| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #ifndef CONTENT_CHILD_WEBCRYPTO_STATUS_H_ | |
| 6 #define CONTENT_CHILD_WEBCRYPTO_STATUS_H_ | |
| 7 | |
| 8 #include <string> | |
| 9 #include "content/common/content_export.h" | |
| 10 #include "third_party/WebKit/public/platform/WebCrypto.h" | |
| 11 | |
| 12 namespace content { | |
| 13 | |
| 14 namespace webcrypto { | |
| 15 | |
| 16 // Status indicates whether an operation completed successfully, or with an | |
| 17 // error. The error is used for verification in unit-tests, as well as for | |
| 18 // display to the user. | |
| 19 // | |
| 20 // As such, it is important that errors DO NOT reveal any sensitive material | |
| 21 // (like key bytes). | |
| 22 class CONTENT_EXPORT Status { | |
| 23 public: | |
| 24 Status() : type_(TYPE_ERROR) {} | |
| 25 | |
| 26 // Returns true if the Status represents an error (any one of them). | |
| 27 bool IsError() const; | |
| 28 | |
| 29 // Returns true if the Status represent success. | |
| 30 bool IsSuccess() const; | |
| 31 | |
| 32 // Returns a UTF-8 error message (non-localized) describing the error. | |
| 33 const std::string& error_details() const { return error_details_; } | |
| 34 | |
| 35 blink::WebCryptoErrorType error_type() const { return error_type_; } | |
| 36 | |
| 37 // Constructs a status representing success. | |
| 38 static Status Success(); | |
| 39 | |
| 40 // Constructs a status representing a generic operation error. It contains no | |
| 41 // extra details. | |
| 42 static Status OperationError(); | |
| 43 | |
| 44 // Constructs a status representing a generic data error. It contains no | |
| 45 // extra details. | |
| 46 static Status DataError(); | |
| 47 | |
| 48 // ------------------------------------ | |
| 49 // Errors when importing a JWK formatted key | |
| 50 // ------------------------------------ | |
| 51 | |
| 52 // The key bytes could not parsed as JSON dictionary. This either | |
| 53 // means there was a parsing error, or the JSON object was not | |
| 54 // convertable to a dictionary. | |
| 55 static Status ErrorJwkNotDictionary(); | |
| 56 | |
| 57 // The required JWK member |member_name| was missing. | |
| 58 static Status ErrorJwkMemberMissing(const std::string& member_name); | |
| 59 | |
| 60 // The JWK member |member_name| was not of type |expected_type|. | |
| 61 static Status ErrorJwkMemberWrongType(const std::string& member_name, | |
| 62 const std::string& expected_type); | |
| 63 | |
| 64 // The JWK member |member_name| was a string, however could not be | |
| 65 // successfully base64 decoded. | |
| 66 static Status ErrorJwkBase64Decode(const std::string& member_name); | |
| 67 | |
| 68 // The "ext" parameter was specified but was | |
| 69 // incompatible with the value requested by the Web Crypto call. | |
| 70 static Status ErrorJwkExtInconsistent(); | |
| 71 | |
| 72 // The "alg" parameter is incompatible with the (optional) Algorithm | |
| 73 // specified by the Web Crypto import operation. | |
| 74 static Status ErrorJwkAlgorithmInconsistent(); | |
| 75 | |
| 76 // The "use" parameter was specified, however it couldn't be converted to an | |
| 77 // equivalent Web Crypto usage. | |
| 78 static Status ErrorJwkUnrecognizedUse(); | |
| 79 | |
| 80 // The "key_ops" parameter was specified, however one of the values in the | |
| 81 // array couldn't be converted to an equivalent Web Crypto usage. | |
| 82 static Status ErrorJwkUnrecognizedKeyop(); | |
| 83 | |
| 84 // The "use" parameter was specified, however it is incompatible with that | |
| 85 // specified by the Web Crypto import operation. | |
| 86 static Status ErrorJwkUseInconsistent(); | |
| 87 | |
| 88 // The "key_ops" parameter was specified, however it is incompatible with that | |
| 89 // specified by the Web Crypto import operation. | |
| 90 static Status ErrorJwkKeyopsInconsistent(); | |
| 91 | |
| 92 // Both the "key_ops" and the "use" parameters were specified, however they | |
| 93 // are incompatible with each other. | |
| 94 static Status ErrorJwkUseAndKeyopsInconsistent(); | |
| 95 | |
| 96 // The "kty" parameter was given and was a string, however it was not the | |
| 97 // expected value. | |
| 98 static Status ErrorJwkUnexpectedKty(const std::string& expected); | |
| 99 | |
| 100 // The amount of key data provided was incompatible with the selected | |
| 101 // algorithm. For instance if the algorith name was A128CBC then EXACTLY | |
