Index: Source/modules/crypto/Key.cpp |
diff --git a/Source/modules/crypto/Key.cpp b/Source/modules/crypto/Key.cpp |
new file mode 100644 |
index 0000000000000000000000000000000000000000..66177084a0ddaf1dc1ab3f9b29604220fa105e7e |
--- /dev/null |
+++ b/Source/modules/crypto/Key.cpp |
@@ -0,0 +1,147 @@ |
+/* |
+ * Copyright (C) 2013 Google Inc. All rights reserved. |
+ * |
+ * Redistribution and use in source and binary forms, with or without |
+ * modification, are permitted provided that the following conditions are |
+ * met: |
+ * |
+ * * Redistributions of source code must retain the above copyright |
+ * notice, this list of conditions and the following disclaimer. |
+ * * Redistributions in binary form must reproduce the above |
+ * copyright notice, this list of conditions and the following disclaimer |
+ * in the documentation and/or other materials provided with the |
+ * distribution. |
+ * * Neither the name of Google Inc. nor the names of its |
+ * contributors may be used to endorse or promote products derived from |
+ * this software without specific prior written permission. |
+ * |
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
+ */ |
+ |
+#include "config.h" |
+#include "modules/crypto/Key.h" |
+ |
+#include "modules/crypto/Algorithm.h" |
+ |
+namespace WebCore { |
+ |
+namespace { |
+ |
+const char* keyTypeToString(WebKit::WebCryptoKeyType type) |
+{ |
+ switch (type) { |
+ case WebKit::WebCryptoKeyTypeSecret: |
+ return "secret"; |
+ case WebKit::WebCryptoKeyTypePublic: |
+ return "public"; |
+ case WebKit::WebCryptoKeyTypePrivate: |
+ return "private"; |
+ } |
+ ASSERT_NOT_REACHED(); |
+ return 0; |
+} |
+ |
+const char* keyUsageToString(WebKit::WebCryptoKeyUsage usage) |
+{ |
+ switch (usage) { |
+ case WebKit::WebCryptoKeyUsageEncrypt: |
+ return "encrypt"; |
+ case WebKit::WebCryptoKeyUsageDecrypt: |
+ return "decrypt"; |
+ case WebKit::WebCryptoKeyUsageSign: |
+ return "sign"; |
+ case WebKit::WebCryptoKeyUsageVerify: |
+ return "verify"; |
+ case WebKit::WebCryptoKeyUsageDerive: |
+ return "derive"; |
+ case WebKit::WebCryptoKeyUsageWrap: |
+ return "wrap"; |
+ case WebKit::WebCryptoKeyUsageUnwrap: |
+ return "unwrap"; |
+ case WebKit::EndOfWebCryptoKeyUsage: |
+ ASSERT_NOT_REACHED(); |
+ return 0; |
+ } |
+ ASSERT_NOT_REACHED(); |
+ return 0; |
+} |
+ |
+} // namespace |
+ |
+Key::Key(const WebKit::WebCryptoKey& key) |
+ : m_key(key) |
+{ |
+ ScriptWrappable::init(this); |
+} |
+ |
+String Key::type() const |
+{ |
+ return ASCIILiteral(keyTypeToString(m_key.type())); |
+} |
+ |
+bool Key::extractable() const |
+{ |
+ return m_key.extractable(); |
+} |
+ |
+Algorithm* Key::algorithm() |
+{ |
+ if (!m_algorithm) |
+ m_algorithm = Algorithm::create(m_key.algorithm()); |
+ return m_algorithm.get(); |
+} |
+ |
+Vector<String> Key::keyUsage() const |
+{ |
+ Vector<String> result; |
+ |
+ // The WebCryptoKeyUsage values are consecutive powers of 2. Test each one in order. |
+ for (int i = 0; (1 << i) <= WebKit::EndOfWebCryptoKeyUsage - 1; ++i) { |
abarth-chromium
2013/07/03 21:22:54
Why <= and -1 ? The normal idiom is < and no -1..
|
+ WebKit::WebCryptoKeyUsage usage = static_cast<WebKit::WebCryptoKeyUsage>(1 << i); |
+ if (m_key.keyUsage() & usage) |
+ result.append(ASCIILiteral(keyUsageToString(usage))); |
+ } |
+ return result; |
+} |
+ |
+// Here is an alternate implementation. It doesn't require any casting, however |
+// the notable downside is that anyone adding a new value to WebCryptoKeyUsage |
+// must also update this function. |
abarth-chromium
2013/07/03 21:22:54
I think the first version is better because it's l
eroman
2013/07/03 21:35:19
I have uploaded a new patch which switches over to
|
+Vector<String> Key::keyUsage() const |
+{ |
+ // Make sure we are testing against all the values. If this compile assertion |
+ // breaks, you must update the ifs below. |
+ const int NumEnumValues = 7; |
+ COMPILE_ASSERT(WebKit::EndOfWebCryptoKeyUsage == (1<<(NumEnumValues-1)) + 1, missing_enums); |
+ |
+ Vector<String> result; |
+ |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageEncrypt) |
+ result.append(ASCIILiteral("encrypt")); |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageDecrypt) |
+ result.append(ASCIILiteral("decrypt")); |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageSign) |
+ result.append(ASCIILiteral("sign")); |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageVerify) |
+ result.append(ASCIILiteral("verify")); |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageDerive) |
+ result.append(ASCIILiteral("derive")); |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageWrap) |
+ result.append(ASCIILiteral("wrap")); |
+ if (m_key_.keyUsage() & WebKit::WebCryptoKeyUsageUnwrap) |
+ result.append(ASCIILiteral("unwrap")); |
+ |
+ return result; |
+} |
+ |
+} // namespace WebCore |