CryptoAlgorithmAES_KW.cpp [plain text]
#include "config.h"
#include "CryptoAlgorithmAES_KW.h"
#if ENABLE(SUBTLE_CRYPTO)
#include "CryptoAlgorithmAesKeyGenParams.h"
#include "CryptoAlgorithmAesKeyGenParamsDeprecated.h"
#include "CryptoKeyAES.h"
#include "CryptoKeyDataOctetSequence.h"
#include "ExceptionCode.h"
namespace WebCore {
static const char* const ALG128 = "A128KW";
static const char* const ALG192 = "A192KW";
static const char* const ALG256 = "A256KW";
static inline bool usagesAreInvalidForCryptoAlgorithmAES_KW(CryptoKeyUsageBitmap usages)
{
return usages & (CryptoKeyUsageSign | CryptoKeyUsageVerify | CryptoKeyUsageDeriveKey | CryptoKeyUsageDeriveBits | CryptoKeyUsageEncrypt | CryptoKeyUsageDecrypt);
}
Ref<CryptoAlgorithm> CryptoAlgorithmAES_KW::create()
{
return adoptRef(*new CryptoAlgorithmAES_KW);
}
CryptoAlgorithmIdentifier CryptoAlgorithmAES_KW::identifier() const
{
return s_identifier;
}
bool CryptoAlgorithmAES_KW::keyAlgorithmMatches(const CryptoKey& key) const
{
if (key.algorithmIdentifier() != s_identifier)
return false;
ASSERT(is<CryptoKeyAES>(key));
return true;
}
void CryptoAlgorithmAES_KW::generateKey(const CryptoAlgorithmParameters& parameters, bool extractable, CryptoKeyUsageBitmap usages, KeyOrKeyPairCallback&& callback, ExceptionCallback&& exceptionCallback, ScriptExecutionContext&)
{
if (usagesAreInvalidForCryptoAlgorithmAES_KW(usages)) {
exceptionCallback(SYNTAX_ERR);
return;
}
auto result = CryptoKeyAES::generate(CryptoAlgorithmIdentifier::AES_KW, downcast<CryptoAlgorithmAesKeyGenParams>(parameters).length, extractable, usages);
if (!result) {
exceptionCallback(OperationError);
return;
}
callback(WTFMove(result));
}
void CryptoAlgorithmAES_KW::importKey(SubtleCrypto::KeyFormat format, KeyData&& data, const std::unique_ptr<CryptoAlgorithmParameters>&& parameters, bool extractable, CryptoKeyUsageBitmap usages, KeyCallback&& callback, ExceptionCallback&& exceptionCallback)
{
ASSERT(parameters);
if (usagesAreInvalidForCryptoAlgorithmAES_KW(usages)) {
exceptionCallback(SYNTAX_ERR);
return;
}
RefPtr<CryptoKeyAES> result;
switch (format) {
case SubtleCrypto::KeyFormat::Raw:
result = CryptoKeyAES::importRaw(parameters->identifier, WTFMove(WTF::get<Vector<uint8_t>>(data)), extractable, usages);
break;
case SubtleCrypto::KeyFormat::Jwk: {
result = CryptoKeyAES::importJwk(parameters->identifier, WTFMove(WTF::get<JsonWebKey>(data)), extractable, usages, [](size_t length, const std::optional<String>& alg) -> bool {
switch (length) {
case CryptoKeyAES::s_length128:
return !alg || alg.value() == ALG128;
case CryptoKeyAES::s_length192:
return !alg || alg.value() == ALG192;
case CryptoKeyAES::s_length256:
return !alg || alg.value() == ALG256;
}
return false;
});
break;
}
default:
exceptionCallback(NOT_SUPPORTED_ERR);
return;
}
if (!result) {
exceptionCallback(DataError);
return;
}
callback(*result);
}
void CryptoAlgorithmAES_KW::exportKey(SubtleCrypto::KeyFormat format, Ref<CryptoKey>&& key, KeyDataCallback&& callback, ExceptionCallback&& exceptionCallback)
{
