OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2013 Google Inc. All rights reserved. | 2 * Copyright (C) 2013 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 15 matching lines...) Expand all Loading... |
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | 26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 28 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
29 */ | 29 */ |
30 | 30 |
31 #include "config.h" | 31 #include "config.h" |
32 #include "modules/crypto/Key.h" | 32 #include "modules/crypto/Key.h" |
33 | 33 |
34 #include "bindings/v8/ExceptionState.h" | 34 #include "bindings/v8/ExceptionState.h" |
35 #include "core/dom/ExceptionCode.h" | 35 #include "core/dom/ExceptionCode.h" |
36 #include "modules/crypto/Algorithm.h" | 36 #include "modules/crypto/KeyAlgorithm.h" |
37 #include "platform/CryptoResult.h" | 37 #include "platform/CryptoResult.h" |
38 #include "public/platform/WebCryptoAlgorithmParams.h" | 38 #include "public/platform/WebCryptoAlgorithmParams.h" |
39 #include "public/platform/WebString.h" | 39 #include "public/platform/WebString.h" |
40 | 40 |
41 namespace WebCore { | 41 namespace WebCore { |
42 | 42 |
43 DEFINE_GC_INFO(Key); | 43 DEFINE_GC_INFO(Key); |
44 | 44 |
45 namespace { | 45 namespace { |
46 | 46 |
(...skipping 68 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
115 case Digest: | 115 case Digest: |
116 case GenerateKey: | 116 case GenerateKey: |
117 case ImportKey: | 117 case ImportKey: |
118 break; | 118 break; |
119 } | 119 } |
120 | 120 |
121 ASSERT_NOT_REACHED(); | 121 ASSERT_NOT_REACHED(); |
122 return 0; | 122 return 0; |
123 } | 123 } |
124 | 124 |
125 bool getHmacHashId(const blink::WebCryptoAlgorithm& algorithm, blink::WebCryptoA
lgorithmId& hashId) | |
126 { | |
127 if (algorithm.hmacParams()) { | |
128 hashId = algorithm.hmacParams()->hash().id(); | |
129 return true; | |
130 } | |
131 if (algorithm.hmacKeyParams()) { | |
132 hashId = algorithm.hmacKeyParams()->hash().id(); | |
133 return true; | |
134 } | |
135 return false; | |
136 } | |
137 | |
138 } // namespace | 125 } // namespace |
139 | 126 |
140 Key::~Key() | 127 Key::~Key() |
141 { | 128 { |
142 } | 129 } |
143 | 130 |
144 Key::Key(const blink::WebCryptoKey& key) | 131 Key::Key(const blink::WebCryptoKey& key) |
145 : m_key(key) | 132 : m_key(key) |
146 { | 133 { |
147 ScriptWrappable::init(this); | 134 ScriptWrappable::init(this); |
148 } | 135 } |
149 | 136 |
150 String Key::type() const | 137 String Key::type() const |
151 { | 138 { |
152 return keyTypeToString(m_key.type()); | 139 return keyTypeToString(m_key.type()); |
153 } | 140 } |
154 | 141 |
155 bool Key::extractable() const | 142 bool Key::extractable() const |
156 { | 143 { |
157 return m_key.extractable(); | 144 return m_key.extractable(); |
158 } | 145 } |
159 | 146 |
160 Algorithm* Key::algorithm() | 147 KeyAlgorithm* Key::algorithm() |
161 { | 148 { |
162 if (!m_algorithm) | 149 if (!m_algorithm) |
163 m_algorithm = Algorithm::create(m_key.algorithm()); | 150 m_algorithm = KeyAlgorithm::create(m_key.algorithm()); |
164 return m_algorithm.get(); | 151 return m_algorithm.get(); |
165 } | 152 } |
166 | 153 |
167 // FIXME: This creates a new javascript array each time. What should happen | 154 // FIXME: This creates a new javascript array each time. What should happen |
168 // instead is return the same (immutable) array. (Javascript callers can | 155 // instead is return the same (immutable) array. (Javascript callers can |
169 // distinguish this by doing an == test on the arrays and seeing they are | 156 // distinguish this by doing an == test on the arrays and seeing they are |
170 // different). | 157 // different). |
171 Vector<String> Key::usages() const | 158 Vector<String> Key::usages() const |
172 { | 159 { |
173 Vector<String> result; | 160 Vector<String> result; |
(...skipping 10 matching lines...) Expand all Loading... |
184 if (!(m_key.usages() & toKeyUsage(op))) { | 171 if (!(m_key.usages() & toKeyUsage(op))) { |
185 result->completeWithError("key.usages does not permit this operation"); | 172 result->completeWithError("key.usages does not permit this operation"); |
186 return false; | 173 return false; |
187 } | 174 } |
188 | 175 |
189 if (m_key.algorithm().id() != algorithm.id()) { | 176 if (m_key.algorithm().id() != algorithm.id()) { |
190 result->completeWithError("key.algorithm does not match that of operatio
n"); | 177 result->completeWithError("key.algorithm does not match that of operatio
n"); |
191 return false; | 178 return false; |
192 } | 179 } |
193 | 180 |
194 // Verify that the algorithm-specific parameters for the key conform to the | |
195 // algorithm. | |
196 // FIXME: This is incomplete and not future proof. Operational parameters | |
197 // should be enumerated when defining new parameters. | |
198 | |
199 if (m_key.algorithm().id() == blink::WebCryptoAlgorithmIdHmac) { | |
200 blink::WebCryptoAlgorithmId keyHash; | |
201 blink::WebCryptoAlgorithmId algorithmHash; | |
202 if (!getHmacHashId(m_key.algorithm(), keyHash) || !getHmacHashId(algorit
hm, algorithmHash) || keyHash != algorithmHash) { | |
203 result->completeWithError("key.algorithm does not match that of oper
ation (HMAC's hash differs)"); | |
204 return false; | |
205 } | |
206 } | |
207 | |
208 return true; | 181 return true; |
209 } | 182 } |
210 | 183 |
211 bool Key::parseFormat(const String& formatString, blink::WebCryptoKeyFormat& for
mat, CryptoResult* result) | 184 bool Key::parseFormat(const String& formatString, blink::WebCryptoKeyFormat& for
mat, CryptoResult* result) |
212 { | 185 { |
213 // There are few enough values that testing serially is fast enough. | 186 // There are few enough values that testing serially is fast enough. |
214 if (formatString == "raw") { | 187 if (formatString == "raw") { |
215 format = blink::WebCryptoKeyFormatRaw; | 188 format = blink::WebCryptoKeyFormatRaw; |
216 return true; | 189 return true; |
217 } | 190 } |
(...skipping 27 matching lines...) Expand all Loading... |
245 } | 218 } |
246 return true; | 219 return true; |
247 } | 220 } |
248 | 221 |
249 void Key::trace(Visitor* visitor) | 222 void Key::trace(Visitor* visitor) |
250 { | 223 { |
251 visitor->trace(m_algorithm); | 224 visitor->trace(m_algorithm); |
252 } | 225 } |
253 | 226 |
254 } // namespace WebCore | 227 } // namespace WebCore |
OLD | NEW |