blob: 7f6ae98ec4a51f9a119d570b7a7b4969abe254c6 [file] [log] [blame]
/*
* Copyright (C) 2013 Google Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form must reproduce the above
* copyright notice, this list of conditions and the following disclaimer
* in the documentation and/or other materials provided with the
* distribution.
* * Neither the name of Google Inc. nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "modules/crypto/Key.h"
#include "bindings/v8/ExceptionState.h"
#include "core/dom/ExceptionCode.h"
#include "modules/crypto/Algorithm.h"
#include "public/platform/WebCryptoAlgorithmParams.h"
namespace WebCore {
namespace {
const char* keyTypeToString(WebKit::WebCryptoKeyType type)
{
switch (type) {
case WebKit::WebCryptoKeyTypeSecret:
return "secret";
case WebKit::WebCryptoKeyTypePublic:
return "public";
case WebKit::WebCryptoKeyTypePrivate:
return "private";
}
ASSERT_NOT_REACHED();
return 0;
}
struct KeyUsageMapping {
WebKit::WebCryptoKeyUsage value;
const char* const name;
};
const KeyUsageMapping keyUsageMappings[] = {
{ WebKit::WebCryptoKeyUsageEncrypt, "encrypt" },
{ WebKit::WebCryptoKeyUsageDecrypt, "decrypt" },
{ WebKit::WebCryptoKeyUsageSign, "sign" },
{ WebKit::WebCryptoKeyUsageVerify, "verify" },
{ WebKit::WebCryptoKeyUsageDeriveKey, "deriveKey" },
{ WebKit::WebCryptoKeyUsageWrapKey, "wrapKey" },
{ WebKit::WebCryptoKeyUsageUnwrapKey, "unwrapKey" },
};
COMPILE_ASSERT(WebKit::EndOfWebCryptoKeyUsage == (1 << 6) + 1, update_keyUsageMappings);
const char* keyUsageToString(WebKit::WebCryptoKeyUsage usage)
{
for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) {
if (keyUsageMappings[i].value == usage)
return keyUsageMappings[i].name;
}
ASSERT_NOT_REACHED();
return 0;
}
WebKit::WebCryptoKeyUsageMask keyUsageStringToMask(const String& usageString)
{
for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) {
if (keyUsageMappings[i].name == usageString)
return keyUsageMappings[i].value;
}
return 0;
}
WebKit::WebCryptoKeyUsageMask toKeyUsage(AlgorithmOperation operation)
{
switch (operation) {
case Encrypt:
return WebKit::WebCryptoKeyUsageEncrypt;
case Decrypt:
return WebKit::WebCryptoKeyUsageDecrypt;
case Sign:
return WebKit::WebCryptoKeyUsageSign;
case Verify:
return WebKit::WebCryptoKeyUsageVerify;
case DeriveKey:
return WebKit::WebCryptoKeyUsageDeriveKey;
case WrapKey:
return WebKit::WebCryptoKeyUsageWrapKey;
case UnwrapKey:
return WebKit::WebCryptoKeyUsageUnwrapKey;
case Digest:
case GenerateKey:
case ImportKey:
case NumberOfAlgorithmOperations:
break;
}
ASSERT_NOT_REACHED();
return 0;
}
bool getHmacHashId(const WebKit::WebCryptoAlgorithm& algorithm, WebKit::WebCryptoAlgorithmId& hashId)
{
if (algorithm.hmacParams()) {
hashId = algorithm.hmacParams()->hash().id();
return true;
}
if (algorithm.hmacKeyParams()) {
hashId = algorithm.hmacKeyParams()->hash().id();
return true;
}
return false;
}
} // namespace
Key::~Key()
{
}
Key::Key(const WebKit::WebCryptoKey& key)
: m_key(key)
{
ScriptWrappable::init(this);
}
String Key::type() const
{
return keyTypeToString(m_key.type());
}
bool Key::extractable() const
{
return m_key.extractable();
}
Algorithm* Key::algorithm()
{
if (!m_algorithm)
m_algorithm = Algorithm::create(m_key.algorithm());
return m_algorithm.get();
}
// FIXME: This creates a new javascript array each time. What should happen
// instead is return the same (immutable) array. (Javascript callers can
// distinguish this by doing an == test on the arrays and seeing they are
// different).
Vector<String> Key::usages() const
{
Vector<String> result;
for (size_t i = 0; i < WTF_ARRAY_LENGTH(keyUsageMappings); ++i) {
WebKit::WebCryptoKeyUsage usage = keyUsageMappings[i].value;
if (m_key.usages() & usage)
result.append(keyUsageToString(usage));
}
return result;
}
bool Key::canBeUsedForAlgorithm(const WebKit::WebCryptoAlgorithm& algorithm, AlgorithmOperation op, ExceptionState& es) const
{
if (!(m_key.usages() & toKeyUsage(op))) {
es.throwDOMException(NotSupportedError, "key.usages does not permit this operation");
return false;
}
if (m_key.algorithm().id() != algorithm.id()) {
es.throwDOMException(NotSupportedError, "key.algorithm does not match that of operation");
return false;
}
// Verify that the algorithm-specific parameters for the key conform to the
// algorithm.
if (m_key.algorithm().id() == WebKit::WebCryptoAlgorithmIdHmac) {
WebKit::WebCryptoAlgorithmId keyHash;
WebKit::WebCryptoAlgorithmId algorithmHash;
if (!getHmacHashId(m_key.algorithm(), keyHash) || !getHmacHashId(algorithm, algorithmHash) || keyHash != algorithmHash) {
es.throwDOMException(NotSupportedError, "key.algorithm does not match that of operation (HMAC's hash differs)");
return false;
}
}
return true;
}
bool Key::parseFormat(const String& formatString, WebKit::WebCryptoKeyFormat& format, ExceptionState& es)
{
// There are few enough values that testing serially is fast enough.
if (formatString == "raw") {
format = WebKit::WebCryptoKeyFormatRaw;
return true;
}
if (formatString == "pkcs8") {
format = WebKit::WebCryptoKeyFormatPkcs8;
return true;
}
if (formatString == "spki") {
format = WebKit::WebCryptoKeyFormatSpki;
return true;
}
if (formatString == "jwk") {
format = WebKit::WebCryptoKeyFormatJwk;
return true;
}
es.throwTypeError("Invalid keyFormat argument");
return false;
}
bool Key::parseUsageMask(const Vector<String>& usages, WebKit::WebCryptoKeyUsageMask& mask, ExceptionState& es)
{
mask = 0;
for (size_t i = 0; i < usages.size(); ++i) {
WebKit::WebCryptoKeyUsageMask usage = keyUsageStringToMask(usages[i]);
if (!usage) {
es.throwTypeError("Invalid keyUsages argument");
return false;
}
mask |= usage;
}
return true;
}
} // namespace WebCore