}
|
||||
static async fromJSON(json: JSONKey, _masterPassword?: string, _keyUsage?: KeyUsages) {
|
||||
const params = getKeyParamsFromJson(json.params);
|
||||
const key = base642ui(json.key);
|
||||
return new this(key, params, exportKeyFormats.raw);
|
||||
}
|
||||
async toJSON(_masterPassword?: string, _keyUsage?: KeyUsages) {
|
||||
const key = ab2base64(this.key);
|
||||
return {
|
||||
params: this.params.toJSON(),
|
||||
key: key
|
||||
};
|
||||
}
|
||||
}
|
||||
export class SymmetricKey extends Key {
|
||||
type = keyTypes.symmetric;
|
||||
keyUsages;
|
||||
constructor(key: ArrayBuffer, params: KeyParams, keyUsage = new KeyUsages(true)) {
|
||||
super(key, params, exportKeyFormats.raw);
|
||||
this.keyUsages = keyUsage;
|
||||
}
|
||||
}
|
||||
export class PublicKey extends Key {
|
||||
type = pairKeyTypes.public;
|
||||
constructor(key: ArrayBuffer, params: KeyParams) {
|
||||
super(key, params, exportKeyFormats.spki);
|
||||
}
|
||||
static override async fromJSON(json: JSONPublicKey) {
|
||||
const params = getKeyParamsFromJson(json.params);
|
||||
const key = base642ui(json.key);
|
||||
return new PublicKey(key, params);
|
||||
}
|
||||
override async toJSON() {
|
||||
const params = this.params.toJSON();
|
||||
const base64Key = ab2base64(this.key);
|
||||
return {
|
||||
format: exportKeyFormats.spki,
|
||||
key: base64Key,
|
||||
params
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
export class PrivateKey extends Key {
|
||||
type = pairKeyTypes.private;
|
||||
salt;
|
||||
constructor(key: ArrayBuffer, params: KeyParams, salt: ArrayBuffer) {
|
||||
super(key, params, exportKeyFormats.pkcs8);
|
||||
this.salt = salt;
|
||||
}
|
||||
static override async fromJSON(json: JSONPrivateKey, masterPassword: string, keyUsage: KeyUsages) {
|
||||
const salt = base642ui(json.salt);
|
||||
const params = getKeyParamsFromJson(json.params);
|
||||
const crypto = getCrypto();
|
||||
const strWrapKey = json.key;
|
||||
const wrapKey = base642ui(strWrapKey);
|
||||
const wrapParams = new AesGcmParams();
|
||||
wrapParams.fromJSON(json.wrapParams);
|
||||
const key = await crypto.unwrapKey(exportKeyFormats.pkcs8, wrapKey, str2ui(masterPassword), salt, wrapParams, params, keyUsage);
|
||||
|
||||
return new PrivateKey(key, params, salt);
|
||||
}
|
||||
override async toJSON(masterPassword: string, keyUsage: KeyUsages) {
|
||||
const crypto = getCrypto();
|
||||
const iv = crypto.getRandomValues(12);
|
||||
const aesParams = new AesGcmParams(iv);
|
||||
const wrapKey = await crypto.wrapKey(this.exportFormat, this, str2ui(masterPassword), this.salt, aesParams, keyUsage);
|
||||
const base64WrapKey = ab2base64(wrapKey);
|
||||
const params = this.params.toJSON();
|
||||
const wrapParams = aesParams.toJSON();
|
||||
return {
|
||||
format: this.exportFormat,
|
||||
key: base64WrapKey,
|
||||
salt: ab2base64(this.salt),
|
||||
params,
|
||||
wrapParams
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
export class KeyPair {
|
||||
privateKey;
|
||||
publicKey;
|
||||
date;
|
||||
type = keyTypes.pair;
|
||||
keyUsage;
|
||||
guid;
|
||||
isValid;
|
||||
static async fromJSON(json: JSONKeyPair, masterPassword: string) {
|
||||
const keyUsage = KeyUsages.fromJSON(json.keyUsage);
|
||||
const publicKey = await PublicKey.fromJSON(json.publicKey);
|
||||
const privateKey = await PrivateKey.fromJSON(json.privateKey, masterPassword, keyUsage);
|
||||
const date = new Date(json.date);
|
||||
const guid = json.guid;
|
||||
const isValid = json.isValid;
|
||||
return new KeyPair(publicKey, privateKey, keyUsage, date, guid, isValid);
|
||||
}
|
||||
constructor(publicKey: PublicKey, privateKey: PrivateKey, keyUsage = new KeyUsages(true), date = new Date(), guid: string = getGUID(), isValid: boolean = true) {
|
||||
this.privateKey = privateKey;
|
||||
this.publicKey = publicKey;
|
||||
this.date = date;
|
||||
this.keyUsage = keyUsage;
|
||||
this.guid = guid;
|
||||
this.isValid = isValid;
|
||||
}
|
||||
async toJSON(masterPassword: string) {
|
||||
return {
|
||||
publicKey: await this.publicKey.toJSON(),
|
||||
privateKey: await this.privateKey.toJSON(masterPassword, this.keyUsage),
|
||||
date: this.date.toISOString(),
|
||||
keyUsage: this.keyUsage.toJSON(),
|
||||
guid: this.guid,
|
||||
isValid: this.isValid
|
||||
}
|
||||
}
|
||||
setIsValid(isValid: boolean) {
|
||||
this.isValid = isValid;
|
||||
};
|
||||
}
|
||||
export class KeyUsages {
|
||||
isEncrypt;
|
||||
isSign;
|
||||
constructor(isEncrypt?: boolean, isSign?: boolean) {
|
||||
this.isEncrypt = !!isEncrypt;
|
||||
this.isSign = !!isSign;
|
||||
}
|
||||
static fromJSON(json: ReturnType<KeyUsages["toJSON"]>) {
|
||||
return new KeyUsages(json.isEncrypt, json.isSign);
|
||||
}
|
||||
toJSON() {
|
||||
return {
|
||||
isEncrypt: this.isEncrypt,
|
||||
isSign: this.isSign
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,128 @@
|
||||
import {
|
||||
type AesKeyGenLength,
|
||||
type AesType,
|
||||
aesTypes,
|
||||
type AlgorithmType,
|
||||
algorithmTypes,
|
||||
type DigestType,
|
||||
digestTypes, isAesJson, isEd25519Json,
|
||||
isRSAJson,
|
||||
type JSONAesGcmParams,
|
||||
type JSONKeyParams,
|
||||
type RsaJSONType,
|
||||
type RsaType
|
||||
} from "./key-types.ts";
|
||||
import {ab2base64, base642ui} from "../utils.ts";
|
||||
|
||||
export const getKeyParamsFromJson = (keyParamsJson: JSONKeyParams) => {
|
||||
if (isRSAJson(keyParamsJson)) {
|
||||
return new RsaImportParams(keyParamsJson.name, keyParamsJson.hash);
|
||||
}
|
||||
