gecko-dev/dom/crypto/KeyAlgorithmProxy.cpp

267 строки
8.2 KiB
C++

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "mozilla/dom/KeyAlgorithmProxy.h"
#include "js/StructuredClone.h"
#include "mozilla/Assertions.h"
#include "mozilla/dom/StructuredCloneHolder.h"
#include "mozilla/dom/WebCryptoCommon.h"
namespace mozilla::dom {
bool KeyAlgorithmProxy::WriteStructuredClone(
JSStructuredCloneWriter* aWriter) const {
if (!StructuredCloneHolder::WriteString(aWriter, mName) ||
!JS_WriteUint32Pair(aWriter, mType, KEY_ALGORITHM_SC_VERSION)) {
return false;
}
switch (mType) {
case AES:
return JS_WriteUint32Pair(aWriter, mAes.mLength, 0);
case KDF:
return true;
case HMAC:
return JS_WriteUint32Pair(aWriter, mHmac.mLength, 0) &&
StructuredCloneHolder::WriteString(aWriter, mHmac.mHash.mName);
case RSA: {
return JS_WriteUint32Pair(aWriter, mRsa.mModulusLength, 0) &&
WriteBuffer(aWriter, mRsa.mPublicExponent) &&
StructuredCloneHolder::WriteString(aWriter, mRsa.mHash.mName);
}
case EC:
return StructuredCloneHolder::WriteString(aWriter, mEc.mNamedCurve);
case OKP:
return true;
}
return false;
}
bool KeyAlgorithmProxy::ReadStructuredClone(JSStructuredCloneReader* aReader) {
uint32_t type, version, dummy;
if (!StructuredCloneHolder::ReadString(aReader, mName) ||
!JS_ReadUint32Pair(aReader, &type, &version)) {
return false;
}
if (version != KEY_ALGORITHM_SC_VERSION) {
return false;
}
switch (type) {
case AES: {
mType = AES;
uint32_t length;
if (!JS_ReadUint32Pair(aReader, &length, &dummy)) {
return false;
}
mAes.mLength = length;
mAes.mName = mName;
return true;
}
case KDF:
mType = KDF;
mKDF.mName = mName;
return true;
case HMAC: {
mType = HMAC;
if (!JS_ReadUint32Pair(aReader, &mHmac.mLength, &dummy) ||
!StructuredCloneHolder::ReadString(aReader, mHmac.mHash.mName)) {
return false;
}
mHmac.mName = mName;
return true;
}
case RSA: {
mType = RSA;
uint32_t modulusLength;
nsString hashName;
if (!JS_ReadUint32Pair(aReader, &modulusLength, &dummy) ||
!ReadBuffer(aReader, mRsa.mPublicExponent) ||
!StructuredCloneHolder::ReadString(aReader, mRsa.mHash.mName)) {
return false;
}
mRsa.mModulusLength = modulusLength;
mRsa.mName = mName;
return true;
}
case EC: {
mType = EC;
nsString namedCurve;
if (!StructuredCloneHolder::ReadString(aReader, mEc.mNamedCurve)) {
return false;
}
mEc.mName = mName;
return true;
}
}
return false;
}
CK_MECHANISM_TYPE
KeyAlgorithmProxy::Mechanism() const {
if (mType == HMAC) {
return GetMechanism(mHmac);
}
return MapAlgorithmNameToMechanism(mName);
}
nsString KeyAlgorithmProxy::JwkAlg() const {
if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_CBC)) {
switch (mAes.mLength) {
case 128:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128CBC);
case 192:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192CBC);
case 256:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256CBC);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_CTR)) {
switch (mAes.mLength) {
case 128:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128CTR);
case 192:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192CTR);
case 256:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256CTR);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_GCM)) {
switch (mAes.mLength) {
case 128:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128GCM);
case 192:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192GCM);
case 256:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256GCM);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_KW)) {
switch (mAes.mLength) {
case 128:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128KW);
case 192:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192KW);
case 256:
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256KW);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_HMAC)) {
nsString hashName = mHmac.mHash.mName;
if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS1);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS256);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS384);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS512);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSASSA_PKCS1)) {
nsString hashName = mRsa.mHash.mName;
if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS1);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS256);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS384);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS512);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSA_OAEP)) {
nsString hashName = mRsa.mHash.mName;
if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP_256);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP_384);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP_512);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSA_PSS)) {
nsString hashName = mRsa.mHash.mName;
if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS1);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS256);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS384);
} else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS512);
}
}
if (mName.EqualsLiteral(WEBCRYPTO_ALG_ECDSA)) {
nsString curveName = mEc.mNamedCurve;
if (curveName.EqualsLiteral(WEBCRYPTO_NAMED_CURVE_P256)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_ECDSA_P_256);
}
if (curveName.EqualsLiteral(WEBCRYPTO_NAMED_CURVE_P384)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_ECDSA_P_384);
}
if (curveName.EqualsLiteral(WEBCRYPTO_NAMED_CURVE_P521)) {
return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_ECDSA_P_521);
}
}
return nsString();
}
CK_MECHANISM_TYPE
KeyAlgorithmProxy::GetMechanism(const KeyAlgorithm& aAlgorithm) {
// For everything but HMAC, the name determines the mechanism
// HMAC is handled by the specialization below
return MapAlgorithmNameToMechanism(aAlgorithm.mName);
}
CK_MECHANISM_TYPE
KeyAlgorithmProxy::GetMechanism(const HmacKeyAlgorithm& aAlgorithm) {
// The use of HmacKeyAlgorithm doesn't completely prevent this
// method from being called with dictionaries that don't really
// represent HMAC key algorithms.
MOZ_ASSERT(aAlgorithm.mName.EqualsLiteral(WEBCRYPTO_ALG_HMAC));
CK_MECHANISM_TYPE hashMech;
hashMech = MapAlgorithmNameToMechanism(aAlgorithm.mHash.mName);
switch (hashMech) {
case CKM_SHA_1:
return CKM_SHA_1_HMAC;
case CKM_SHA256:
return CKM_SHA256_HMAC;
case CKM_SHA384:
return CKM_SHA384_HMAC;
case CKM_SHA512:
return CKM_SHA512_HMAC;
}
return UNKNOWN_CK_MECHANISM;
}
} // namespace mozilla::dom