| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #ifndef CONTENT_CHILD_WEBCRYPTO_JWK_H_ | |
| 6 #define CONTENT_CHILD_WEBCRYPTO_JWK_H_ | |
| 7 | |
| 8 #include <stdint.h> | |
| 9 #include <vector> | |
| 10 | |
| 11 #include "base/strings/string_piece.h" | |
| 12 #include "base/values.h" | |
| 13 #include "content/common/content_export.h" | |
| 14 #include "third_party/WebKit/public/platform/WebCrypto.h" | |
| 15 | |
| 16 namespace content { | |
| 17 | |
| 18 namespace webcrypto { | |
| 19 | |
| 20 class CryptoData; | |
| 21 class Status; | |
| 22 | |
| 23 // Helper class for parsing a JWK from JSON. | |
| 24 // | |
| 25 // This primarily exists to ensure strict enforcement of the JWK schema, as the | |
| 26 // type and presence of particular members is security relevant. For example, | |
| 27 // GetString() will ensure a given JSON member is present and is a string type, | |
| 28 // and will fail if these conditions aren't met. | |
| 29 // | |
| 30 // Users of JwkReader must call Init() successfully before any other method can | |
| 31 // be called. | |
| 32 class JwkReader { | |
| 33 public: | |
| 34 JwkReader(); | |
| 35 ~JwkReader(); | |
| 36 | |
| 37 // Initializes a JWK reader by parsing the JSON |bytes|. To succeed, the JWK | |
| 38 // must: | |
| 39 // * Have "kty" matching |expected_kty| | |
| 40 // * Have "ext" compatible with |expected_extractable| | |
| 41 // * Have usages ("use", "key_ops") compatible with |expected_usages| | |
| 42 // * Have an "alg" matching |expected_alg| | |
| 43 // | |
| 44 // NOTE: If |expected_alg| is empty, then the test on "alg" is skipped. | |
| 45 Status Init(const CryptoData& bytes, | |
| 46 bool expected_extractable, | |
| 47 blink::WebCryptoKeyUsageMask expected_usages, | |
| 48 const std::string& expected_kty, | |
| 49 const std::string& expected_alg); | |
| 50 | |
| 51 // Returns true if the member |member_name| is present. | |
| 52 bool HasMember(const std::string& member_name) const; | |
| 53 | |
| 54 // Extracts the required string member |member_name| and saves the result to | |
| 55 // |*result|. If the member does not exist or is not a string, returns an | |
| 56 // error. | |
| 57 Status GetString(const std::string& member_name, std::string* result) const; | |
| 58 | |
| 59 // Extracts the optional string member |member_name| and saves the result to | |
| 60 // |*result| if it was found. If the member exists and is not a string, | |
| 61 // returns an error. Otherwise returns success, and sets |*member_exists| if | |
| 62 // it was found. | |
| 63 Status GetOptionalString(const std::string& member_name, | |
| 64 std::string* result, | |
| 65 bool* member_exists) const; | |
| 66 | |
| 67 // Extracts the optional array member |member_name| and saves the result to | |
| 68 // |*result| if it was found. If the member exists and is not an array, | |
| 69 // returns an error. Otherwise returns success, and sets |*member_exists| if | |
| 70 // it was found. | |
| 71 // | |
| 72 // NOTE: |*result| is owned by the JwkReader. | |
| 73 Status GetOptionalList(const std::string& member_name, | |
| 74 base::ListValue** result, | |
| 75 bool* member_exists) const; | |
| 76 | |
| 77 // Extracts the required string member |member_name| and saves the | |
| 78 // base64url-decoded bytes to |*result|. If the member does not exist or is | |
| 79 // not a string, or could not be base64url-decoded, returns an error. | |
| 80 Status GetBytes(const std::string& member_name, std::string* result) const; | |
| 81 | |
| 82 // Extracts the required base64url member, which is interpreted as being a | |
| 83 // big-endian unsigned integer. | |
| 84 // | |
| 85 // Sequences that contain leading zeros will be rejected. | |
| 86 Status GetBigInteger(const std::string& member_name, | |
| 87 std::string* result) const; | |