if (isEd25519Json(keyParamsJson)) {
|
||||
return new Ed25519ImportParams();
|
||||
}
|
||||
if (isAesJson(keyParamsJson)) {
|
||||
return new AesImportParams(keyParamsJson.name);
|
||||
}
|
||||
throw new Error("Unknown param type");
|
||||
};
|
||||
|
||||
|
||||
export class AlgorithmParams<TName extends AlgorithmType = AlgorithmType> {
|
||||
name: TName;
|
||||
constructor(name: TName) {
|
||||
this.name = name;
|
||||
}
|
||||
toJSON() {
|
||||
return {
|
||||
name: this.name
|
||||
};
|
||||
};
|
||||
fromJSON(json: {name: TName}) {
|
||||
this.name = json.name;
|
||||
}
|
||||
getImportParams() {
|
||||
return new AlgorithmParams(this.name);
|
||||
}
|
||||
}
|
||||
|
||||
export class RsaImportParams extends AlgorithmParams<RsaType> {
|
||||
hash;
|
||||
constructor(name: RsaType, hash: DigestType = digestTypes.SHA256) {
|
||||
super(name);
|
||||
this.hash = hash;
|
||||
}
|
||||
override toJSON() {
|
||||
return {
|
||||
name: this.name,
|
||||
hash: this.hash,
|
||||
}
|
||||
}
|
||||
override fromJSON(json: RsaJSONType) {
|
||||
this.name = json.name;
|
||||
this.hash = json.hash;
|
||||
}
|
||||
}
|
||||
|
||||
export class RSAKeyGenParams extends RsaImportParams {
|
||||
modulusLength;
|
||||
publicExponent;
|
||||
constructor(name: RsaType, hash: DigestType = digestTypes.SHA256, modulusLength = 2048, publicExponent = new Uint8Array([0x01, 0x00, 0x01])) {
|
||||
super(name, hash);
|
||||
this.modulusLength = modulusLength;
|
||||
this.publicExponent = publicExponent;
|
||||
}
|
||||
override getImportParams() {
|
||||
return new RsaImportParams(this.name, this.hash);
|
||||
}
|
||||
}
|
||||
export class Ed25519ImportParams extends AlgorithmParams<typeof algorithmTypes.ED25519> {
|
||||
constructor() {
|
||||
super(algorithmTypes.ED25519);
|
||||
}
|
||||
}
|
||||
|
||||
export class AesImportParams extends AlgorithmParams<AesType> {
|
||||
constructor(name: AesType) {
|
||||
super(name);
|
||||
}
|
||||
}
|
||||
|
||||
export class AesGcmParams {
|
||||
name = algorithmTypes.AES_GCM;
|
||||
iv: ArrayBuffer;
|
||||
constructor(iv: ArrayBuffer = new Uint8Array(12)) {
|
||||
this.iv = iv;
|
||||
}
|
||||
toJSON() {
|
||||
return {
|
||||
name: this.name,
|
||||
iv: ab2base64(this.iv)
|
||||
}
|
||||
};
|
||||
fromJSON(json: JSONAesGcmParams) {
|
||||
this.iv = base642ui(json.iv);
|
||||
};
|
||||
}
|
||||
|
||||
export class AesKeyGenParams extends AesImportParams {
|
||||
length: AesKeyGenLength;
|
||||
constructor(name: AesType, length: AesKeyGenLength) {
|
||||
super(name);
|
||||
this.length = length;
|
||||
}
|
||||
override getImportParams() {
|
||||
return new AesImportParams(this.name);
|
||||
}
|
||||
}
|
||||
export class AesGcmGenParams extends AesKeyGenParams {
|
||||
constructor() {
|
||||
super(aesTypes.AES_GCM, 256);
|
||||
}
|
||||
}
|
||||
export class Ed25519KeyGenParams extends Ed25519ImportParams {
|
||||
override getImportParams() {
|
||||
return new Ed25519ImportParams();
|
||||
}
|
||||
}
|
||||
|
||||
@ -0,0 +1,20 @@
|
||||
export const messageTypes = {
|
||||
GENERATE_KEYS: "GENERATE_KEYS",
|
||||
POPUP_IS_OPENED: "POPUP_IS_OPENED",
|
||||
WAIT_ENTER_PASSWORD: "WAIT_ENTER_PASSWORD",
|
||||
SELECT_SIGN_KEYS: "SELECT_SIGN_KEYS",
|
||||
SIGN_DATA: "SIGN_DATA",
|
||||
VERIFY_DATA: "VERIFY_DATA",
|
||||
ENCRYPT: "ENCRYPT",
|
||||
ENGINE_IS_EXIST: "ENGINE_IS_EXIST"
|
||||
} as const;
|
||||
|
||||
export const messageListeners = {
|
||||
background: "background",
|
||||
popup: "popup",
|
||||
} as const;
|
||||
|
||||
export const onlyofficeChannels = {
|
||||
onlyofficeExtensionChannel: "onlyoffice-sign-extension-channel",
|
||||
onlyofficeClientChannel: "onlyoffice-sign-client-channel",
|
||||
} as const;
|
||||
@ -0,0 +1,35 @@
|
||||
import {messageListeners, messageTypes} from "./message-const.ts";
|
||||
|
||||
|
||||
export type MessagesType = {type: typeof messageTypes[keyof typeof messageTypes]};
|
||||
|
||||
export const isMessages = (arg: unknown): arg is MessagesType => {
|
||||
return !!(arg && typeof arg === "object" && "type" in arg && typeof arg.type === "string" && arg.type in messageTypes);
|
||||
};
|
||||
|
||||
export type DispatchEventMessageType = {
|
||||
id?: number;
|
||||
data: MessagesType;
|
||||
}
|
||||
export type AnswerMainPageEventType = {
|
||||
id?: number;
|
||||
data: unknown;
|
||||
};
|
||||
type Listeners = typeof messageListeners[keyof typeof messageListeners];
|
||||
type ExtensionMessage<T extends Listeners = Listeners> = {
|
||||
data: MessagesType;
|
||||
listener: T;
|
||||
};
|
||||
export type BackgroundMessage = ExtensionMessage<typeof messageListeners.background>;
|
||||
export type PopupMessage = ExtensionMessage<typeof messageListeners.popup>;
|
||||
|
||||
const isExtensionMessageType = (arg: unknown): arg is ExtensionMessage => {
|
||||
return !!(arg && typeof arg === "object" && "data" in arg && isMessages(arg.data) && "listener" in arg && typeof arg.listener === "string");
|
||||
};
|
||||
export const isBackgroundMessageType = (arg: unknown): arg is BackgroundMessage => {
|
||||
return isExtensionMessageType(arg) && arg.listener === messageListeners.background;
|
||||
};
|
||||
|
||||
export const isPopupMessageType = (arg: unknown): arg is PopupMessage => {
|
||||
return isExtensionMessageType(arg) && arg.listener === messageListeners.popup;
|
||||
};
|
||||
@ -0,0 +1,29 @@
|
||||
// @ts-ignore
|
||||
import {StorageManager} from "../../../key-storage/key-storage.js";
|
||||
import browser from "webextension-polyfill";
|
||||
