blob: 1f853b557a92df1ad300109a284363f490b63d7d [file] [log] [blame]
[email protected]38409aec2014-07-19 00:54:511// Copyright 2014 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "content/child/webcrypto/openssl/aes_key_openssl.h"
6
7#include "base/logging.h"
8#include "content/child/webcrypto/crypto_data.h"
9#include "content/child/webcrypto/jwk.h"
10#include "content/child/webcrypto/openssl/key_openssl.h"
11#include "content/child/webcrypto/openssl/sym_key_openssl.h"
12#include "content/child/webcrypto/status.h"
13#include "content/child/webcrypto/webcrypto_util.h"
14#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h"
15
16namespace content {
17
18namespace webcrypto {
19
20AesAlgorithm::AesAlgorithm(blink::WebCryptoKeyUsageMask all_key_usages,
21 const std::string& jwk_suffix)
22 : all_key_usages_(all_key_usages), jwk_suffix_(jwk_suffix) {
23}
24
25AesAlgorithm::AesAlgorithm(const std::string& jwk_suffix)
26 : all_key_usages_(blink::WebCryptoKeyUsageEncrypt |
27 blink::WebCryptoKeyUsageDecrypt |
28 blink::WebCryptoKeyUsageWrapKey |
29 blink::WebCryptoKeyUsageUnwrapKey),
30 jwk_suffix_(jwk_suffix) {
31}
32
eroman9b747eaf2014-10-18 22:03:2833Status AesAlgorithm::GenerateKey(const blink::WebCryptoAlgorithm& algorithm,
34 bool extractable,
eroman0e1d34e2014-10-21 19:13:3135 blink::WebCryptoKeyUsageMask usages,
eroman9b747eaf2014-10-18 22:03:2836 GenerateKeyResult* result) const {
eroman0e1d34e2014-10-21 19:13:3137 Status status = CheckKeyCreationUsages(all_key_usages_, usages);
eroman9b747eaf2014-10-18 22:03:2838 if (status.IsError())
39 return status;
[email protected]38409aec2014-07-19 00:54:5140
[email protected]38409aec2014-07-19 00:54:5141 unsigned int keylen_bits;
eroman9b747eaf2014-10-18 22:03:2842 status = GetAesKeyGenLengthInBits(algorithm.aesKeyGenParams(), &keylen_bits);
[email protected]38409aec2014-07-19 00:54:5143 if (status.IsError())
44 return status;
45
46 return GenerateSecretKeyOpenSsl(
47 blink::WebCryptoKeyAlgorithm::createAes(algorithm.id(), keylen_bits),
eroman38bb4bd2014-11-24 23:47:0648 extractable, usages, keylen_bits / 8, result);
[email protected]38409aec2014-07-19 00:54:5149}
50
51Status AesAlgorithm::VerifyKeyUsagesBeforeImportKey(
52 blink::WebCryptoKeyFormat format,
eroman0e1d34e2014-10-21 19:13:3153 blink::WebCryptoKeyUsageMask usages) const {
[email protected]38409aec2014-07-19 00:54:5154 switch (format) {
55 case blink::WebCryptoKeyFormatRaw:
56 case blink::WebCryptoKeyFormatJwk:
eroman0e1d34e2014-10-21 19:13:3157 return CheckKeyCreationUsages(all_key_usages_, usages);
[email protected]38409aec2014-07-19 00:54:5158 default:
59 return Status::ErrorUnsupportedImportKeyFormat();
60 }
61}
62
63Status AesAlgorithm::ImportKeyRaw(const CryptoData& key_data,
64 const blink::WebCryptoAlgorithm& algorithm,
65 bool extractable,
eroman0e1d34e2014-10-21 19:13:3166 blink::WebCryptoKeyUsageMask usages,
[email protected]38409aec2014-07-19 00:54:5167 blink::WebCryptoKey* key) const {
68 const unsigned int keylen_bytes = key_data.byte_length();
69 Status status = VerifyAesKeyLengthForImport(keylen_bytes);
70 if (status.IsError())
71 return status;
72
73 // No possibility of overflow.
74 unsigned int keylen_bits = keylen_bytes * 8;
75
eroman38bb4bd2014-11-24 23:47:0676 return ImportKeyRawOpenSsl(key_data, blink::WebCryptoKeyAlgorithm::createAes(
77 algorithm.id(), keylen_bits),
78 extractable, usages, key);
[email protected]38409aec2014-07-19 00:54:5179}
80
81Status AesAlgorithm::ImportKeyJwk(const CryptoData& key_data,
82 const blink::WebCryptoAlgorithm& algorithm,
83 bool extractable,
eroman0e1d34e2014-10-21 19:13:3184 blink::WebCryptoKeyUsageMask usages,
[email protected]38409aec2014-07-19 00:54:5185 blink::WebCryptoKey* key) const {
[email protected]53b6c9d22014-07-19 05:08:3886 std::vector<uint8_t> raw_data;
eroman38bb4bd2014-11-24 23:47:0687 Status status = ReadAesSecretKeyJwk(key_data, jwk_suffix_, extractable,
88 usages, &raw_data);
[email protected]38409aec2014-07-19 00:54:5189 if (status.IsError())
90 return status;
91
eroman38bb4bd2014-11-24 23:47:0692 return ImportKeyRaw(CryptoData(raw_data), algorithm, extractable, usages,
93 key);
[email protected]38409aec2014-07-19 00:54:5194}
95
96Status AesAlgorithm::ExportKeyRaw(const blink::WebCryptoKey& key,
[email protected]53b6c9d22014-07-19 05:08:3897 std::vector<uint8_t>* buffer) const {
[email protected]38409aec2014-07-19 00:54:5198 *buffer = SymKeyOpenSsl::Cast(key)->raw_key_data();
99 return Status::Success();
100}
101
102Status AesAlgorithm::ExportKeyJwk(const blink::WebCryptoKey& key,
[email protected]53b6c9d22014-07-19 05:08:38103 std::vector<uint8_t>* buffer) const {
104 const std::vector<uint8_t>& raw_data =
105 SymKeyOpenSsl::Cast(key)->raw_key_data();
[email protected]38409aec2014-07-19 00:54:51106
107 WriteSecretKeyJwk(CryptoData(raw_data),
108 MakeJwkAesAlgorithmName(jwk_suffix_, raw_data.size()),
eroman38bb4bd2014-11-24 23:47:06109 key.extractable(), key.usages(), buffer);
[email protected]38409aec2014-07-19 00:54:51110
111 return Status::Success();
112}
113
eromana895fed2014-11-08 03:10:25114Status AesAlgorithm::SerializeKeyForClone(
115 const blink::WebCryptoKey& key,
116 blink::WebVector<uint8_t>* key_data) const {
117 key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data());
118 return Status::Success();
119}
120
121Status AesAlgorithm::DeserializeKeyForClone(
122 const blink::WebCryptoKeyAlgorithm& algorithm,
123 blink::WebCryptoKeyType type,
124 bool extractable,
125 blink::WebCryptoKeyUsageMask usages,
126 const CryptoData& key_data,
127 blink::WebCryptoKey* key) const {
128 return ImportKeyRaw(key_data, CreateAlgorithm(algorithm.id()), extractable,
129 usages, key);
130}
131
[email protected]38409aec2014-07-19 00:54:51132} // namespace webcrypto
133
134} // namespace content