| 88 | |
| 89 // Extracts the optional boolean member |member_name| and saves the result to | |
| 90 // |*result| if it was found. If the member exists and is not a boolean, | |
| 91 // returns an error. Otherwise returns success, and sets |*member_exists| if | |
| 92 // it was found. | |
| 93 Status GetOptionalBool(const std::string& member_name, | |
| 94 bool* result, | |
| 95 bool* member_exists) const; | |
| 96 | |
| 97 // Gets the optional algorithm ("alg") string. | |
| 98 Status GetAlg(std::string* alg, bool* has_alg) const; | |
| 99 | |
| 100 // Checks if the "alg" member matches |expected_alg|. | |
| 101 Status VerifyAlg(const std::string& expected_alg) const; | |
| 102 | |
| 103 private: | |
| 104 scoped_ptr<base::DictionaryValue> dict_; | |
| 105 }; | |
| 106 | |
| 107 // Helper class for building the JSON for a JWK. | |
| 108 class JwkWriter { | |
| 109 public: | |
| 110 // Initializes a writer, and sets the standard JWK members as indicated. | |
| 111 // |algorithm| is optional, and is only written if the provided |algorithm| is | |
| 112 // non-empty. | |
| 113 JwkWriter(const std::string& algorithm, | |
| 114 bool extractable, | |
| 115 blink::WebCryptoKeyUsageMask usages, | |
| 116 const std::string& kty); | |
| 117 | |
| 118 // Sets a string member |member_name| to |value|. | |
| 119 void SetString(const std::string& member_name, const std::string& value); | |
| 120 | |
| 121 // Sets a bytes member |value| to |value| by base64 url-safe encoding it. | |
| 122 void SetBytes(const std::string& member_name, const CryptoData& value); | |
| 123 | |
| 124 // Flattens the JWK to JSON (UTF-8 encoded if necessary, however in practice | |
| 125 // it will be ASCII). | |
| 126 void ToJson(std::vector<uint8_t>* utf8_bytes) const; | |
| 127 | |
| 128 private: | |
| 129 base::DictionaryValue dict_; | |
| 130 }; | |
| 131 | |
| 132 // Writes a JWK-formatted symmetric key to |jwk_key_data|. | |
| 133 // * raw_key_data: The actual key data | |
| 134 // * algorithm: The JWK algorithm name (i.e. "alg") | |
| 135 // * extractable: The JWK extractability (i.e. "ext") | |
| 136 // * usages: The JWK usages (i.e. "key_ops") | |
| 137 void WriteSecretKeyJwk(const CryptoData& raw_key_data, | |
| 138 const std::string& algorithm, | |
| 139 bool extractable, | |
| 140 blink::WebCryptoKeyUsageMask usages, | |
| 141 std::vector<uint8_t>* jwk_key_data); | |
| 142 | |
| 143 // Parses a UTF-8 encoded JWK (key_data), and extracts the key material to | |
| 144 // |*raw_key_data|. Returns Status::Success() on success, otherwise an error. | |
| 145 // In order for this to succeed: | |
| 146 // * expected_alg must match the JWK's "alg", if present. | |
| 147 // * expected_extractable must be consistent with the JWK's "ext", if | |
| 148 // present. | |
| 149 // * expected_usages must be a subset of the JWK's "key_ops" if present. | |
| 150 Status ReadSecretKeyJwk(const CryptoData& key_data, | |
| 151 const std::string& expected_alg, | |
| 152 bool expected_extractable, | |
| 153 blink::WebCryptoKeyUsageMask expected_usages, | |
| 154 std::vector<uint8_t>* raw_key_data); | |
| 155 | |
| 156 // Creates an AES algorithm name for the given key size (in bytes). For | |
| 157 // instance "A128CBC" is the result of suffix="CBC", keylen_bytes=16. | |
| 158 std::string MakeJwkAesAlgorithmName(const std::string& suffix, | |
| 159 unsigned int keylen_bytes); | |
| 160 | |
| 161 // This is very similar to ReadSecretKeyJwk(), except instead of specifying an | |
| 162 // absolute "expected_alg", the suffix for an AES algorithm name is given | |
| 163 // (See MakeJwkAesAlgorithmName() for an explanation of what the suffix is). | |
| 164 // | |
| 165 // This is because the algorithm name for AES keys is dependent on the length | |
| 166 // of the key. This function expects key lengths to be either 128, 192, or 256 | |
