Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/renderer/webcrypto_impl.h" | 5 #include "content/renderer/webcrypto_impl.h" |
| 6 | 6 |
| 7 #include <openssl/evp.h> | |
| 8 | |
| 9 #include "base/logging.h" | |
| 10 #include "crypto/openssl_util.h" | |
| 11 #include "third_party/WebKit/public/platform/WebArrayBuffer.h" | |
| 12 #include "third_party/WebKit/public/platform/WebCryptoAlgorithm.h" | |
| 13 | |
| 7 namespace content { | 14 namespace content { |
| 8 | 15 |
| 9 void WebCryptoImpl::Init() { | 16 void WebCryptoImpl::Init() { crypto::EnsureOpenSSLInit(); } |
| 10 } | |
| 11 | 17 |
| 12 bool WebCryptoImpl::DigestInternal( | 18 bool WebCryptoImpl::DigestInternal(const WebKit::WebCryptoAlgorithm& algorithm, |
| 13 const WebKit::WebCryptoAlgorithm& algorithm, | 19 const unsigned char* data, |
| 14 const unsigned char* data, | 20 unsigned data_size, |
| 15 unsigned data_size, | 21 WebKit::WebArrayBuffer* buffer) { |
| 16 WebKit::WebArrayBuffer* buffer) { | 22 |
| 17 // TODO(bryaneyler): Placeholder for OpenSSL implementation. | 23 crypto::OpenSSLErrStackTracer(FROM_HERE); |
| 18 // Issue http://crbug.com/267888. | 24 |
| 19 return false; | 25 const EVP_MD* digest_algorithm; |
| 26 switch (algorithm.id()) { | |
| 27 case WebKit::WebCryptoAlgorithmIdSha1: | |
| 28 digest_algorithm = EVP_sha1(); | |
| 29 break; | |
| 30 case WebKit::WebCryptoAlgorithmIdSha224: | |
| 31 digest_algorithm = EVP_sha224(); | |
| 32 break; | |
| 33 case WebKit::WebCryptoAlgorithmIdSha256: | |
| 34 digest_algorithm = EVP_sha256(); | |
| 35 break; | |
| 36 case WebKit::WebCryptoAlgorithmIdSha384: | |
| 37 digest_algorithm = EVP_sha384(); | |
| 38 break; | |
| 39 case WebKit::WebCryptoAlgorithmIdSha512: | |
| 40 digest_algorithm = EVP_sha512(); | |
| 41 break; | |
| 42 default: | |
| 43 // Not a digest algorithm. | |
| 44 return false; | |
| 45 } | |
| 46 | |
| 47 crypto::ScopedOpenSSL<EVP_MD_CTX, EVP_MD_CTX_destroy> digest_context( | |
| 48 EVP_MD_CTX_create()); | |
| 49 if (!digest_context.get()) { | |
| 50 return false; | |
| 51 } | |
| 52 | |
| 53 if (!EVP_DigestInit_ex(digest_context.get(), digest_algorithm, NULL) || | |
| 54 !EVP_DigestUpdate(digest_context.get(), data, data_size)) { | |
| 55 return false; | |
| 56 } | |
| 57 | |
| 58 const int hash_expected_size = EVP_MD_CTX_size(digest_context.get()); | |
| 59 if (hash_expected_size <= 0) { | |
|
Bryan Eyler
2013/09/25 22:33:05
Would this be better as a DCHECK, since this shoul
padolph
2013/09/25 22:48:39
Probably, but I'm not sure we can define exact pro
| |
| 60 return false; | |
| 61 } | |
| 62 DCHECK_LE(hash_expected_size, EVP_MAX_MD_SIZE); | |
| 63 | |
| 64 *buffer = WebKit::WebArrayBuffer::create(hash_expected_size, 1); | |
| 65 unsigned char* const hash_buffer = | |
| 66 reinterpret_cast<unsigned char* const>(buffer->data()); | |
| 67 | |
| 68 unsigned hash_size = 0; | |
| 69 if (!EVP_DigestFinal_ex(digest_context.get(), hash_buffer, &hash_size) || | |
| 70 static_cast<int>(hash_size) != hash_expected_size) { | |
| 71 buffer->reset(); | |
| 72 return false; | |
| 73 } | |
| 74 | |
| 75 return true; | |
| 20 } | 76 } |
| 21 | 77 |
| 22 bool WebCryptoImpl::ImportKeyInternal( | 78 bool WebCryptoImpl::ImportKeyInternal( |
| 23 WebKit::WebCryptoKeyFormat format, | 79 WebKit::WebCryptoKeyFormat format, |
| 24 const unsigned char* key_data, | 80 const unsigned char* key_data, |
| 25 unsigned key_data_size, | 81 unsigned key_data_size, |
| 26 const WebKit::WebCryptoAlgorithm& algorithm, | 82 const WebKit::WebCryptoAlgorithm& algorithm, |
| 27 WebKit::WebCryptoKeyUsageMask usage_mask, | 83 WebKit::WebCryptoKeyUsageMask usage_mask, |
| 28 scoped_ptr<WebKit::WebCryptoKeyHandle>* handle, | 84 scoped_ptr<WebKit::WebCryptoKeyHandle>* handle, |
| 29 WebKit::WebCryptoKeyType* type) { | 85 WebKit::WebCryptoKeyType* type) { |
| 30 // TODO(bryaneyler): Placeholder for OpenSSL implementation. | 86 // TODO(bryaneyler): Placeholder for OpenSSL implementation. |
| 31 // Issue http://crbug.com/267888. | 87 // Issue http://crbug.com/267888. |
| 32 return false; | 88 return false; |
| 33 } | 89 } |
| 34 | 90 |
| 35 bool WebCryptoImpl::SignInternal( | 91 bool WebCryptoImpl::SignInternal( |
| 36 const WebKit::WebCryptoAlgorithm& algorithm, | 92 const WebKit::WebCryptoAlgorithm& algorithm, |
| 37 const WebKit::WebCryptoKey& key, | 93 const WebKit::WebCryptoKey& key, |
| 38 const unsigned char* data, | 94 const unsigned char* data, |
| 39 unsigned data_size, | 95 unsigned data_size, |
| 40 WebKit::WebArrayBuffer* buffer) { | 96 WebKit::WebArrayBuffer* buffer) { |
| 41 // TODO(bryaneyler): Placeholder for OpenSSL implementation. | 97 // TODO(bryaneyler): Placeholder for OpenSSL implementation. |
| 42 // Issue http://crbug.com/267888. | 98 // Issue http://crbug.com/267888. |
| 43 return false; | 99 return false; |
| 44 } | 100 } |
| 45 | 101 |
| 46 } // namespace content | 102 } // namespace content |
| OLD | NEW |