summaryrefslogtreecommitdiffstats
path: root/dom/crypto/KeyAlgorithmProxy.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'dom/crypto/KeyAlgorithmProxy.cpp')
-rw-r--r--dom/crypto/KeyAlgorithmProxy.cpp258
1 files changed, 258 insertions, 0 deletions
diff --git a/dom/crypto/KeyAlgorithmProxy.cpp b/dom/crypto/KeyAlgorithmProxy.cpp
new file mode 100644
index 0000000000..ab8ea527b6
--- /dev/null
+++ b/dom/crypto/KeyAlgorithmProxy.cpp
@@ -0,0 +1,258 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "mozilla/dom/KeyAlgorithmProxy.h"
+
+#include "js/StructuredClone.h"
+#include "mozilla/Assertions.h"
+#include "mozilla/dom/StructuredCloneHolder.h"
+#include "mozilla/dom/WebCryptoCommon.h"
+
+namespace mozilla::dom {
+
+bool KeyAlgorithmProxy::WriteStructuredClone(
+ JSStructuredCloneWriter* aWriter) const {
+ if (!StructuredCloneHolder::WriteString(aWriter, mName) ||
+ !JS_WriteUint32Pair(aWriter, mType, KEY_ALGORITHM_SC_VERSION)) {
+ return false;
+ }
+
+ switch (mType) {
+ case AES:
+ return JS_WriteUint32Pair(aWriter, mAes.mLength, 0);
+ case HMAC:
+ return JS_WriteUint32Pair(aWriter, mHmac.mLength, 0) &&
+ StructuredCloneHolder::WriteString(aWriter, mHmac.mHash.mName);
+ case RSA: {
+ return JS_WriteUint32Pair(aWriter, mRsa.mModulusLength, 0) &&
+ WriteBuffer(aWriter, mRsa.mPublicExponent) &&
+ StructuredCloneHolder::WriteString(aWriter, mRsa.mHash.mName);
+ }
+ case EC:
+ return StructuredCloneHolder::WriteString(aWriter, mEc.mNamedCurve);
+ }
+
+ return false;
+}
+
+bool KeyAlgorithmProxy::ReadStructuredClone(JSStructuredCloneReader* aReader) {
+ uint32_t type, version, dummy;
+ if (!StructuredCloneHolder::ReadString(aReader, mName) ||
+ !JS_ReadUint32Pair(aReader, &type, &version)) {
+ return false;
+ }
+
+ if (version != KEY_ALGORITHM_SC_VERSION) {
+ return false;
+ }
+
+ switch (type) {
+ case AES: {
+ mType = AES;
+
+ uint32_t length;
+ if (!JS_ReadUint32Pair(aReader, &length, &dummy)) {
+ return false;
+ }
+
+ mAes.mLength = length;
+ mAes.mName = mName;
+ return true;
+ }
+ case HMAC: {
+ mType = HMAC;
+
+ if (!JS_ReadUint32Pair(aReader, &mHmac.mLength, &dummy) ||
+ !StructuredCloneHolder::ReadString(aReader, mHmac.mHash.mName)) {
+ return false;
+ }
+
+ mHmac.mName = mName;
+ return true;
+ }
+ case RSA: {
+ mType = RSA;
+
+ uint32_t modulusLength;
+ nsString hashName;
+ if (!JS_ReadUint32Pair(aReader, &modulusLength, &dummy) ||
+ !ReadBuffer(aReader, mRsa.mPublicExponent) ||
+ !StructuredCloneHolder::ReadString(aReader, mRsa.mHash.mName)) {
+ return false;
+ }
+
+ mRsa.mModulusLength = modulusLength;
+ mRsa.mName = mName;
+ return true;
+ }
+ case EC: {
+ mType = EC;
+
+ nsString namedCurve;
+ if (!StructuredCloneHolder::ReadString(aReader, mEc.mNamedCurve)) {
+ return false;
+ }
+
+ mEc.mName = mName;
+ return true;
+ }
+ }
+
+ return false;
+}
+
+CK_MECHANISM_TYPE
+KeyAlgorithmProxy::Mechanism() const {
+ if (mType == HMAC) {
+ return GetMechanism(mHmac);
+ }
+ return MapAlgorithmNameToMechanism(mName);
+}
+
+nsString KeyAlgorithmProxy::JwkAlg() const {
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_CBC)) {
+ switch (mAes.mLength) {
+ case 128:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128CBC);
+ case 192:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192CBC);
+ case 256:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256CBC);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_CTR)) {
+ switch (mAes.mLength) {
+ case 128:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128CTR);
+ case 192:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192CTR);
+ case 256:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256CTR);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_GCM)) {
+ switch (mAes.mLength) {
+ case 128:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128GCM);
+ case 192:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192GCM);
+ case 256:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256GCM);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_KW)) {
+ switch (mAes.mLength) {
+ case 128:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A128KW);
+ case 192:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A192KW);
+ case 256:
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_A256KW);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_HMAC)) {
+ nsString hashName = mHmac.mHash.mName;
+ if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS1);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS256);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS384);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_HS512);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSASSA_PKCS1)) {
+ nsString hashName = mRsa.mHash.mName;
+ if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS1);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS256);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS384);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RS512);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSA_OAEP)) {
+ nsString hashName = mRsa.mHash.mName;
+ if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP_256);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP_384);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_RSA_OAEP_512);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSA_PSS)) {
+ nsString hashName = mRsa.mHash.mName;
+ if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS1);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS256);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS384);
+ } else if (hashName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_PS512);
+ }
+ }
+
+ if (mName.EqualsLiteral(WEBCRYPTO_ALG_ECDSA)) {
+ nsString curveName = mEc.mNamedCurve;
+ if (curveName.EqualsLiteral(WEBCRYPTO_NAMED_CURVE_P256)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_ECDSA_P_256);
+ }
+ if (curveName.EqualsLiteral(WEBCRYPTO_NAMED_CURVE_P384)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_ECDSA_P_384);
+ }
+ if (curveName.EqualsLiteral(WEBCRYPTO_NAMED_CURVE_P521)) {
+ return NS_LITERAL_STRING_FROM_CSTRING(JWK_ALG_ECDSA_P_521);
+ }
+ }
+
+ return nsString();
+}
+
+CK_MECHANISM_TYPE
+KeyAlgorithmProxy::GetMechanism(const KeyAlgorithm& aAlgorithm) {
+ // For everything but HMAC, the name determines the mechanism
+ // HMAC is handled by the specialization below
+ return MapAlgorithmNameToMechanism(aAlgorithm.mName);
+}
+
+CK_MECHANISM_TYPE
+KeyAlgorithmProxy::GetMechanism(const HmacKeyAlgorithm& aAlgorithm) {
+ // The use of HmacKeyAlgorithm doesn't completely prevent this
+ // method from being called with dictionaries that don't really
+ // represent HMAC key algorithms.
+ MOZ_ASSERT(aAlgorithm.mName.EqualsLiteral(WEBCRYPTO_ALG_HMAC));
+
+ CK_MECHANISM_TYPE hashMech;
+ hashMech = MapAlgorithmNameToMechanism(aAlgorithm.mHash.mName);
+
+ switch (hashMech) {
+ case CKM_SHA_1:
+ return CKM_SHA_1_HMAC;
+ case CKM_SHA256:
+ return CKM_SHA256_HMAC;
+ case CKM_SHA384:
+ return CKM_SHA384_HMAC;
+ case CKM_SHA512:
+ return CKM_SHA512_HMAC;
+ }
+ return UNKNOWN_CK_MECHANISM;
+}
+
+} // namespace mozilla::dom