| 167 // bits. | |
| 168 Status ReadAesSecretKeyJwk(const CryptoData& key_data, | |
| 169 const std::string& algorithm_name_suffix, | |
| 170 bool expected_extractable, | |
| 171 blink::WebCryptoKeyUsageMask expected_usages, | |
| 172 std::vector<uint8_t>* raw_key_data); | |
| 173 | |
| 174 // Writes a JWK-formated RSA public key and saves the result to | |
| 175 // |*jwk_key_data|. | |
| 176 void WriteRsaPublicKeyJwk(const CryptoData& n, | |
| 177 const CryptoData& e, | |
| 178 const std::string& algorithm, | |
| 179 bool extractable, | |
| 180 blink::WebCryptoKeyUsageMask usages, | |
| 181 std::vector<uint8_t>* jwk_key_data); | |
| 182 | |
| 183 // Writes a JWK-formated RSA private key and saves the result to | |
| 184 // |*jwk_key_data|. | |
| 185 void WriteRsaPrivateKeyJwk(const CryptoData& n, | |
| 186 const CryptoData& e, | |
| 187 const CryptoData& d, | |
| 188 const CryptoData& p, | |
| 189 const CryptoData& q, | |
| 190 const CryptoData& dp, | |
| 191 const CryptoData& dq, | |
| 192 const CryptoData& qi, | |
| 193 const std::string& algorithm, | |
| 194 bool extractable, | |
| 195 blink::WebCryptoKeyUsageMask usages, | |
| 196 std::vector<uint8_t>* jwk_key_data); | |
| 197 | |
| 198 // Describes the RSA components for a parsed key. The names of the properties | |
| 199 // correspond with those from the JWK spec. Note that Chromium's WebCrypto | |
| 200 // implementation does not support multi-primes, so there is no parsed field | |
| 201 // for othinfo. | |
| 202 struct JwkRsaInfo { | |
| 203 JwkRsaInfo(); | |
| 204 ~JwkRsaInfo(); | |
| 205 | |
| 206 bool is_private_key; | |
| 207 std::string n; | |
| 208 std::string e; | |
| 209 std::string d; | |
| 210 std::string p; | |
| 211 std::string q; | |
| 212 std::string dp; | |
| 213 std::string dq; | |
| 214 std::string qi; | |
| 215 }; | |
| 216 | |
| 217 // Parses a UTF-8 encoded JWK (key_data), and extracts the RSA components to | |
| 218 // |*result|. Returns Status::Success() on success, otherwise an error. | |
| 219 // In order for this to succeed: | |
| 220 // * expected_alg must match the JWK's "alg", if present. | |
| 221 // * expected_extractable must be consistent with the JWK's "ext", if | |
| 222 // present. | |
| 223 // * expected_usages must be a subset of the JWK's "key_ops" if present. | |
| 224 Status ReadRsaKeyJwk(const CryptoData& key_data, | |
| 225 const std::string& expected_alg, | |
| 226 bool expected_extractable, | |
| 227 blink::WebCryptoKeyUsageMask expected_usages, | |
| 228 JwkRsaInfo* result); | |
| 229 | |
| 230 const char* GetJwkHmacAlgorithmName(blink::WebCryptoAlgorithmId hash); | |
| 231 | |
| 232 // This decodes JWK's flavor of base64 encoding, as described by: | |
| 233 // https://tools.ietf.org/html/draft-ietf-jose-json-web-signature-36#section-2 | |
| 234 // | |
| 235 // In essence it is RFC 4648 'base64url' encoding where padding is omitted. | |
| 236 CONTENT_EXPORT bool Base64DecodeUrlSafe(const std::string& input, | |
| 237 std::string* output); | |
| 238 | |
| 239 // Encodes |input| using JWK's flavor of base64 encoding. See the description | |
| 240 // above for details. | |
| 241 CONTENT_EXPORT std::string Base64EncodeUrlSafe(const base::StringPiece& input); | |
| 242 CONTENT_EXPORT std::string Base64EncodeUrlSafe( | |
| 243 const std::vector<uint8_t>& input); | |
| 244 | |
| 245 // Converts a JWK "key_ops" array to the corresponding WebCrypto usages. Used by | |
| 246 // testing. | |
| 247 CONTENT_EXPORT Status | |
| 248 GetWebCryptoUsagesFromJwkKeyOpsForTest(const base::ListValue* key_ops, | |
| 249 blink::WebCryptoKeyUsageMask* usages); | |
| 250 | |
| 251 } // namespace webcrypto | |
| 252 | |
| 253 } // namespace content | |
| 254 | |
| 255 #endif // CONTENT_CHILD_WEBCRYPTO_JWK_H_ | |
| OLD | NEW |