OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "content/child/webcrypto/structured_clone.h" | |
6 | |
7 #include "base/logging.h" | |
8 #include "content/child/webcrypto/algorithm_dispatch.h" | |
9 #include "content/child/webcrypto/platform_crypto.h" | |
10 #include "content/child/webcrypto/status.h" | |
11 #include "content/child/webcrypto/webcrypto_util.h" | |
12 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" | |
13 | |
14 namespace content { | |
15 | |
16 namespace webcrypto { | |
17 | |
18 namespace { | |
19 | |
20 // Returns the key format to use for structured cloning. | |
21 blink::WebCryptoKeyFormat GetCloneFormatForKeyType( | |
22 blink::WebCryptoKeyType type) { | |
23 switch (type) { | |
24 case blink::WebCryptoKeyTypeSecret: | |
25 return blink::WebCryptoKeyFormatRaw; | |
26 case blink::WebCryptoKeyTypePublic: | |
27 return blink::WebCryptoKeyFormatSpki; | |
28 case blink::WebCryptoKeyTypePrivate: | |
29 return blink::WebCryptoKeyFormatPkcs8; | |
30 } | |
31 | |
32 NOTREACHED(); | |
33 return blink::WebCryptoKeyFormatRaw; | |
34 } | |
35 | |
36 // Converts a KeyAlgorithm into an equivalent Algorithm for import. | |
37 blink::WebCryptoAlgorithm KeyAlgorithmToImportAlgorithm( | |
38 const blink::WebCryptoKeyAlgorithm& algorithm) { | |
39 switch (algorithm.paramsType()) { | |
40 case blink::WebCryptoKeyAlgorithmParamsTypeAes: | |
41 return CreateAlgorithm(algorithm.id()); | |
42 case blink::WebCryptoKeyAlgorithmParamsTypeHmac: | |
43 return CreateHmacImportAlgorithm(algorithm.hmacParams()->hash().id()); | |
44 case blink::WebCryptoKeyAlgorithmParamsTypeRsaHashed: | |
45 return CreateRsaHashedImportAlgorithm( | |
46 algorithm.id(), algorithm.rsaHashedParams()->hash().id()); | |
47 case blink::WebCryptoKeyAlgorithmParamsTypeNone: | |
48 break; | |
49 default: | |
50 break; | |
51 } | |
52 return blink::WebCryptoAlgorithm::createNull(); | |
53 } | |
54 | |
55 // There is some duplicated information in the serialized format used by | |
56 // structured clone (since the KeyAlgorithm is serialized separately from the | |
57 // key data). Use this extra information to further validate what was | |
58 // deserialized from the key data. | |
59 // | |
60 // A failure here implies either a bug in the code, or that the serialized data | |
61 // was corrupted. | |
62 bool ValidateDeserializedKey(const blink::WebCryptoKey& key, | |
63 const blink::WebCryptoKeyAlgorithm& algorithm, | |
64 blink::WebCryptoKeyType type) { | |
65 if (algorithm.id() != key.algorithm().id()) | |
66 return false; | |
67 | |
68 if (key.type() != type) | |
69 return false; | |
70 | |
71 switch (algorithm.paramsType()) { | |
72 case blink::WebCryptoKeyAlgorithmParamsTypeAes: | |
73 if (algorithm.aesParams()->lengthBits() != | |
74 key.algorithm().aesParams()->lengthBits()) | |
75 return false; | |
76 break; | |
77 case blink::WebCryptoKeyAlgorithmParamsTypeRsaHashed: | |
78 if (algorithm.rsaHashedParams()->modulusLengthBits() != | |
79 key.algorithm().rsaHashedParams()->modulusLengthBits()) | |
80 return false; | |
81 if (algorithm.rsaHashedParams()->publicExponent().size() != | |
82 key.algorithm().rsaHashedParams()->publicExponent().size()) | |
83 return false; | |
84 if (memcmp(algorithm.rsaHashedParams()->publicExponent().data(), | |
85 key.algorithm().rsaHashedParams()->publicExponent().data(), | |
86 key.algorithm().rsaHashedParams()->publicExponent().size()) != | |
87 0) | |
88 return false; | |
89 break; | |
90 case blink::WebCryptoKeyAlgorithmParamsTypeNone: | |
91 case blink::WebCryptoKeyAlgorithmParamsTypeHmac: | |
92 break; | |
93 default: | |
94 return false; | |
95 } | |
96 | |
97 return true; | |
98 } | |
99 | |
100 } // namespace | |
101 | |
102 // Note that this function is called from the target Blink thread. | |
103 bool SerializeKeyForClone(const blink::WebCryptoKey& key, | |
104 blink::WebVector<uint8>* key_data) { | |
105 return PlatformSerializeKeyForClone(key, key_data); | |
106 } | |
107 | |
108 // Note that this function is called from the target Blink thread. | |
109 bool DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, | |
110 blink::WebCryptoKeyType type, | |
111 bool extractable, | |
112 blink::WebCryptoKeyUsageMask usage_mask, | |
113 const CryptoData& key_data, | |
114 blink::WebCryptoKey* key) { | |
115 // TODO(eroman): This should not call into the platform crypto layer. | |
116 // Otherwise it runs the risk of stalling while the NSS/OpenSSL global locks | |
117 // are held. | |
118 // | |
119 // An alternate approach is to defer the key import until the key is used. | |
120 // However this means that any deserialization errors would have to be | |
121 // surfaced as WebCrypto errors, leading to slightly different behaviors. For | |
122 // instance you could clone a key which fails to be deserialized. | |
123 Status status = ImportKey(GetCloneFormatForKeyType(type), | |
124 key_data, | |
125 KeyAlgorithmToImportAlgorithm(algorithm), | |
126 extractable, | |
127 usage_mask, | |
128 key); | |
129 if (status.IsError()) | |
130 return false; | |
131 return ValidateDeserializedKey(*key, algorithm, type); | |
132 } | |
133 | |
134 } // namespace webcrypto | |
135 | |
136 } // namespace content | |
OLD | NEW |