diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
commit | 36d22d82aa202bb199967e9512281e9a53db42c9 (patch) | |
tree | 105e8c98ddea1c1e4784a60a5a6410fa416be2de /dom/webauthn/AndroidWebAuthnTokenManager.h | |
parent | Initial commit. (diff) | |
download | firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip |
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/webauthn/AndroidWebAuthnTokenManager.h')
-rw-r--r-- | dom/webauthn/AndroidWebAuthnTokenManager.h | 143 |
1 files changed, 143 insertions, 0 deletions
diff --git a/dom/webauthn/AndroidWebAuthnTokenManager.h b/dom/webauthn/AndroidWebAuthnTokenManager.h new file mode 100644 index 0000000000..10620b1353 --- /dev/null +++ b/dom/webauthn/AndroidWebAuthnTokenManager.h @@ -0,0 +1,143 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef mozilla_dom_AndroidWebAuthnTokenManager_h +#define mozilla_dom_AndroidWebAuthnTokenManager_h + +#include "mozilla/dom/CryptoBuffer.h" +#include "mozilla/dom/U2FTokenTransport.h" +#include "mozilla/java/WebAuthnTokenManagerNatives.h" + +namespace mozilla { +namespace dom { + +// Collected from +// https://developers.google.com/android/reference/com/google/android/gms/fido/fido2/api/common/ErrorCode +constexpr auto kSecurityError = u"SECURITY_ERR"_ns; +constexpr auto kConstraintError = u"CONSTRAINT_ERR"_ns; +constexpr auto kNotSupportedError = u"NOT_SUPPORTED_ERR"_ns; +constexpr auto kInvalidStateError = u"INVALID_STATE_ERR"_ns; +constexpr auto kNotAllowedError = u"NOT_ALLOWED_ERR"_ns; +constexpr auto kAbortError = u"ABORT_ERR"_ns; +constexpr auto kEncodingError = u"ENCODING_ERR"_ns; +constexpr auto kDataError = u"DATA_ERR"_ns; +constexpr auto kTimeoutError = u"TIMEOUT_ERR"_ns; +constexpr auto kNetworkError = u"NETWORK_ERR"_ns; +constexpr auto kUnknownError = u"UNKNOWN_ERR"_ns; + +class AndroidWebAuthnResult { + public: + explicit AndroidWebAuthnResult(const nsAString& aErrorCode) + : mErrorCode(aErrorCode) {} + + explicit AndroidWebAuthnResult( + const java::WebAuthnTokenManager::MakeCredentialResponse::LocalRef& + aResponse); + + explicit AndroidWebAuthnResult( + const java::WebAuthnTokenManager::GetAssertionResponse::LocalRef& + aResponse); + + AndroidWebAuthnResult() = delete; + + bool IsError() const { return NS_FAILED(GetError()); } + + nsresult GetError() const { + if (mErrorCode.IsEmpty()) { + return NS_OK; + } else if (mErrorCode.Equals(kSecurityError)) { + return NS_ERROR_DOM_SECURITY_ERR; + } else if (mErrorCode.Equals(kConstraintError)) { + // TODO: The message is right, but it's not about indexeddb. + // See https://heycam.github.io/webidl/#constrainterror + return NS_ERROR_DOM_INDEXEDDB_CONSTRAINT_ERR; + } else if (mErrorCode.Equals(kNotSupportedError)) { + return NS_ERROR_DOM_NOT_SUPPORTED_ERR; + } else if (mErrorCode.Equals(kInvalidStateError)) { + return NS_ERROR_DOM_INVALID_STATE_ERR; + } else if (mErrorCode.Equals(kNotAllowedError)) { + return NS_ERROR_DOM_NOT_ALLOWED_ERR; + } else if (mErrorCode.Equals(kEncodingError)) { + return NS_ERROR_DOM_ENCODING_NOT_SUPPORTED_ERR; + } else if (mErrorCode.Equals(kDataError)) { + return NS_ERROR_DOM_DATA_ERR; + } else if (mErrorCode.Equals(kTimeoutError)) { + return NS_ERROR_DOM_TIMEOUT_ERR; + } else if (mErrorCode.Equals(kNetworkError)) { + return NS_ERROR_DOM_NETWORK_ERR; + } else if (mErrorCode.Equals(kAbortError)) { + return NS_ERROR_DOM_ABORT_ERR; + } else if (mErrorCode.Equals(kUnknownError)) { + return NS_ERROR_DOM_UNKNOWN_ERR; + } else { + __android_log_print(ANDROID_LOG_ERROR, "Gecko", + "RegisterAbort unknown code: %s", + NS_ConvertUTF16toUTF8(mErrorCode).get()); + return NS_ERROR_DOM_UNKNOWN_ERR; + } + } + + AndroidWebAuthnResult(const AndroidWebAuthnResult&) = delete; + AndroidWebAuthnResult(AndroidWebAuthnResult&&) = default; + + // Attestation-only + CryptoBuffer mAttObj; + + // Attestations and assertions + CryptoBuffer mKeyHandle; + nsCString mClientDataJSON; + + // Assertions-only + CryptoBuffer mAuthData; + CryptoBuffer mSignature; + CryptoBuffer mUserHandle; + + private: + const nsString mErrorCode; +}; + +/* + * WebAuthnAndroidTokenManager is a token implementation communicating with + * Android Fido2 APIs. + */ +class AndroidWebAuthnTokenManager final : public U2FTokenTransport { + public: + explicit AndroidWebAuthnTokenManager(); + ~AndroidWebAuthnTokenManager() {} + + virtual RefPtr<U2FRegisterPromise> Register( + const WebAuthnMakeCredentialInfo& aInfo, + bool aForceNoneAttestation) override; + + virtual RefPtr<U2FSignPromise> Sign( + const WebAuthnGetAssertionInfo& aInfo) override; + + void Cancel() override; + + void Drop() override; + + static AndroidWebAuthnTokenManager* GetInstance(); + + private: + void HandleRegisterResult(AndroidWebAuthnResult&& aResult); + + void HandleSignResult(AndroidWebAuthnResult&& aResult); + + void ClearPromises() { + mRegisterPromise.RejectIfExists(NS_ERROR_DOM_UNKNOWN_ERR, __func__); + mSignPromise.RejectIfExists(NS_ERROR_DOM_UNKNOWN_ERR, __func__); + } + + void AssertIsOnOwningThread() const; + + MozPromiseHolder<U2FRegisterPromise> mRegisterPromise; + MozPromiseHolder<U2FSignPromise> mSignPromise; +}; + +} // namespace dom +} // namespace mozilla + +#endif // mozilla_dom_AndroidWebAuthnTokenManager_h |