import type {JSONKeyPair} from "./keys/key-types.ts";
|
||||
|
||||
function ExtensionStorageManager() {
|
||||
StorageManager.call(this);
|
||||
}
|
||||
ExtensionStorageManager.prototype = Object.create(StorageManager);
|
||||
ExtensionStorageManager.prototype.constructor = ExtensionStorageManager;
|
||||
ExtensionStorageManager.prototype.getStorageKeys = function() {
|
||||
return browser.storage.local.get("keys").then(function(item) {
|
||||
if (item && Array.isArray(item.keys)) {
|
||||
return item.keys;
|
||||
}
|
||||
return [];
|
||||
});
|
||||
};
|
||||
ExtensionStorageManager.prototype.getMasterPassword = function() {
|
||||
return browser.storage.local.get("masterPassword").then(function(item) {
|
||||
return item.masterPassword ? item.masterPassword : null;
|
||||
});
|
||||
};
|
||||
ExtensionStorageManager.prototype.setStorageKeys = function(exportedKeys: JSONKeyPair[]) {
|
||||
return browser.storage.local.set({keys: exportedKeys});
|
||||
}
|
||||
ExtensionStorageManager.prototype.setMasterPasswordWithKeys = function(exportedKeys: JSONKeyPair[]) {
|
||||
return browser.storage.local.set({keys: exportedKeys});
|
||||
}
|
||||
@ -0,0 +1,42 @@
|
||||
export function ab2str(buf: ArrayBuffer) {
|
||||
return String.fromCharCode.apply(null, buf);
|
||||
}
|
||||
export function ab2base64(buf: ArrayBuffer) {
|
||||
const str = ab2str(buf);
|
||||
return btoa(str);
|
||||
}
|
||||
export function base642ui(base64: string) {
|
||||
const str = atob(base64);
|
||||
return str2ui(str);
|
||||
}
|
||||
export function str2ui(str: string) {
|
||||
const ui = new Uint8Array(str.length);
|
||||
for (let i = 0; i < str.length; i++) {
|
||||
ui[i] = str.charCodeAt(i);
|
||||
}
|
||||
return ui;
|
||||
}
|
||||
|
||||
export const selectBinary = (callback: (file: File) => void) => {
|
||||
const input = document.createElement("input");
|
||||
input.type = "file";
|
||||
input.accept = "application/octet-stream";
|
||||
input.addEventListener("change", (e) => {
|
||||
const target = e.target as HTMLInputElement;
|
||||
const file = target.files?.[0];
|
||||
if (file) {
|
||||
callback(file);
|
||||
}
|
||||
});
|
||||
input.click();
|
||||
};
|
||||
|
||||
export const downloadBinary = (data: Uint8Array) => {
|
||||
const blob = new Blob([data], {type: "application/octet-stream"});
|
||||
const url = URL.createObjectURL(blob);
|
||||
const link = document.createElement("a");
|
||||
link.href = url;
|
||||
link.download = `onlyoffice_keychain_${(new Date()).toISOString()}.bin`;
|
||||
link.click();
|
||||
URL.revokeObjectURL(url);
|
||||
}
|
||||
@ -0,0 +1,12 @@
|
||||
import {sendToBackground, sendToPage} from "./messenger.ts";
|
||||
import {messageTypes, onlyofficeChannels} from "../common/message-const.ts";
|
||||
import {
|
||||
type DispatchEventMessageType,
|
||||
} from "../common/message-types.ts";
|
||||
|
||||
window.addEventListener(onlyofficeChannels.onlyofficeExtensionChannel, (event: CustomEvent<DispatchEventMessageType>) => {
|
||||
sendToBackground(event.detail.data).then((response: unknown) => {
|
||||
sendToPage({id: event.detail.id, data: response});
|
||||
});
|
||||
});
|
||||
window.dispatchEvent(new CustomEvent<DispatchEventMessageType>(onlyofficeChannels.onlyofficeClientChannel, {detail: {data: {type: messageTypes.ENGINE_IS_EXIST}}}));
|
||||
@ -0,0 +1,22 @@
|
||||
import type {
|
||||
AnswerMainPageEventType,
|
||||
BackgroundMessage,
|
||||
MessagesType,
|
||||
PopupMessage
|
||||
} from "../common/message-types.ts";
|
||||
import browser from "webextension-polyfill";
|
||||
import {messageListeners, onlyofficeChannels} from "../common/message-const.ts";
|
||||
|
||||
export const sendToBackground = async (data: MessagesType) => {
|
||||
const backgroundData: BackgroundMessage = {data, listener: messageListeners.background};
|
||||
return browser.runtime.sendMessage(backgroundData);
|
||||
};
|
||||
|
||||
export const sendToPopup = async (data: MessagesType) => {
|
||||
const sendData: PopupMessage = {listener: messageListeners.popup, data};
|
||||
return browser.runtime.sendMessage(sendData);
|
||||
};
|
||||
|
||||
export const sendToPage = (data: AnswerMainPageEventType) => {
|
||||
window.dispatchEvent(new CustomEvent<AnswerMainPageEventType>(onlyofficeChannels.onlyofficeClientChannel, {detail: data}));
|
||||
};
|
||||
@ -0,0 +1,3 @@
|
||||
export function Loader() {
|
||||
return <div>Loading...</div>;
|
||||
}
|
||||
@ -0,0 +1,12 @@
|
||||
type PropsType = {
|
||||
name: string;
|
||||
labelText: string;
|
||||
onChange: (e: string) => void;
|
||||
}
|
||||
|
||||
export default function PasswordInput({onChange, name, labelText}: PropsType) {
|
||||
return <>
|
||||
<label htmlFor={name}>{labelText}</label>
|
||||
<input required={true} minLength={8} onChange={(e) => onChange(e.target.value)} type="password" name={name}/>
|
||||
</>;
|
||||
}
|
||||
@ -0,0 +1,9 @@
|
||||
import { StrictMode } from 'react'
|
||||
import { createRoot } from 'react-dom/client'
|
||||
import App from './pages/app/app.tsx'
|
||||
|
||||
createRoot(document.getElementById('root')!).render(
|
||||
<StrictMode>
|
||||
<App />
|
||||
</StrictMode>,
|
||||
)
|
||||
@ -0,0 +1,91 @@
|
||||
import {useState, useEffect} from 'react'
|
||||
import Login from "../login/login.tsx";
|
||||
import {getStorageMasterPassword, initCheckOpenedPopup, setStorageMasterPassword} from "../../../utils/utils.ts";
|
||||
import {useTaskManager} from "../../../task-manager/task-manager.ts";
|
||||
import {Dashboard} from "../dashboard/dashboard.tsx";
|
