summaryrefslogtreecommitdiffstats
path: root/dom/webauthn/PublicKeyCredential.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
commit2aa4a82499d4becd2284cdb482213d541b8804dd (patch)
treeb80bf8bf13c3766139fbacc530efd0dd9d54394c /dom/webauthn/PublicKeyCredential.cpp
parentInitial commit. (diff)
downloadfirefox-upstream.tar.xz
firefox-upstream.zip
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--dom/webauthn/PublicKeyCredential.cpp152
1 files changed, 152 insertions, 0 deletions
diff --git a/dom/webauthn/PublicKeyCredential.cpp b/dom/webauthn/PublicKeyCredential.cpp
new file mode 100644
index 0000000000..56b067c2a9
--- /dev/null
+++ b/dom/webauthn/PublicKeyCredential.cpp
@@ -0,0 +1,152 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "mozilla/dom/Promise.h"
+#include "mozilla/dom/PublicKeyCredential.h"
+#include "mozilla/dom/WebAuthenticationBinding.h"
+#include "nsCycleCollectionParticipant.h"
+#include "mozilla/dom/AuthenticatorResponse.h"
+#include "mozilla/HoldDropJSObjects.h"
+
+#ifdef OS_WIN
+# include "WinWebAuthnManager.h"
+#endif
+
+namespace mozilla {
+namespace dom {
+
+NS_IMPL_CYCLE_COLLECTION_CLASS(PublicKeyCredential)
+NS_IMPL_CYCLE_COLLECTION_UNLINK_BEGIN_INHERITED(PublicKeyCredential, Credential)
+ tmp->mRawIdCachedObj = nullptr;
+NS_IMPL_CYCLE_COLLECTION_UNLINK_END
+
+NS_IMPL_CYCLE_COLLECTION_TRACE_BEGIN_INHERITED(PublicKeyCredential, Credential)
+ NS_IMPL_CYCLE_COLLECTION_TRACE_PRESERVED_WRAPPER
+ NS_IMPL_CYCLE_COLLECTION_TRACE_JS_MEMBER_CALLBACK(mRawIdCachedObj)
+NS_IMPL_CYCLE_COLLECTION_TRACE_END
+
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_BEGIN_INHERITED(PublicKeyCredential,
+ Credential)
+NS_IMPL_CYCLE_COLLECTION_TRAVERSE_END
+
+NS_IMPL_ADDREF_INHERITED(PublicKeyCredential, Credential)
+NS_IMPL_RELEASE_INHERITED(PublicKeyCredential, Credential)
+
+NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(PublicKeyCredential)
+NS_INTERFACE_MAP_END_INHERITING(Credential)
+
+PublicKeyCredential::PublicKeyCredential(nsPIDOMWindowInner* aParent)
+ : Credential(aParent), mRawIdCachedObj(nullptr) {
+ mozilla::HoldJSObjects(this);
+}
+
+PublicKeyCredential::~PublicKeyCredential() { mozilla::DropJSObjects(this); }
+
+JSObject* PublicKeyCredential::WrapObject(JSContext* aCx,
+ JS::Handle<JSObject*> aGivenProto) {
+ return PublicKeyCredential_Binding::Wrap(aCx, this, aGivenProto);
+}
+
+void PublicKeyCredential::GetRawId(JSContext* aCx,
+ JS::MutableHandle<JSObject*> aRetVal) {
+ if (!mRawIdCachedObj) {
+ mRawIdCachedObj = mRawId.ToArrayBuffer(aCx);
+ }
+ aRetVal.set(mRawIdCachedObj);
+}
+
+already_AddRefed<AuthenticatorResponse> PublicKeyCredential::Response() const {
+ RefPtr<AuthenticatorResponse> temp(mResponse);
+ return temp.forget();
+}
+
+nsresult PublicKeyCredential::SetRawId(CryptoBuffer& aBuffer) {
+ if (NS_WARN_IF(!mRawId.Assign(aBuffer))) {
+ return NS_ERROR_OUT_OF_MEMORY;
+ }
+ return NS_OK;
+}
+
+void PublicKeyCredential::SetResponse(RefPtr<AuthenticatorResponse> aResponse) {
+ mResponse = aResponse;
+}
+
+/* static */
+already_AddRefed<Promise>
+PublicKeyCredential::IsUserVerifyingPlatformAuthenticatorAvailable(
+ GlobalObject& aGlobal) {
+ nsIGlobalObject* globalObject = xpc::CurrentNativeGlobal(aGlobal.Context());
+ if (NS_WARN_IF(!globalObject)) {
+ return nullptr;
+ }
+
+ ErrorResult rv;
+ RefPtr<Promise> promise = Promise::Create(globalObject, rv);
+ if (rv.Failed()) {
+ return nullptr;
+ }
+
+// https://w3c.github.io/webauthn/#isUserVerifyingPlatformAuthenticatorAvailable
+//
+// If on latest windows, call system APIs, otherwise return false, as we don't
+// have other UVPAAs available at this time.
+#ifdef OS_WIN
+
+ if (WinWebAuthnManager::IsUserVerifyingPlatformAuthenticatorAvailable()) {
+ promise->MaybeResolve(true);
+ return promise.forget();
+ }
+
+#endif
+
+ promise->MaybeResolve(false);
+ return promise.forget();
+}
+
+/* static */
+already_AddRefed<Promise>
+PublicKeyCredential::IsExternalCTAP2SecurityKeySupported(
+ GlobalObject& aGlobal) {
+ nsIGlobalObject* globalObject = xpc::CurrentNativeGlobal(aGlobal.Context());
+ if (NS_WARN_IF(!globalObject)) {
+ return nullptr;
+ }
+
+ ErrorResult rv;
+ RefPtr<Promise> promise = Promise::Create(globalObject, rv);
+ if (rv.Failed()) {
+ return nullptr;
+ }
+
+#ifdef OS_WIN
+ if (WinWebAuthnManager::AreWebAuthNApisAvailable()) {
+ promise->MaybeResolve(true);
+ return promise.forget();
+ }
+#endif
+
+ promise->MaybeResolve(false);
+ return promise.forget();
+}
+
+void PublicKeyCredential::GetClientExtensionResults(
+ AuthenticationExtensionsClientOutputs& aResult) {
+ aResult = mClientExtensionOutputs;
+}
+
+void PublicKeyCredential::SetClientExtensionResultAppId(bool aResult) {
+ mClientExtensionOutputs.mAppid.Construct();
+ mClientExtensionOutputs.mAppid.Value() = aResult;
+}
+
+void PublicKeyCredential::SetClientExtensionResultHmacSecret(
+ bool aHmacCreateSecret) {
+ mClientExtensionOutputs.mHmacCreateSecret.Construct();
+ mClientExtensionOutputs.mHmacCreateSecret.Value() = aHmacCreateSecret;
+}
+
+} // namespace dom
+} // namespace mozilla