| 102 // 128-bits of key data must have been provided. If 192-bits of key data were | |
| 103 // given that is an error. | |
| 104 static Status ErrorJwkIncorrectKeyLength(); | |
| 105 | |
| 106 // The JWK member |member_name| is supposed to represent a big-endian unsigned | |
| 107 // integer, however was the empty string. | |
| 108 static Status ErrorJwkEmptyBigInteger(const std::string& member_name); | |
| 109 | |
| 110 // The big-endian unsigned integer |member_name| contained leading zeros. This | |
| 111 // violates the JWA requirement that such octet strings be minimal. | |
| 112 static Status ErrorJwkBigIntegerHasLeadingZero( | |
| 113 const std::string& member_name); | |
| 114 | |
| 115 // The key_ops lists a usage more than once. | |
| 116 static Status ErrorJwkDuplicateKeyOps(); | |
| 117 | |
| 118 // ------------------------------------ | |
| 119 // Other errors | |
| 120 // ------------------------------------ | |
| 121 | |
| 122 // Tried importing a key using an unsupported format for the key type (for | |
| 123 // instance importing an HMAC key using format=spki). | |
| 124 static Status ErrorUnsupportedImportKeyFormat(); | |
| 125 | |
| 126 // Tried exporting a key using an unsupported format for the key type (for | |
| 127 // instance exporting an HMAC key using format=spki). | |
| 128 static Status ErrorUnsupportedExportKeyFormat(); | |
| 129 | |
| 130 // The key data buffer provided for importKey() is an incorrect length for | |
| 131 // AES. | |
| 132 static Status ErrorImportAesKeyLength(); | |
| 133 | |
| 134 // The length specified when deriving an AES key was not 128 or 256 bits. | |
| 135 static Status ErrorGetAesKeyLength(); | |
| 136 | |
| 137 // Attempted to generate an AES key with an invalid length. | |
| 138 static Status ErrorGenerateAesKeyLength(); | |
| 139 | |
| 140 // 192-bit AES keys are valid, however unsupported. | |
| 141 static Status ErrorAes192BitUnsupported(); | |
| 142 | |
| 143 // The wrong key was used for the operation. For instance, a public key was | |
| 144 // used to verify a RsaSsaPkcs1v1_5 signature, or tried exporting a private | |
| 145 // key using spki format. | |
| 146 static Status ErrorUnexpectedKeyType(); | |
| 147 | |
| 148 // When doing an AES-CBC encryption/decryption, the "iv" parameter was not 16 | |
| 149 // bytes. | |
| 150 static Status ErrorIncorrectSizeAesCbcIv(); | |
| 151 | |
| 152 // When doing AES-CTR encryption/decryption, the "counter" parameter was not | |
| 153 // 16 bytes. | |
| 154 static Status ErrorIncorrectSizeAesCtrCounter(); | |
| 155 | |
| 156 // When doing AES-CTR encryption/decryption, the "length" parameter for the | |
| 157 // counter was out of range. | |
| 158 static Status ErrorInvalidAesCtrCounterLength(); | |
| 159 | |
| 160 // The input to encrypt/decrypt was too large. Based on the counter size, it | |
| 161 // would cause the counter to wraparound and repeat earlier values. | |
| 162 static Status ErrorAesCtrInputTooLongCounterRepeated(); | |
| 163 | |
| 164 // The data provided to an encrypt/decrypt/sign/verify operation was too | |
| 165 // large. This can either represent an internal limitation (for instance | |
| 166 // representing buffer lengths as uints). | |
| 167 static Status ErrorDataTooLarge(); | |
| 168 | |
| 169 // The data provided to an encrypt/decrypt/sign/verify operation was too | |
| 170 // small. This usually represents an algorithm restriction (for instance | |
| 171 // AES-KW requires a minimum of 24 bytes input data). | |
| 172 static Status ErrorDataTooSmall(); | |
| 173 | |
| 174 // Something was unsupported or unimplemented. This can mean the algorithm in | |
| 175 // question was unsupported, some parameter combination was unsupported, or | |
| 176 // something has not yet been implemented. | |
| 177 static Status ErrorUnsupported(); | |
| 178 static Status ErrorUnsupported(const std::string& message); | |
| 179 | |
| 180 // Something unexpected happened in the code, which implies there is a | |
| 181 // source-level bug. These should not happen, but safer to fail than simply | |
| 182 // DCHECK. | |
| 183 static Status ErrorUnexpected(); | |
| 184 | |
| 185 // The authentication tag length specified for AES-GCM encrypt/decrypt was | |
| 186 // not 32, 64, 96, 104, 112, 120, or 128. | |
| 187 static Status ErrorInvalidAesGcmTagLength(); | |
| 188 | |
| 189 // The input data given to an AES-KW encrypt/decrypt operation was not a | |
| 190 // multiple of 8 bytes, as required by RFC 3394. | |