||||
// @ts-ignore
|
||||
import {StorageManager} from "../storage-manager/storage-manager.ts";
|
||||
import {KeyPair} from "../../../../common/keys/keys.ts";
|
||||
import {Ed25519KeyGenParams} from "../../../../common/keys/params.ts";
|
||||
import {ChangePasswordPage} from "../change-password/change-password.tsx";
|
||||
import {locations} from "../../../utils/locations.ts";
|
||||
import SelectKeysPage from "../select-keys/select-keys.tsx";
|
||||
import {messageTypes} from "../../../../common/message-const.ts";
|
||||
const storageManager = new StorageManager();
|
||||
const generateKeys = async () => {
|
||||
const key = await storageManager.generateKeys(new Ed25519KeyGenParams());
|
||||
if (key) {
|
||||
await storageManager.addNewKeys([key]);
|
||||
return key;
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
export default function App() {
|
||||
const [localMasterPassword, setLocalMasterPassword] = useState<string | null>(null);
|
||||
const [keys, setKeys] = useState<KeyPair[]>([]);
|
||||
const {location, setLocation, promiseRef} = useTaskManager();
|
||||
useEffect(() => {
|
||||
(async () => {
|
||||
const storageMasterPassword = await getStorageMasterPassword();
|
||||
setLocalMasterPassword(storageMasterPassword);
|
||||
await storageManager.loadKeysFromStorage();
|
||||
setKeys(storageManager.getValidKeys());
|
||||
})();
|
||||
initCheckOpenedPopup();
|
||||
}, []);
|
||||
|
||||
const handleSelectKey = (e: React.MouseEvent<HTMLLIElement>) => {
|
||||
if (promiseRef.current) {
|
||||
const guid = e.currentTarget.dataset.guid;
|
||||
if (promiseRef.current.messageId === messageTypes.SELECT_SIGN_KEYS && guid) {
|
||||
promiseRef.current.resolve(guid);
|
||||
} else {
|
||||
promiseRef.current.reject("Another task was expected to resolve");
|
||||
}
|
||||
}
|
||||
promiseRef.current = null;
|
||||
window.close();
|
||||
};
|
||||
|
||||
const handleSubmitMasterPassword = (masterPassword: string) => {
|
||||
setStorageMasterPassword(masterPassword);
|
||||
setLocalMasterPassword(masterPassword);
|
||||
};
|
||||
|
||||
const handleSubmitNewMasterPassword = async (newMasterPassword: string) => {
|
||||
await storageManager.changeMasterPassword(newMasterPassword);
|
||||
setLocalMasterPassword(newMasterPassword);
|
||||
setLocation("");
|
||||
};
|
||||
|
||||
const handleGenerateKeys = async () => {
|
||||
const keyPair = await generateKeys();
|
||||
if (keyPair) {
|
||||
setKeys(storageManager.getValidKeys());
|
||||
}
|
||||
};
|
||||
const handleExportKeys = () => {
|
||||
storageManager.exportKeys();
|
||||
}
|
||||
const handleImportKeys = async () => {
|
||||
storageManager.importKeys(() => {setKeys(storageManager.getValidKeys())});
|
||||
}
|
||||
|
||||
const handleDeprecateKey = async (key: KeyPair) => {
|
||||
await storageManager.deprecateKey(key);
|
||||
setKeys(storageManager.getValidKeys());
|
||||
};
|
||||
const isLoggedOut = localMasterPassword === null;
|
||||
return (
|
||||
<>
|
||||
{
|
||||
isLoggedOut ?
|
||||
<Login handleSubmitMasterPassword={handleSubmitMasterPassword} /> :
|
||||
location === locations.changeMasterPassword ? <ChangePasswordPage handleSubmitNewMasterPassword={handleSubmitNewMasterPassword} /> :
|
||||
location === locations.selectKeys ? <SelectKeysPage keys={keys} handleKey={handleSelectKey}/> :
|
||||
<Dashboard handleDeprecateKey={handleDeprecateKey} changeLocation={setLocation} handleImportKeys={handleImportKeys} handleExportKeys={handleExportKeys} handleGenerateSignKeys={handleGenerateKeys} keys={keys} masterPassword={localMasterPassword}/>
|
||||
}
|
||||
</>
|
||||
)
|
||||
}
|
||||
@ -0,0 +1,31 @@
|
||||
import PasswordInput from "../../components/password-input/password-input.tsx";
|
||||
import {type FormEvent, useState} from "react";
|
||||
import {compareWithOldMasterPassword} from "../../../utils/utils.ts";
|
||||
|
||||
type ChangePasswordPageProps = {
|
||||
handleSubmitNewMasterPassword: (newMasterPassword: string) => void;
|
||||
};
|
||||
export function ChangePasswordPage({handleSubmitNewMasterPassword}: ChangePasswordPageProps) {
|
||||
const [oldMasterPassword, setOldMasterPassword] = useState("");
|
||||
const [newMasterPassword, setNewMasterPassword] = useState("");
|
||||
const [confirmMasterPassword, setConfirmMasterPassword] = useState("");
|
||||
const [error, setError] = useState("");
|
||||
const onSubmit = async (e: FormEvent<HTMLFormElement>) => {
|
||||
e.preventDefault();
|
||||
const isEqualsOldPassword = await compareWithOldMasterPassword(oldMasterPassword);
|
||||
if (!isEqualsOldPassword) {
|
||||
setError("Check if you entered your old password correctly.");
|
||||
} else if (newMasterPassword !== confirmMasterPassword) {
|
||||
setError("The new passwords do not match.");
|
||||
} else {
|
||||
handleSubmitNewMasterPassword(newMasterPassword);
|
||||
}
|
||||
};
|
||||
return <form onSubmit={onSubmit}>
|
||||
<PasswordInput name={"old-password"} labelText={"Enter old master password"} onChange={setOldMasterPassword}/>
|
||||
<PasswordInput name={"new-password"} labelText={"Enter new master password"} onChange={setNewMasterPassword}/>
|
||||
<PasswordInput name={"confirm-new-password"} labelText={"Confirm new master password"} onChange={setConfirmMasterPassword}/>
|
||||
{error && <div>{error}</div>}
|
||||
<button type={"submit"}>Confirm</button>
|
||||
</form>
|
||||
}
|
||||
@ -0,0 +1,8 @@
|
||||
|
||||
.wrapper {
|
||||
display: flex;
|
||||
justify-content: space-between;
|
||||
:hover {
|
||||
background-color: rgba(240 , 240, 240, 255);