const auto& aesKey = downcast<CryptoKeyAES>(key.get());
if (aesKey.key().isEmpty()) {
exceptionCallback(OperationError);
return;
}
KeyData result;
switch (format) {
case SubtleCrypto::KeyFormat::Raw:
result = Vector<uint8_t>(aesKey.key());
break;
case SubtleCrypto::KeyFormat::Jwk: {
JsonWebKey jwk = aesKey.exportJwk();
switch (aesKey.key().size() * 8) {
case CryptoKeyAES::s_length128:
jwk.alg = String(ALG128);
break;
case CryptoKeyAES::s_length192:
jwk.alg = String(ALG192);
break;
case CryptoKeyAES::s_length256:
jwk.alg = String(ALG256);
break;
default:
ASSERT_NOT_REACHED();
}
result = WTFMove(jwk);
break;
}
default:
exceptionCallback(NOT_SUPPORTED_ERR);
return;
}
callback(format, WTFMove(result));
}
void CryptoAlgorithmAES_KW::wrapKey(Ref<CryptoKey>&& key, Vector<uint8_t>&& data, VectorCallback&& callback, ExceptionCallback&& exceptionCallback)
{
if (data.size() % 8) {
exceptionCallback(OperationError);
return;
}
platformWrapKey(WTFMove(key), WTFMove(data), WTFMove(callback), WTFMove(exceptionCallback));
}
void CryptoAlgorithmAES_KW::unwrapKey(Ref<CryptoKey>&& key, Vector<uint8_t>&& data, VectorCallback&& callback, ExceptionCallback&& exceptionCallback)
{
platformUnwrapKey(WTFMove(key), WTFMove(data), WTFMove(callback), WTFMove(exceptionCallback));
}
ExceptionOr<void> CryptoAlgorithmAES_KW::encryptForWrapKey(const CryptoAlgorithmParametersDeprecated&, const CryptoKey& key, const CryptoOperationData& data, VectorCallback&& callback, VoidCallback&& failureCallback)
{
if (!keyAlgorithmMatches(key))
return Exception { NOT_SUPPORTED_ERR };
return platformEncrypt(downcast<CryptoKeyAES>(key), data, WTFMove(callback), WTFMove(failureCallback));
}
ExceptionOr<void> CryptoAlgorithmAES_KW::decryptForUnwrapKey(const CryptoAlgorithmParametersDeprecated&, const CryptoKey& key, const CryptoOperationData& data, VectorCallback&& callback, VoidCallback&& failureCallback)
{
if (!keyAlgorithmMatches(key))
return Exception { NOT_SUPPORTED_ERR };
return platformDecrypt(downcast<CryptoKeyAES>(key), data, WTFMove(callback), WTFMove(failureCallback));
}
ExceptionOr<void> CryptoAlgorithmAES_KW::generateKey(const CryptoAlgorithmParametersDeprecated& parameters, bool extractable, CryptoKeyUsageBitmap usages, KeyOrKeyPairCallback&& callback, VoidCallback&& failureCallback, ScriptExecutionContext&)
{
auto result = CryptoKeyAES::generate(CryptoAlgorithmIdentifier::AES_KW, downcast<CryptoAlgorithmAesKeyGenParamsDeprecated>(parameters).length, extractable, usages);
if (!result) {
failureCallback();
return { };
}
callback(WTFMove(result));
return { };
}
ExceptionOr<void> CryptoAlgorithmAES_KW::importKey(const CryptoAlgorithmParametersDeprecated&, const CryptoKeyData& keyData, bool extractable, CryptoKeyUsageBitmap usage, KeyCallback&& callback, VoidCallback&&)
{
if (!is<CryptoKeyDataOctetSequence>(keyData))
return Exception { NOT_SUPPORTED_ERR };
callback(CryptoKeyAES::create(CryptoAlgorithmIdentifier::AES_KW, downcast<CryptoKeyDataOctetSequence>(keyData).octetSequence(), extractable, usage));
return { };
}
}
#endif // ENABLE(SUBTLE_CRYPTO)