
Security News
Software Engineering Daily Podcast: Feross on AI, Open Source, and Supply Chain Risk
Socket CEO Feross Aboukhadijeh joins Software Engineering Daily to discuss modern software supply chain attacks and rising AI-driven security risks.
webview-crypto-react
Advanced tools
This repo provides some helper tools to run the Web Cryptography API in a WebView.
It is used in
react-native-webview-crypto,
nativescript-webview-crypto, and
nativescript-angular-webview-crypto. It is not meant to be used directly, but simply serves as a common building
block for those libraries.
The Web Cryptography API is implemented in all major browsers and provides performant and secure way of doing client side encryption in JavaScript. However it is not supported in NativeScript or React Native, which limits them from using Javascript libraries that depend on Web Crypto.
Luckily, the iOS and Android browser engines do support this API. We can use their implementations by creating a WebView and communicating with it asynchronously.
We provide two entrypoints in this repo.
MainWorker is used in your main thread. It communicates to the WebView
asynchronously with string messages, providing a crypto attribute
that fulfills the Crypto
interface. If you set this to be globally defined, all applications that depend
on window.crypto will work transperently.
import {MainWorker} from "webview-crypto";
function sendToWebView(message: string): void {
// sends `message` to the webview
}
var mw = new MainWorker(sendToWebView); // optional second argument for debug on or off
// call `mw.onWebViewMessage` whenever you get a message from the WebView
onWebViewMessage(mv.onWebViewMessage.bind(mv));
mw.crypto.subtle.generateKey(
// whatever
)
window.crypto = mw.crypto;
WebViewWorkerSource is a string that contains the source defining
a WebViewWorker constructor that should be used in your WebView.
After loading that Javascript in the WebView, initialize
WebViewWorker so that it can communicate with the main thread and do the
work of executing the cryptography.
function sendToMain(message: string): void {
// send `message` to the main thread
}
var wvw = new WebViewWorker(sendToMain);
// call `wvw.onMainMessage` whenever you get a message from the main thread
onMainMessage(wvw.onMainMessage.bind(wvw));
We have some unit tests for basic behavior here.
Run npm run test:local to run them in a local browser. You also need to run
npm run build:watch to recompute the webViewWorkerString injected as needed.
In Travis CI, they run on iOS, Android, and Chrome through SauceLabs.
While these tests do help catch some bugs, they do not provide any strong reassurance that this library will work in React Native and Typescript. That's because on those platforms, half the code is running in a WebView and the other half in their native JavaScript engine, which is either JavaScriptCore or V8. I haven't come up with a way to test this in an automated fashion.
So in addition to local unit tests, all code changes that might break something should be tested against the example repos (React Native and NativeScript) on both iOS and Android.
I welcome suggestions on improving this process and making it more automated.
While this attempts to as stick to the Web Cryptography API as possible, this is impossible in a few situations due to the differing browser implementations.
This library is limited by the mobile browser's support. On iOS, the WebView's use WebKit, which has limited and incomplete support (example). If something isn't working, that might be why. Try it on Safari and see if it works there.
getRandomValuesSince this uses an asynchronous bridge to execute the crypto logic it
can't quite execute crypto.getRandomValues correctly, because that method
returns a value synchronously. It is simply impossible (as far as I know,
please let me know if there any ways to get around this) to wait for the
bridge to respond asynchronously before returning a value.
Instead, we add a _promise attribute to the TypedArray you passed in. This resolves
when the TypedArray has been filled with random values.
Also, on all crypto.subtle methods that takes in
TypedArrays, we will automatically wait for it to resolve. This means that if you
are using the TypedArray in further cryptographic code, it will work transparently.
So hopefully existing code that uses the Web Cryptography API will continue to work
without modification.
CryptoKeySince JavaScriptCore
does not support window.Crypto, it also doesn't have a CryptoKey interface.
So instead of returning an actual CryptoKey from
subtle.generateKey()
we instead return an object that confirms to the CryptoKey interface and has
a _import property that has the value of the key exported as jwk or using
the value for importing the key. This allows
you to treat the CryptoKey as you would normally, and whenever you need to use
it in some subtle method, we will automatically convert it back to a real
CryptoKey from the _import string and the metadata.
This project was funded by Burke Software and Consulting LLC for passit.
FAQs
Helper code for crypto polyfil in a webview
We found that webview-crypto-react demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh joins Software Engineering Daily to discuss modern software supply chain attacks and rising AI-driven security risks.

Security News
GitHub has revoked npm classic tokens for publishing; maintainers must migrate, but OpenJS warns OIDC trusted publishing still has risky gaps for critical projects.

Security News
Rust’s crates.io team is advancing an RFC to add a Security tab that surfaces RustSec vulnerability and unsoundness advisories directly on crate pages.