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,29 @@
|
||||
import type {KeyPair} from "../../../../common/keys/keys.ts";
|
||||
import {locations} from "../../../utils/locations.ts";
|
||||
import css from "./dashboard.module.css";
|
||||
|
||||
type DashboardProps = {
|
||||
masterPassword: string;
|
||||
keys: KeyPair[];
|
||||
handleGenerateSignKeys: () => Promise<void>
|
||||
handleImportKeys: () => void;
|
||||
handleExportKeys: () => void;
|
||||
handleDeprecateKey: (key: KeyPair) => void;
|
||||
changeLocation: (location: string) => void
|
||||
};
|
||||
|
||||
export function Dashboard({keys, handleDeprecateKey, masterPassword, handleGenerateSignKeys, handleImportKeys, handleExportKeys, changeLocation}: DashboardProps) {
|
||||
return <div>
|
||||
<div>Hello, your master password: {masterPassword}</div>
|
||||
<button onClick={() => {changeLocation(locations.changeMasterPassword)}}>Change password</button>
|
||||
<button onClick={handleExportKeys}>Export keys</button>
|
||||
<button onClick={handleImportKeys}>Import keys</button>
|
||||
<button onClick={handleGenerateSignKeys}>Generate sign keys</button>
|
||||
<div>Generated sign keys</div>
|
||||
{keys.map((key, idx) =>
|
||||
<div key={idx} className={css.wrapper}>
|
||||
<div>{key.guid}</div>
|
||||
<div onClick={() => handleDeprecateKey(key)}>×</div>
|
||||
</div>)}
|
||||
</div>
|
||||
}
|
||||
@ -0,0 +1,25 @@
|
||||
import {type FormEvent, useState} from "react";
|
||||
import PasswordInput from "../../components/password-input/password-input.tsx";
|
||||
|
||||
type LoginProps = {
|
||||
handleSubmitMasterPassword: (password: string) => void;
|
||||
};
|
||||
export default function Login({handleSubmitMasterPassword}: LoginProps) {
|
||||
const [masterPassword, setMasterPassword] = useState("");
|
||||
const [confirmMasterPassword, setConfirmMasterPassword] = useState("");
|
||||
const [error, setError] = useState("");
|
||||
const handleSubmit = (e: FormEvent<HTMLFormElement>) => {
|
||||
e.preventDefault();
|
||||
if (masterPassword === confirmMasterPassword) {
|
||||
handleSubmitMasterPassword(masterPassword);
|
||||
} else {
|
||||
setError("The passwords don't match");
|
||||
}
|
||||
};
|
||||
return <form onSubmit={handleSubmit}>
|
||||
<PasswordInput name={"login-password"} labelText={"Enter new master password"} onChange={setMasterPassword}/>
|
||||
<PasswordInput name={"login-confirm-password"} labelText={"Confirm new master password"} onChange={setConfirmMasterPassword}/>
|
||||
{error && <div>{error}</div>}
|
||||
<button type={"submit"}>Confirm</button>
|
||||
</form>
|
||||
};
|
||||
@ -0,0 +1,6 @@
|
||||
.key {
|
||||
cursor: pointer;
|
||||
&:hover {
|
||||
background-color: rgba(0, 0, 0, 10%);
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,16 @@
|
||||
import type {KeyPair} from "../../../../common/keys/keys.ts";
|
||||
import type {MouseEventHandler} from "react";
|
||||
import css from "./select-keys.module.css";
|
||||
|
||||
type TSelectKeysProps = {
|
||||
keys: KeyPair[];
|
||||
handleKey: MouseEventHandler<HTMLLIElement>;
|
||||
};
|
||||
|
||||
export default function SelectKeysPage({keys, handleKey}: TSelectKeysProps) {
|
||||
return <ul>
|
||||
{keys.map((key) => <li className={css.key} key={key.guid} data-guid={key.guid} onClick={handleKey}>
|
||||
{key.guid}
|
||||
</li>)}
|
||||
</ul>
|
||||
};
|
||||
@ -0,0 +1,12 @@
|
||||
<!doctype html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||
<title>Vite + React + TS</title>
|
||||
</head>
|
||||
<body>
|
||||
<div id="root"></div>
|
||||
<script type="module" src="/src/popup/App/main.tsx"></script>
|
||||
</body>
|
||||
</html>
|
||||
@ -0,0 +1,46 @@
|
||||
import browser from "webextension-polyfill";
|
||||
import {isPopupMessageType} from "../../common/message-types.ts";
|
||||
import {messageTypes} from "../../common/message-const.ts";
|
||||
import {isStorageLogged, selectSignKeys} from "./tasks.ts";
|
||||
import {useEffect, useRef, useState} from "react";
|
||||
|
||||
type TSelectKeysPromise = {
|
||||
resolve: (guid: string) => void;
|
||||
messageId: typeof messageTypes.SELECT_SIGN_KEYS
|
||||
};
|
||||
type TPromiseArgs = {
|
||||
reject: (error: string) => void;
|
||||
} & (TSelectKeysPromise);
|
||||
export type TPromiseRef = (newResolve: TPromiseArgs["resolve"], newReject: TPromiseArgs["reject"], id: TPromiseArgs["messageId"]) => void;
|
||||
export const useTaskManager = () => {
|
||||
const [location, setLocation] = useState("");
|
||||
const promiseRef = useRef<TPromiseArgs | null>(null);
|
||||
const setPromiseRef: TPromiseRef = (newResolve, newReject, id) => {
|
||||
if (promiseRef.current) {
|
||||
promiseRef.current.reject("Another task has been selected");
|
||||
}
|
||||
promiseRef.current = {resolve: newResolve, reject: newReject, messageId: id};
|
||||
}
|
||||
useEffect(() => {
|
||||
const listener = (message: unknown) => {
|
||||
if (!isPopupMessageType(message)) {
|
||||
return false;
|
||||
}
|
||||
const data = message.data;
|
||||
switch (data.type) {
|
||||
case messageTypes.WAIT_ENTER_PASSWORD: {
|
||||
return isStorageLogged();
|
||||
}
|
||||
case messageTypes.SELECT_SIGN_KEYS: {
|
||||
return selectSignKeys(setLocation, setPromiseRef);
|
||||
}
|
||||
}
|
||||
return false;
|
||||
};
|
||||
browser.runtime.onMessage.addListener(listener);
|
||||
return () => {
|
||||
browser.runtime.onMessage.removeListener(listener);
|
||||
}
|
||||
}, []);
|
||||
return {location, setLocation, promiseRef};
|
||||
};
|