| 191 static Status ErrorInvalidAesKwDataLength(); | |
| 192 | |
| 193 // The "publicExponent" used to generate a key was invalid or unsupported. | |
| 194 // Only values of 3 and 65537 are allowed. | |
| 195 static Status ErrorGenerateKeyPublicExponent(); | |
| 196 | |
| 197 // The modulus bytes were empty when importing an RSA public key. | |
| 198 static Status ErrorImportRsaEmptyModulus(); | |
| 199 | |
| 200 // The modulus length was unsupported when generating an RSA key pair. | |
| 201 static Status ErrorGenerateRsaUnsupportedModulus(); | |
| 202 | |
| 203 // The exponent bytes were empty when importing an RSA public key. | |
| 204 static Status ErrorImportRsaEmptyExponent(); | |
| 205 | |
| 206 // An unextractable key was used by an operation which exports the key data. | |
| 207 static Status ErrorKeyNotExtractable(); | |
| 208 | |
| 209 // Attempted to generate an HMAC key using a key length of 0. | |
| 210 static Status ErrorGenerateHmacKeyLengthZero(); | |
| 211 | |
| 212 // Attempted to import an HMAC key containing no data. | |
| 213 static Status ErrorHmacImportEmptyKey(); | |
| 214 | |
| 215 // Attempted to derive an HMAC key with zero length. | |
| 216 static Status ErrorGetHmacKeyLengthZero(); | |
| 217 | |
| 218 // Attempted to import an HMAC key using a bad optional length. | |
| 219 static Status ErrorHmacImportBadLength(); | |
| 220 | |
| 221 // Attempted to create a key (either by importKey(), generateKey(), or | |
| 222 // unwrapKey()) however the key usages were not applicable for the key type | |
| 223 // and algorithm. | |
| 224 static Status ErrorCreateKeyBadUsages(); | |
| 225 | |
| 226 // No usages were specified when generating/importing a secret or private key. | |
| 227 static Status ErrorCreateKeyEmptyUsages(); | |
| 228 | |
| 229 // An EC key imported using SPKI/PKCS8 format had the wrong curve specified in | |
| 230 // the key. | |
| 231 static Status ErrorImportedEcKeyIncorrectCurve(); | |
| 232 | |
| 233 // The "crv" member for a JWK did not match the expectations from importKey() | |
| 234 static Status ErrorJwkIncorrectCrv(); | |
| 235 | |
| 236 // The EC key failed validation (coordinates don't lie on curve, out of range, | |
| 237 // etc.) | |
| 238 static Status ErrorEcKeyInvalid(); | |
| 239 | |
| 240 // The octet string |member_name| was expected to be |expected_length| bytes | |
| 241 // long, but was instead |actual_length| bytes long. | |
| 242 static Status JwkOctetStringWrongLength(const std::string& member_name, | |
| 243 size_t expected_length, | |
| 244 size_t actual_length); | |
| 245 | |
| 246 // The public key given for ECDH key derivation was not an EC public key. | |
| 247 static Status ErrorEcdhPublicKeyWrongType(); | |
| 248 | |
| 249 // The public key's algorithm was not ECDH. | |
| 250 static Status ErrorEcdhPublicKeyWrongAlgorithm(); | |
| 251 | |
| 252 // The public and private keys given to ECDH key derivation were not for the | |
| 253 // same named curve. | |
| 254 static Status ErrorEcdhCurveMismatch(); | |
| 255 | |
| 256 // The requested bit length for ECDH key derivation was too large. | |
| 257 static Status ErrorEcdhLengthTooBig(unsigned int max_length_bits); | |
| 258 | |
| 259 // The requested length for HKDF was too large. | |
| 260 static Status ErrorHkdfLengthTooLong(); | |
| 261 | |
| 262 // No length parameter was provided for HKDF's Derive Bits operation. | |
| 263 static Status ErrorHkdfDeriveBitsLengthNotSpecified(); | |
| 264 | |
| 265 // The requested bit length for PBKDF2 key derivation was invalid. | |
| 266 static Status ErrorPbkdf2InvalidLength(); | |
| 267 | |
| 268 // No length parameter was provided for PBKDF2's Derive Bits operation. | |
| 269 static Status ErrorPbkdf2DeriveBitsLengthNotSpecified(); | |
| 270 | |
| 271 private: | |
| 272 enum Type { TYPE_ERROR, TYPE_SUCCESS }; | |
| 273 | |
| 274 // Constructs an error with the specified error type and message. | |
| 275 Status(blink::WebCryptoErrorType error_type, | |
| 276 const std::string& error_details_utf8); | |
| 277 | |
| 278 // Constructs a success or error without any details. | |
| 279 explicit Status(Type type); | |
| 280 | |
| 281 Type type_; | |
| 282 blink::WebCryptoErrorType error_type_; | |
| 283 std::string error_details_; | |
| 284 }; | |
| 285 | |
| 286 } // namespace webcrypto | |
| 287 | |
| 288 } // namespace content | |
| 289 | |
| 290 #endif // CONTENT_CHILD_WEBCRYPTO_STATUS_H_ | |
| OLD | NEW |