Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(64)

Unified Diff: chrome/renderer/resources/extensions/enterprise_platform_keys/subtle_crypto.js

Issue 214863002: Extension API enterprise.platformKeys. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Asynchronous calls revisited. Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/renderer/resources/extensions/enterprise_platform_keys/subtle_crypto.js
diff --git a/chrome/renderer/resources/extensions/enterprise_platform_keys/subtle_crypto.js b/chrome/renderer/resources/extensions/enterprise_platform_keys/subtle_crypto.js
new file mode 100644
index 0000000000000000000000000000000000000000..e6a5ed1defbf14daa3698cea5fc0a7924a21335a
--- /dev/null
+++ b/chrome/renderer/resources/extensions/enterprise_platform_keys/subtle_crypto.js
@@ -0,0 +1,144 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+var utils = require('utils');
+var internalAPI = require('enterprise.platformKeys.internalAPI');
+var intersect = require('enterprise.platformKeys.utils').intersect;
+var KeyPair = require('enterprise.platformKeys.KeyPair').KeyPair;
+var keyModule = require('enterprise.platformKeys.Key');
+var getSpki = keyModule.getSpki;
+var KeyUsage = keyModule.KeyUsage;
+
+// This error is thrown by the internal and public API's token functions and
+// must be rethrown by this custom binding. Keep this in sync with the C++ part
+// of this API.
+var errorInvalidToken = "The token is not valid.";
+
+// The following errors are specified in WebCrypto.
+// TODO(pneubeck): These should be DOMExceptions.
+function CreateNotSupportedError() {
+ return new Error('The algorithm is not supported');
+}
+
+function CreateInvalidAccessError() {
+ return new Error('The requested operation is not valid for the provided key');
+}
+
+function CreateDataError() {
+ return new Error('Data provided to an operation does not meet requirements');
+}
+
+function CreateSyntaxError() {
+ return new Error('A required parameter was missing our out-of-range');
+}
+
+function CreateOperationError() {
+ return new Error('The operation failed for an operation-specific reason');
+}
+
+// Catches an |internalErrorInvalidToken|. If so, forwards it to |reject| and
+// returns true.
+function catchInvalidTokenError(reject) {
+ if (chrome.runtime.lastError &&
+ chrome.runtime.lastError.message == errorInvalidToken) {
+ reject(chrome.runtime.lastError);
+ return true;
+ }
+ return false;
+}
+
+/**
+ * Implementation of WebCrypto.SubtleCrypto used in enterprise.platformKeys.
+ * @param {string} tokenId The id of the backing Token.
+ * @constructor
+ */
+var SubtleCryptoImpl = function(tokenId) {
+ this.tokenId = tokenId;
+};
+
+SubtleCryptoImpl.prototype.generateKey =
+ function(algorithm, extractable, keyUsages) {
+ var subtleCrypto = this;
+ return new Promise(function(resolve, reject) {
+ // TODO(pneubeck): Apply the algorithm normalization of the WebCrypto
+ // implementation.
+
+ if (extractable) {
+ // Note: This deviates from WebCrypto.SubtleCrypto.
+ throw CreateNotSupportedError();
+ }
+ if (intersect(keyUsages, [KeyUsage.sign, KeyUsage.verify]).length !=
+ keyUsages.length) {
+ throw CreateDataError();
+ }
+ if (!algorithm.name) {
+ // TODO(pneubeck): It's not clear from the WebCrypto spec which error to
+ // throw here.
+ throw CreateSyntaxError();
+ }
+
+ if (algorithm.name != 'RSASSA-PKCS1-v1_5') {
eroman 2014/05/19 23:27:45 Should allow case-insensitive comparison.
pneubeck (no reviews) 2014/05/20 09:29:21 Done. Note that I want to reuse the normalization
+ // Note: This deviates from WebCrypto.SubtleCrypto.
+ throw CreateNotSupportedError();
+ }
+ if (!algorithm.modulusLength || !algorithm.publicExponent)
+ throw CreateSyntaxError();
+
+ internalAPI.generateKey(
+ subtleCrypto.tokenId, algorithm.modulusLength, function(spki) {
+ if (catchInvalidTokenError(reject))
+ return;
+ if (chrome.runtime.lastError) {
+ reject(CreateOperationError());
+ return;
+ }
+ resolve(new KeyPair(spki, algorithm, keyUsages));
+ });
+ });
+};
+
+SubtleCryptoImpl.prototype.sign = function(algorithm, key, dataView) {
+ var subtleCrypto = this;
+ return new Promise(function(resolve, reject) {
+ if (key.type != 'private' || key.usages.indexOf(KeyUsage.sign) == -1)
+ throw CreateInvalidAccessError();
+
+ // Create an ArrayBuffer that equals the dataView. Note that dataView.buffer
+ // might contain more data than dataView.
+ var data = dataView.buffer.slice(dataView.byteOffset,
+ dataView.byteOffset + dataView.byteLength);
+ internalAPI.sign(
+ subtleCrypto.tokenId, getSpki(key), data, function(signature) {
+ if (catchInvalidTokenError(reject))
+ return;
+ if (chrome.runtime.lastError) {
+ reject(CreateOperationError());
+ return;
+ }
+ resolve(signature);
+ });
+ });
+};
+
+SubtleCryptoImpl.prototype.exportKey = function(format, key) {
+ return new Promise(function(resolve, reject) {
+ if (format == 'pkcs8') {
+ // Either key.type is not 'private' or the key is not extractable. In both
+ // cases the error is the same.
+ throw CreateInvalidAccessError();
+ } else if (format == 'spki') {
+ if (key.type != 'public')
+ throw CreateInvalidAccessError();
+ resolve(getSpki(key));
+ } else {
+ // TODO(pneubeck): It should be possible to export to format 'jwk'.
+ throw CreateNotSupportedError();
+ }
+ });
+};
+
+exports.SubtleCrypto =
+ utils.expose('SubtleCrypto',
+ SubtleCryptoImpl,
+ {functions:['generateKey', 'sign', 'exportKey']});

Powered by Google App Engine
This is Rietveld 408576698