||||
@ -0,0 +1,16 @@
|
||||
import {checkIsStorageLogged} from "../utils/utils.ts";
|
||||
import {locations} from "../utils/locations.ts";
|
||||
import {messageTypes} from "../../common/message-const.ts";
|
||||
import type {TPromiseRef} from "./task-manager.ts";
|
||||
|
||||
export const isStorageLogged = async () => {
|
||||
await checkIsStorageLogged();
|
||||
return true;
|
||||
};
|
||||
|
||||
export const selectSignKeys = (setNavigation: (location: string) => void, setPromiseRef: TPromiseRef): Promise<string> => {
|
||||
setNavigation(locations.selectKeys);
|
||||
return new Promise((resolve, reject) => {
|
||||
setPromiseRef(resolve, reject, messageTypes.SELECT_SIGN_KEYS);
|
||||
});
|
||||
}
|
||||
@ -0,0 +1,4 @@
|
||||
export const locations = {
|
||||
changeMasterPassword: "changeMasterPassword",
|
||||
selectKeys: "selectKeys",
|
||||
} as const;
|
||||
@ -0,0 +1,38 @@
|
||||
import browser from "webextension-polyfill";
|
||||
export const getStorageMasterPassword = async () => {
|
||||
const masterPassword = await browser.storage.local.get('masterPassword');
|
||||
if (masterPassword && typeof masterPassword.masterPassword === 'string') {
|
||||
return masterPassword.masterPassword;
|
||||
}
|
||||
return null;
|
||||
}
|
||||
export const compareWithOldMasterPassword = async (checkPassword: string) => {
|
||||
const masterPassword = await getStorageMasterPassword();
|
||||
return masterPassword === checkPassword;
|
||||
}
|
||||
export const setStorageMasterPassword = (masterPassword: string) => {
|
||||
browser.storage.local.set({masterPassword});
|
||||
}
|
||||
|
||||
export const checkIsStorageLogged = async () => {
|
||||
const masterPassword = await getStorageMasterPassword();
|
||||
if (masterPassword) {
|
||||
return true;
|
||||
}
|
||||
return getChangedProperty("masterPassword");
|
||||
};
|
||||
const getChangedProperty = (key: string) => {
|
||||
return new Promise((resolve) => {
|
||||
browser.storage.local.onChanged.addListener(function handler(change) {
|
||||
if (change[key]) {
|
||||
browser.storage.local.onChanged.removeListener(handler);
|
||||
resolve(change[key].newValue);
|
||||
}
|
||||
});
|
||||
});
|
||||
};
|
||||
|
||||
export const initCheckOpenedPopup = () => {
|
||||
const port = browser.runtime.connect({ name: "popup" });
|
||||
port.postMessage({ opened: true });
|
||||
};
|
||||
7
DesktopEditor/xmlsec/src/wasm/extension/extension2/src/types.d.ts
vendored
Normal file
@ -0,0 +1,7 @@
|
||||
export {};
|
||||
|
||||
declare global {
|
||||
interface WindowEventMap {
|
||||
"onlyoffice-sign-extension-channel": CustomEvent;
|
||||
}
|
||||
}
|
||||
1
DesktopEditor/xmlsec/src/wasm/extension/extension2/src/vite-env.d.ts
vendored
Normal file
@ -0,0 +1 @@
|
||||
/// <reference types="vite/client" />
|
||||
@ -0,0 +1,29 @@
|
||||
{
|
||||
"compilerOptions": {
|
||||
"tsBuildInfoFile": "./node_modules/.tmp/tsconfig.app.tsbuildinfo",
|
||||
"target": "ES2022",
|
||||
"useDefineForClassFields": true,
|
||||
"lib": ["ES2022", "DOM", "DOM.Iterable"],
|
||||
"module": "ESNext",
|
||||
"skipLibCheck": true,
|
||||
|
||||
/* Bundler mode */
|
||||
"moduleResolution": "bundler",
|
||||
"allowImportingTsExtensions": true,
|
||||
"verbatimModuleSyntax": true,
|
||||
"moduleDetection": "force",
|
||||
"noEmit": true,
|
||||
"jsx": "react-jsx",
|
||||
|
||||
/* Linting */
|
||||
"strict": true,
|
||||
"noUnusedLocals": true,
|
||||
"noUnusedParameters": true,
|
||||
"erasableSyntaxOnly": true,
|
||||
"noFallthroughCasesInSwitch": true,
|
||||
"noUncheckedSideEffectImports": true,
|
||||
"noImplicitOverride": true,
|
||||
"resolveJsonModule": true
|
||||
},
|
||||
"include": ["src"]
|
||||
}
|
||||
@ -0,0 +1,7 @@
|
||||
{
|
||||
"files": [],
|
||||
"references": [
|
||||
{ "path": "./tsconfig.app.json" },
|
||||
{ "path": "./tsconfig.node.json" }
|
||||
]
|
||||
}
|
||||
@ -0,0 +1,25 @@
|
||||
{
|
||||
"compilerOptions": {
|
||||
"tsBuildInfoFile": "./node_modules/.tmp/tsconfig.node.tsbuildinfo",
|
||||
"target": "ES2023",
|
||||
"lib": ["ES2023"],
|
||||
"module": "ESNext",
|
||||
"skipLibCheck": true,
|
||||
|
||||
/* Bundler mode */
|
||||
"moduleResolution": "bundler",
|
||||
"allowImportingTsExtensions": true,
|
||||
"verbatimModuleSyntax": true,
|
||||
"moduleDetection": "force",
|
||||
"noEmit": true,
|
||||
|
||||
/* Linting */
|
||||
"strict": true,
|
||||
"noUnusedLocals": true,
|
||||
"noUnusedParameters": true,
|
||||
"erasableSyntaxOnly": true,
|
||||
"noFallthroughCasesInSwitch": true,
|
||||
"noUncheckedSideEffectImports": true
|
||||
},
|
||||
"include": ["vite.config.ts"]
|
||||
}
|
||||
@ -0,0 +1,12 @@
|
||||
import { defineConfig } from 'vite'
|
||||
import react from '@vitejs/plugin-react'
|
||||
import {crx} from "@crxjs/vite-plugin";
|
||||
import manifest from "./manifest.config.ts";
|
||||
|
||||
// https://vite.dev/config/
|
||||
export default defineConfig({
|
||||
plugins: [crx({ manifest }), react()],
|
||||
build: {
|
||||
sourcemap: 'inline'
|
||||
}
|
||||
})
|
||||
@ -0,0 +1,11 @@
|
||||
# Crypto library
|
||||
|
||||
## Information for development
|
||||
|
||||
1. Run ```npm run dev``` in the library directory to develop the library in watch mode.
|
||||
2. Run ```npm link``` in the library directory.
|
||||
3. Run ```npm link crypto-library``` in the directory where the library is required as a npm module.
|
||||
|
||||
## Information for build
|
||||
|
||||
Run ```npm run build``` in the library directory to build the library as ```es``` and ```iife``` modules.
