OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "content/child/webcrypto/nss/aes_algorithm_nss.h" | |
6 | |
7 #include "base/logging.h" | |
8 #include "content/child/webcrypto/crypto_data.h" | |
9 #include "content/child/webcrypto/jwk.h" | |
10 #include "content/child/webcrypto/nss/key_nss.h" | |
11 #include "content/child/webcrypto/nss/sym_key_nss.h" | |
12 #include "content/child/webcrypto/status.h" | |
13 #include "content/child/webcrypto/webcrypto_util.h" | |
14 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" | |
15 | |
16 namespace content { | |
17 | |
18 namespace webcrypto { | |
19 | |
20 AesAlgorithm::AesAlgorithm(CK_MECHANISM_TYPE import_mechanism, | |
21 blink::WebCryptoKeyUsageMask all_key_usages, | |
22 const std::string& jwk_suffix) | |
23 : import_mechanism_(import_mechanism), | |
24 all_key_usages_(all_key_usages), | |
25 jwk_suffix_(jwk_suffix) { | |
26 } | |
27 | |
28 AesAlgorithm::AesAlgorithm(CK_MECHANISM_TYPE import_mechanism, | |
29 const std::string& jwk_suffix) | |
30 : import_mechanism_(import_mechanism), | |
31 all_key_usages_(blink::WebCryptoKeyUsageEncrypt | | |
32 blink::WebCryptoKeyUsageDecrypt | | |
33 blink::WebCryptoKeyUsageWrapKey | | |
34 blink::WebCryptoKeyUsageUnwrapKey), | |
35 jwk_suffix_(jwk_suffix) { | |
36 } | |
37 | |
38 Status AesAlgorithm::GenerateKey(const blink::WebCryptoAlgorithm& algorithm, | |
39 bool extractable, | |
40 blink::WebCryptoKeyUsageMask usages, | |
41 GenerateKeyResult* result) const { | |
42 Status status = CheckKeyCreationUsages(all_key_usages_, usages, false); | |
43 if (status.IsError()) | |
44 return status; | |
45 | |
46 unsigned int keylen_bits; | |
47 status = GetAesKeyGenLengthInBits(algorithm.aesKeyGenParams(), &keylen_bits); | |
48 if (status.IsError()) | |
49 return status; | |
50 | |
51 return GenerateSecretKeyNss( | |
52 blink::WebCryptoKeyAlgorithm::createAes(algorithm.id(), keylen_bits), | |
53 extractable, usages, keylen_bits, CKM_AES_KEY_GEN, result); | |
54 } | |
55 | |
56 Status AesAlgorithm::VerifyKeyUsagesBeforeImportKey( | |
57 blink::WebCryptoKeyFormat format, | |
58 blink::WebCryptoKeyUsageMask usages) const { | |
59 switch (format) { | |
60 case blink::WebCryptoKeyFormatRaw: | |
61 case blink::WebCryptoKeyFormatJwk: | |
62 return CheckKeyCreationUsages(all_key_usages_, usages, false); | |
63 default: | |
64 return Status::ErrorUnsupportedImportKeyFormat(); | |
65 } | |
66 } | |
67 Status AesAlgorithm::ImportKeyRaw(const CryptoData& key_data, | |
68 const blink::WebCryptoAlgorithm& algorithm, | |
69 bool extractable, | |
70 blink::WebCryptoKeyUsageMask usages, | |
71 blink::WebCryptoKey* key) const { | |
72 const unsigned int keylen_bytes = key_data.byte_length(); | |
73 Status status = VerifyAesKeyLengthForImport(keylen_bytes); | |
74 if (status.IsError()) | |
75 return status; | |
76 | |
77 // No possibility of overflow. | |
78 unsigned int keylen_bits = keylen_bytes * 8; | |
79 | |
80 return ImportKeyRawNss(key_data, blink::WebCryptoKeyAlgorithm::createAes( | |
81 algorithm.id(), keylen_bits), | |
82 extractable, usages, import_mechanism_, key); | |
83 } | |
84 | |
85 Status AesAlgorithm::ImportKeyJwk(const CryptoData& key_data, | |
86 const blink::WebCryptoAlgorithm& algorithm, | |
87 bool extractable, | |
88 blink::WebCryptoKeyUsageMask usages, | |
89 blink::WebCryptoKey* key) const { | |
90 std::vector<uint8_t> raw_data; | |
91 Status status = ReadAesSecretKeyJwk(key_data, jwk_suffix_, extractable, | |
92 usages, &raw_data); | |
93 if (status.IsError()) | |
94 return status; | |
95 | |
96 return ImportKeyRaw(CryptoData(raw_data), algorithm, extractable, usages, | |
97 key); | |
98 } | |
99 | |
100 Status AesAlgorithm::ExportKeyRaw(const blink::WebCryptoKey& key, | |
101 std::vector<uint8_t>* buffer) const { | |
102 *buffer = SymKeyNss::Cast(key)->raw_key_data(); | |
103 return Status::Success(); | |
104 } | |
105 | |
106 Status AesAlgorithm::ExportKeyJwk(const blink::WebCryptoKey& key, | |
107 std::vector<uint8_t>* buffer) const { | |
108 SymKeyNss* sym_key = SymKeyNss::Cast(key); | |
109 const std::vector<uint8_t>& raw_data = sym_key->raw_key_data(); | |
110 | |
111 WriteSecretKeyJwk(CryptoData(raw_data), | |
112 MakeJwkAesAlgorithmName(jwk_suffix_, raw_data.size()), | |
113 key.extractable(), key.usages(), buffer); | |
114 | |
115 return Status::Success(); | |
116 } | |
117 | |
118 Status AesAlgorithm::SerializeKeyForClone( | |
119 const blink::WebCryptoKey& key, | |
120 blink::WebVector<uint8_t>* key_data) const { | |
121 key_data->assign(SymKeyNss::Cast(key)->serialized_key_data()); | |
122 return Status::Success(); | |
123 } | |
124 | |
125 Status AesAlgorithm::DeserializeKeyForClone( | |
126 const blink::WebCryptoKeyAlgorithm& algorithm, | |
127 blink::WebCryptoKeyType type, | |
128 bool extractable, | |
129 blink::WebCryptoKeyUsageMask usages, | |
130 const CryptoData& key_data, | |
131 blink::WebCryptoKey* key) const { | |
132 return ImportKeyRaw(key_data, CreateAlgorithm(algorithm.id()), extractable, | |
133 usages, key); | |
134 } | |
135 | |
136 Status AesAlgorithm::GetKeyLength( | |
137 const blink::WebCryptoAlgorithm& key_length_algorithm, | |
138 bool* has_length_bits, | |
139 unsigned int* length_bits) const { | |
140 return GetAesKeyLength(key_length_algorithm, has_length_bits, length_bits); | |
141 } | |
142 | |
143 } // namespace webcrypto | |
144 | |
145 } // namespace content | |
OLD | NEW |