OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2013 Google Inc. All rights reserved. | 2 * Copyright (C) 2013 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
44 return "secret"; | 44 return "secret"; |
45 case WebKit::WebCryptoKeyTypePublic: | 45 case WebKit::WebCryptoKeyTypePublic: |
46 return "public"; | 46 return "public"; |
47 case WebKit::WebCryptoKeyTypePrivate: | 47 case WebKit::WebCryptoKeyTypePrivate: |
48 return "private"; | 48 return "private"; |
49 } | 49 } |
50 ASSERT_NOT_REACHED(); | 50 ASSERT_NOT_REACHED(); |
51 return 0; | 51 return 0; |
52 } | 52 } |
53 | 53 |
| 54 struct KeyUsageMapping { |
| 55 WebKit::WebCryptoKeyUsage value; |
| 56 const char* const name; |
| 57 }; |
| 58 |
| 59 const KeyUsageMapping keyUsageMappings[] = { |
| 60 { WebKit::WebCryptoKeyUsageEncrypt, "encrypt" }, |
| 61 { WebKit::WebCryptoKeyUsageDecrypt, "decrypt" }, |
| 62 { WebKit::WebCryptoKeyUsageSign, "sign" }, |
| 63 { WebKit::WebCryptoKeyUsageVerify, "verify" }, |
| 64 { WebKit::WebCryptoKeyUsageDeriveKey, "deriveKey" }, |
| 65 { WebKit::WebCryptoKeyUsageWrapKey, "wrapKey" }, |
| 66 { WebKit::WebCryptoKeyUsageUnwrapKey, "unwrapKey" }, |
| 67 }; |
| 68 |
| 69 COMPILE_ASSERT(WebKit::EndOfWebCryptoKeyUsage == (1 << 6) + 1, update_keyUsageMa
ppings); |
| 70 |
54 const char* keyUsageToString(WebKit::WebCryptoKeyUsage usage) | 71 const char* keyUsageToString(WebKit::WebCryptoKeyUsage usage) |
55 { | 72 { |
56 switch (usage) { | 73 for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) { |
57 case WebKit::WebCryptoKeyUsageEncrypt: | 74 if (keyUsageMappings[i].value == usage) |
58 return "encrypt"; | 75 return keyUsageMappings[i].name; |
59 case WebKit::WebCryptoKeyUsageDecrypt: | |
60 return "decrypt"; | |
61 case WebKit::WebCryptoKeyUsageSign: | |
62 return "sign"; | |
63 case WebKit::WebCryptoKeyUsageVerify: | |
64 return "verify"; | |
65 case WebKit::WebCryptoKeyUsageDeriveKey: | |
66 return "deriveKey"; | |
67 case WebKit::WebCryptoKeyUsageWrapKey: | |
68 return "wrapKey"; | |
69 case WebKit::WebCryptoKeyUsageUnwrapKey: | |
70 return "unwrapKey"; | |
71 case WebKit::EndOfWebCryptoKeyUsage: | |
72 break; | |
73 } | 76 } |
74 ASSERT_NOT_REACHED(); | 77 ASSERT_NOT_REACHED(); |
75 return 0; | 78 return 0; |
76 } | 79 } |
77 | 80 |
| 81 WebKit::WebCryptoKeyUsageMask keyUsageStringToMask(const String& usageString) |
| 82 { |
| 83 for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) { |
| 84 if (keyUsageMappings[i].name == usageString) |
| 85 return keyUsageMappings[i].value; |
| 86 } |
| 87 return 0; |
| 88 } |
| 89 |
78 } // namespace | 90 } // namespace |
79 | 91 |
| 92 Key::~Key() |
| 93 { |
| 94 } |
| 95 |
80 Key::Key(const WebKit::WebCryptoKey& key) | 96 Key::Key(const WebKit::WebCryptoKey& key) |
81 : m_key(key) | 97 : m_key(key) |
82 { | 98 { |
83 ScriptWrappable::init(this); | 99 ScriptWrappable::init(this); |
84 } | 100 } |
85 | 101 |
86 String Key::type() const | 102 String Key::type() const |
87 { | 103 { |
88 return ASCIILiteral(keyTypeToString(m_key.type())); | 104 return ASCIILiteral(keyTypeToString(m_key.type())); |
89 } | 105 } |
(...skipping 10 matching lines...) Expand all Loading... |
100 return m_algorithm.get(); | 116 return m_algorithm.get(); |
101 } | 117 } |
102 | 118 |
103 // FIXME: This creates a new javascript array each time. What should happen | 119 // FIXME: This creates a new javascript array each time. What should happen |
104 // instead is return the same (immutable) array. (Javascript callers can | 120 // instead is return the same (immutable) array. (Javascript callers can |
105 // distinguish this by doing an == test on the arrays and seeing they are | 121 // distinguish this by doing an == test on the arrays and seeing they are |
106 // different). | 122 // different). |
107 Vector<String> Key::usages() const | 123 Vector<String> Key::usages() const |
108 { | 124 { |
109 Vector<String> result; | 125 Vector<String> result; |
110 | 126 for (int i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) { |
111 // The WebCryptoKeyUsage values are consecutive powers of 2. Test each one i
n order. | 127 WebKit::WebCryptoKeyUsage usage = keyUsageMappings[i].value; |
112 for (int i = 0; (1 << i) < WebKit::EndOfWebCryptoKeyUsage; ++i) { | |
113 WebKit::WebCryptoKeyUsage usage = static_cast<WebKit::WebCryptoKeyUsage>
(1 << i); | |
114 if (m_key.usages() & usage) | 128 if (m_key.usages() & usage) |
115 result.append(ASCIILiteral(keyUsageToString(usage))); | 129 result.append(ASCIILiteral(keyUsageToString(usage))); |
116 } | 130 } |
117 return result; | 131 return result; |
118 } | 132 } |
119 | 133 |
| 134 bool Key::parseFormat(const String& formatString, WebKit::WebCryptoKeyFormat& fo
rmat) |
| 135 { |
| 136 // There are few enough values that testing serially is fast enough. |
| 137 if (formatString == "raw") { |
| 138 format = WebKit::WebCryptoKeyFormatRaw; |
| 139 return true; |
| 140 } |
| 141 if (formatString == "pkcs8") { |
| 142 format = WebKit::WebCryptoKeyFormatPkcs8; |
| 143 return true; |
| 144 } |
| 145 if (formatString == "spki") { |
| 146 format = WebKit::WebCryptoKeyFormatSpki; |
| 147 return true; |
| 148 } |
| 149 if (formatString == "jwk") { |
| 150 format = WebKit::WebCryptoKeyFormatJwk; |
| 151 return true; |
| 152 } |
| 153 |
| 154 return false; |
| 155 } |
| 156 |
| 157 bool Key::parseUsageMask(const Vector<String>& usages, WebKit::WebCryptoKeyUsage
Mask& mask) |
| 158 { |
| 159 mask = 0; |
| 160 for (size_t i = 0; i < usages.size(); ++i) { |
| 161 WebKit::WebCryptoKeyUsageMask usage = keyUsageStringToMask(usages[i]); |
| 162 if (!usage) |
| 163 return false; |
| 164 mask |= usage; |
| 165 } |
| 166 return true; |
| 167 } |
| 168 |
120 } // namespace WebCore | 169 } // namespace WebCore |
OLD | NEW |