|
||||
1056
DesktopEditor/xmlsec/src/wasm/extension/key-storage/package-lock.json
generated
Normal file
@ -0,0 +1,14 @@
|
||||
{
|
||||
"name": "key-storage",
|
||||
"version": "1.0.0",
|
||||
"main": "dist/key-storage.es.js",
|
||||
"files": ["dist"],
|
||||
"devDependencies": {
|
||||
"vite": "^7.3.0"
|
||||
},
|
||||
"scripts": {
|
||||
"dev": "vite build --watch",
|
||||
"build": "vite build",
|
||||
"preview": "vite preview"
|
||||
}
|
||||
}
|
||||
@ -0,0 +1,142 @@
|
||||
import {EncryptData, WebEncryptKeyPair, WebSignKeyPair, WebSymmetricKey} from "./keys";
|
||||
import {AesGcmKeyGenParams, PBKDF2Params} from "./params";
|
||||
import {c_oAscExportKeyFormat} from "./defines";
|
||||
import {BinaryWriter} from "./serialize/writer";
|
||||
import {initClass} from "./utils";
|
||||
|
||||
function CCryptoBase() {
|
||||
|
||||
}
|
||||
CCryptoBase.prototype.sign = function(key, data) {};
|
||||
CCryptoBase.prototype.digest = function(algorithm, data) {};
|
||||
CCryptoBase.prototype.verify = function(key, signature, data) {};
|
||||
CCryptoBase.prototype.decrypt = function(key, data) {};
|
||||
CCryptoBase.prototype.encrypt = function(key, data) {};
|
||||
CCryptoBase.prototype.generateKey = function(params) {};
|
||||
CCryptoBase.prototype.getRandomValues = function(length) {};
|
||||
CCryptoBase.prototype.randomUUID = function() {};
|
||||
CCryptoBase.prototype.initKey = function(key, masterPassword) {return Promise.resolve()};
|
||||
CCryptoBase.prototype.getAesKey = function(key, pbkdfParams) {return Promise.resolve()};
|
||||
|
||||
function CWebCrypto() {
|
||||
CCryptoBase.call(this);
|
||||
this.crypto = self.crypto;
|
||||
this.subtle = this.crypto.subtle;
|
||||
}
|
||||
initClass(CWebCrypto, CCryptoBase);
|
||||
CWebCrypto.prototype.getRandomValues = function(length) {
|
||||
const ui = new Uint8Array(length);
|
||||
return this.crypto.getRandomValues(ui);
|
||||
}
|
||||
CWebCrypto.prototype.getAesKey = function(masterPassword, pbkdfParams) {
|
||||
const oThis = this;
|
||||
const aesKeyGenParams = new AesGcmKeyGenParams();
|
||||
return this.subtle.importKey(
|
||||
'raw',
|
||||
masterPassword,
|
||||
{ name: 'PBKDF2' },
|
||||
false,
|
||||
['deriveKey']
|
||||
).then(function(pwKey) {
|
||||
return oThis.subtle.deriveKey(
|
||||
pbkdfParams.getCryptoParams(),
|
||||
pwKey,
|
||||
aesKeyGenParams.getKeyGenCryptoParams(),
|
||||
false,
|
||||
['encrypt', 'decrypt']
|
||||
);
|
||||
}).then(function(aesKey) {
|
||||
return WebSymmetricKey.fromCryptoKey(aesKey, aesKeyGenParams.getImportParams());
|
||||
});
|
||||
};
|
||||
CWebCrypto.prototype.sign = function(key, data) {
|
||||
const oThis = this;
|
||||
const cryptoKey = key.getCryptoKey();
|
||||
const params = key.getCryptoParams();
|
||||
return oThis.subtle.sign(cryptoKey, cryptoKey, data);
|
||||
}
|
||||
CWebCrypto.prototype.digest = function(algorithm, data) {
|
||||
return this.subtle.digest(algorithm, data);
|
||||
}
|
||||
CWebCrypto.prototype.verify = function(key, signature, data) {
|
||||
const oThis = this;
|
||||
const cryptoKey = key.getCryptoKey();
|
||||
return oThis.subtle.verify(key.params, cryptoKey, signature, data);
|
||||
}
|
||||
CWebCrypto.prototype.decrypt = function(key, data) {
|
||||
const oThis = this;
|
||||
const cryptoKey = key.getCryptoKey();
|
||||
const encryptParams = data.getEncryptParams();
|
||||
const algorithm = encryptParams.getCryptoParams();
|
||||
return oThis.subtle.decrypt(algorithm, cryptoKey, data.getEncryptData()).then(function(data) {
|
||||
return new Uint8Array(data);
|
||||
});
|
||||
}
|
||||
CWebCrypto.prototype.encrypt = function(key, data) {
|
||||
const cryptoKey = key.getCryptoKey();
|
||||
const encryptParams = key.getEncryptParams();
|
||||
const algorithm = encryptParams.getCryptoParams();
|
||||
return this.subtle.encrypt(algorithm, cryptoKey, data).then(function (encryptedData) {
|
||||
const encryptData = new EncryptData(encryptedData, encryptParams);
|
||||
return encryptData.export();
|
||||
});
|
||||
}
|
||||
CWebCrypto.prototype.exportKey = function(key) {
|
||||
const cryptoKey = key.getCryptoKey();
|
||||
const format = key.getCryptoFormat();
|
||||
return this.subtle.exportKey(format, cryptoKey);
|
||||
}
|
||||
CWebCrypto.prototype.generateKey = function(params, aesKey) {
|
||||
const oThis = this;
|
||||
const cryptoParams = params.getKeyGenCryptoParams();
|
||||
const cryptoUsages = params.getCryptoUsages();
|
||||
let saveCryptoKey;
|
||||
return this.subtle.generateKey(cryptoParams, true, cryptoUsages).then(function(cryptoKey) {
|
||||
saveCryptoKey = cryptoKey;
|
||||
if (cryptoKey.privateKey && cryptoKey.publicKey) {
|
||||
const publicKey = oThis.subtle.exportKey(c_oAscExportKeyFormat.spki, cryptoKey.publicKey);
|
||||
const privateKey = oThis.subtle.exportKey(c_oAscExportKeyFormat.pkcs8, cryptoKey.privateKey).then(function(data) {
|
||||
return aesKey.encrypt(data);
|
||||
});
|
||||
return Promise.all([publicKey, privateKey]);
|
||||
}
|
||||
return oThis.subtle.exportKey(c_oAscExportKeyFormat.raw, cryptoKey).then(function (data) {
|
||||
