OLD | NEW |
(Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "content/child/webcrypto/structured_clone.h" |
| 6 |
| 7 #include "base/logging.h" |
| 8 #include "content/child/webcrypto/algorithm_dispatch.h" |
| 9 #include "content/child/webcrypto/platform_crypto.h" |
| 10 #include "content/child/webcrypto/status.h" |
| 11 #include "content/child/webcrypto/webcrypto_util.h" |
| 12 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
| 13 |
| 14 namespace content { |
| 15 |
| 16 namespace webcrypto { |
| 17 |
| 18 namespace { |
| 19 |
| 20 // Returns the key format to use for structured cloning. |
| 21 blink::WebCryptoKeyFormat GetCloneFormatForKeyType( |
| 22 blink::WebCryptoKeyType type) { |
| 23 switch (type) { |
| 24 case blink::WebCryptoKeyTypeSecret: |
| 25 return blink::WebCryptoKeyFormatRaw; |
| 26 case blink::WebCryptoKeyTypePublic: |
| 27 return blink::WebCryptoKeyFormatSpki; |
| 28 case blink::WebCryptoKeyTypePrivate: |
| 29 return blink::WebCryptoKeyFormatPkcs8; |
| 30 } |
| 31 |
| 32 NOTREACHED(); |
| 33 return blink::WebCryptoKeyFormatRaw; |
| 34 } |
| 35 |
| 36 // Converts a KeyAlgorithm into an equivalent Algorithm for import. |
| 37 blink::WebCryptoAlgorithm KeyAlgorithmToImportAlgorithm( |
| 38 const blink::WebCryptoKeyAlgorithm& algorithm) { |
| 39 switch (algorithm.paramsType()) { |
| 40 case blink::WebCryptoKeyAlgorithmParamsTypeAes: |
| 41 return CreateAlgorithm(algorithm.id()); |
| 42 case blink::WebCryptoKeyAlgorithmParamsTypeHmac: |
| 43 return CreateHmacImportAlgorithm(algorithm.hmacParams()->hash().id()); |
| 44 case blink::WebCryptoKeyAlgorithmParamsTypeRsaHashed: |
| 45 return CreateRsaHashedImportAlgorithm( |
| 46 algorithm.id(), algorithm.rsaHashedParams()->hash().id()); |
| 47 case blink::WebCryptoKeyAlgorithmParamsTypeNone: |
| 48 break; |
| 49 default: |
| 50 break; |
| 51 } |
| 52 return blink::WebCryptoAlgorithm::createNull(); |
| 53 } |
| 54 |
| 55 // There is some duplicated information in the serialized format used by |
| 56 // structured clone (since the KeyAlgorithm is serialized separately from the |
| 57 // key data). Use this extra information to further validate what was |
| 58 // deserialized from the key data. |
| 59 // |
| 60 // A failure here implies either a bug in the code, or that the serialized data |
| 61 // was corrupted. |
| 62 bool ValidateDeserializedKey(const blink::WebCryptoKey& key, |
| 63 const blink::WebCryptoKeyAlgorithm& algorithm, |
| 64 blink::WebCryptoKeyType type) { |
| 65 if (algorithm.id() != key.algorithm().id()) |
| 66 return false; |
| 67 |
| 68 if (key.type() != type) |
| 69 return false; |
| 70 |
| 71 switch (algorithm.paramsType()) { |
| 72 case blink::WebCryptoKeyAlgorithmParamsTypeAes: |
| 73 if (algorithm.aesParams()->lengthBits() != |
| 74 key.algorithm().aesParams()->lengthBits()) |
| 75 return false; |
| 76 break; |
| 77 case blink::WebCryptoKeyAlgorithmParamsTypeRsaHashed: |
| 78 if (algorithm.rsaHashedParams()->modulusLengthBits() != |
| 79 key.algorithm().rsaHashedParams()->modulusLengthBits()) |
| 80 return false; |
| 81 if (algorithm.rsaHashedParams()->publicExponent().size() != |
| 82 key.algorithm().rsaHashedParams()->publicExponent().size()) |
| 83 return false; |
| 84 if (memcmp(algorithm.rsaHashedParams()->publicExponent().data(), |
| 85 key.algorithm().rsaHashedParams()->publicExponent().data(), |
| 86 key.algorithm().rsaHashedParams()->publicExponent().size()) != |
| 87 0) |
| 88 return false; |
| 89 break; |
| 90 case blink::WebCryptoKeyAlgorithmParamsTypeNone: |
| 91 case blink::WebCryptoKeyAlgorithmParamsTypeHmac: |
| 92 break; |
| 93 default: |
| 94 return false; |
| 95 } |
| 96 |
| 97 return true; |
| 98 } |
| 99 |
| 100 } // namespace |
| 101 |
| 102 // Note that this function is called from the target Blink thread. |
| 103 bool SerializeKeyForClone(const blink::WebCryptoKey& key, |
| 104 blink::WebVector<uint8>* key_data) { |
| 105 return PlatformSerializeKeyForClone(key, key_data); |
| 106 } |
| 107 |
| 108 // Note that this function is called from the target Blink thread. |
| 109 bool DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, |
| 110 blink::WebCryptoKeyType type, |
| 111 bool extractable, |
| 112 blink::WebCryptoKeyUsageMask usage_mask, |
| 113 const CryptoData& key_data, |
| 114 blink::WebCryptoKey* key) { |
| 115 // TODO(eroman): This should not call into the platform crypto layer. |
| 116 // Otherwise it runs the risk of stalling while the NSS/OpenSSL global locks |
| 117 // are held. |
| 118 // |
| 119 // An alternate approach is to defer the key import until the key is used. |
| 120 // However this means that any deserialization errors would have to be |
| 121 // surfaced as WebCrypto errors, leading to slightly different behaviors. For |
| 122 // instance you could clone a key which fails to be deserialized. |
| 123 Status status = ImportKey(GetCloneFormatForKeyType(type), |
| 124 key_data, |
| 125 KeyAlgorithmToImportAlgorithm(algorithm), |
| 126 extractable, |
| 127 usage_mask, |
| 128 key); |
| 129 if (status.IsError()) |
| 130 return false; |
| 131 return ValidateDeserializedKey(*key, algorithm, type); |
| 132 } |
| 133 |
| 134 } // namespace webcrypto |
| 135 |
| 136 } // namespace content |
OLD | NEW |