return aesKey.encrypt(data);
|
||||
});
|
||||
}).then(function(exportedKeys) {
|
||||
const importParams = params.getImportParams();
|
||||
if (Array.isArray(exportedKeys)) {
|
||||
const publicKeyBuffer = exportedKeys[0];
|
||||
const privateKeyBuffer = exportedKeys[1];
|
||||
if (params.isSign()) {
|
||||
return WebSignKeyPair.fromWebCrypto(publicKeyBuffer, saveCryptoKey.publicKey, privateKeyBuffer, saveCryptoKey.privateKey, importParams);
|
||||
}
|
||||
return WebEncryptKeyPair.fromWebCrypto(publicKeyBuffer, saveCryptoKey.publicKey, privateKeyBuffer, saveCryptoKey.privateKey, importParams);
|
||||
} else {
|
||||
return WebSymmetricKey.fromWebCrypto(exportedKeys, saveCryptoKey, importParams);
|
||||
}
|
||||
});
|
||||
};
|
||||
|
||||
CWebCrypto.prototype.randomUUID = function() {
|
||||
return this.crypto.randomUUID();
|
||||
}
|
||||
CWebCrypto.prototype.initKey = function (key, aesKey) {
|
||||
const binaryKey = key.getBinaryKey();
|
||||
const oThis = this;
|
||||
let binaryKeyPromise;
|
||||
if (aesKey) {
|
||||
binaryKeyPromise = aesKey.decrypt(binaryKey);
|
||||
} else {
|
||||
binaryKeyPromise = Promise.resolve(binaryKey);
|
||||
}
|
||||
return binaryKeyPromise.then(function(binaryCryptoData) {
|
||||
return oThis.subtle.importKey(key.getImportFormat(), binaryCryptoData, key.getImportCryptoParams(), true, key.getCryptoUsages());
|
||||
}).then(function (cryptoKey) {
|
||||
key.setCryptoKey(cryptoKey);
|
||||
});
|
||||
};
|
||||
|
||||
export function getCrypto() {
|
||||
return new CWebCrypto();
|
||||
}
|
||||
@ -0,0 +1,45 @@
|
||||
export const c_oAscDigestType = {
|
||||
SHA1: 1,
|
||||
SHA256: 2,
|
||||
SHA384: 3,
|
||||
SHA512: 4
|
||||
};
|
||||
|
||||
export const c_oAscCryptoDigestType = {};
|
||||
c_oAscCryptoDigestType[c_oAscDigestType.SHA1] = "SHA-1";
|
||||
c_oAscCryptoDigestType[c_oAscDigestType.SHA256] = "SHA-256";
|
||||
c_oAscCryptoDigestType[c_oAscDigestType.SHA384] = "SHA-384";
|
||||
c_oAscCryptoDigestType[c_oAscDigestType.SHA512] = "SHA-512";
|
||||
|
||||
export const c_oAscExportKeyFormat = {
|
||||
pkcs8: "pkcs8",
|
||||
spki: "spki",
|
||||
raw: "raw"
|
||||
};
|
||||
|
||||
export const c_oAscKeyStorageType = {
|
||||
NoType: 0,
|
||||
WebSymmetricKey: 1,
|
||||
WebSignKeyPair: 2,
|
||||
WebEncryptKeyPair: 3,
|
||||
Ed25519ImportParams: 6,
|
||||
EncryptData: 7,
|
||||
RSAOAEPImportParams: 8,
|
||||
RSAOAEPKeyGenParams: 9,
|
||||
Ed25519KeyGenParams: 10,
|
||||
AesGCMCryptoParams: 11,
|
||||
AesGCMKeyGenParams: 12,
|
||||
PBKDF2Params: 14,
|
||||
WebPrivateSignKey: 15,
|
||||
WebPrivateEncryptKey: 16,
|
||||
WebPublicSignKey: 17,
|
||||
WebPublicEncryptKey: 18,
|
||||
RsaOAEPCryptoParams: 19
|
||||
};
|
||||
|
||||
export const c_oAscCryptoRsaType = {};
|
||||
c_oAscCryptoRsaType[c_oAscKeyStorageType.RSAOAEPKeyGenParams] = "RSA-OAEP";
|
||||
c_oAscCryptoRsaType[c_oAscKeyStorageType.RSAOAEPImportParams] = "RSA-OAEP";
|
||||
|
||||
export const c_oAscCryptoAesType = {};
|
||||
c_oAscCryptoAesType[c_oAscKeyStorageType.AesGCMKeyGenParams] = "AES-GCM";
|
||||
@ -0,0 +1,34 @@
|
||||
import {c_oAscKeyStorageType} from "./defines";
|
||||
import {
|
||||
EncryptData,
|
||||
WebEncryptKeyPair, WebPrivateEncryptKey,
|
||||
WebPrivateSignKey, WebPublicEncryptKey,
|
||||
WebPublicSignKey,
|
||||
WebSignKeyPair,
|
||||
WebSymmetricKey
|
||||
} from "./keys";
|
||||
import {
|
||||
AesGcmCryptoParams, AesGcmKeyGenParams,
|
||||
Ed25519ImportParams,
|
||||
Ed25519KeyGenParams, PBKDF2Params, RsaOAEPCryptoParams,
|
||||
RsaOAEPImportParams,
|
||||
RsaOAEPKeyGenParams
|
||||
} from "./params";
|
||||
|
||||
export const c_oAscObjectFactory = {};
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebSymmetricKey] = WebSymmetricKey;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebSignKeyPair] = WebSignKeyPair;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebEncryptKeyPair] = WebEncryptKeyPair;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.Ed25519ImportParams] = Ed25519ImportParams;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.EncryptData] = EncryptData;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.RSAOAEPImportParams] = RsaOAEPImportParams;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.RSAOAEPKeyGenParams] = RsaOAEPKeyGenParams;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.Ed25519KeyGenParams] = Ed25519KeyGenParams;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.AesGCMCryptoParams] = AesGcmCryptoParams;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.AesGCMKeyGenParams] = AesGcmKeyGenParams;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.PBKDF2Params] = PBKDF2Params;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebPrivateSignKey] = WebPrivateSignKey;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebPrivateEncryptKey] = WebPrivateEncryptKey;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebPublicSignKey] = WebPublicSignKey;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.WebPublicEncryptKey] = WebPublicEncryptKey;
|
||||
c_oAscObjectFactory[c_oAscKeyStorageType.RsaOAEPCryptoParams] = RsaOAEPCryptoParams;
|
||||