| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2013 Google Inc. All rights reserved. | 2 * Copyright (C) 2013 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 23 matching lines...) Expand all Loading... |
| 34 #include "public/platform/WebCryptoAlgorithm.h" | 34 #include "public/platform/WebCryptoAlgorithm.h" |
| 35 #include <string> | 35 #include <string> |
| 36 #include <string.h> | 36 #include <string.h> |
| 37 | 37 |
| 38 using namespace WebKit; | 38 using namespace WebKit; |
| 39 | 39 |
| 40 namespace WebTestRunner { | 40 namespace WebTestRunner { |
| 41 | 41 |
| 42 namespace { | 42 namespace { |
| 43 | 43 |
| 44 enum Operation { |
| 45 Encrypt, |
| 46 Decrypt, |
| 47 Sign, |
| 48 Verify, |
| 49 Digest, |
| 50 }; |
| 51 |
| 44 class MockCryptoOperation : public WebKit::WebCryptoOperation { | 52 class MockCryptoOperation : public WebKit::WebCryptoOperation { |
| 45 public: | 53 public: |
| 46 MockCryptoOperation(const WebKit::WebCryptoAlgorithm& algorithm, const WebKi
t::WebCryptoOperationResult& result) : m_algorithm(algorithm), m_result(result)
{ } | 54 MockCryptoOperation(const WebKit::WebCryptoAlgorithm& algorithm, Operation o
p, const WebKit::WebCryptoOperationResult& result) |
| 55 : m_algorithm(algorithm) |
| 56 , m_operation(op) |
| 57 , m_result(result) { } |
| 47 | 58 |
| 48 virtual void process(const unsigned char* bytes, size_t size) OVERRIDE | 59 virtual void process(const unsigned char* bytes, size_t size) OVERRIDE |
| 49 { | 60 { |
| 50 // Don't buffer too much data. | 61 // Don't buffer too much data. |
| 51 if (m_data.size() + size > 6) { | 62 if (m_data.size() + size > 6) { |
| 52 m_result.completeWithError(); | 63 m_result.completeWithError(); |
| 53 delete this; | 64 delete this; |
| 54 return; | 65 return; |
| 55 } | 66 } |
| 56 | 67 |
| 57 if (size) | 68 if (size) |
| 58 m_data.append(reinterpret_cast<const char*>(bytes), size); | 69 m_data.append(reinterpret_cast<const char*>(bytes), size); |
| 59 } | 70 } |
| 60 | 71 |
| 61 virtual void abort() OVERRIDE | 72 virtual void abort() OVERRIDE |
| 62 { | 73 { |
| 63 delete this; | 74 delete this; |
| 64 } | 75 } |
| 65 | 76 |
| 66 virtual void finish() OVERRIDE | 77 virtual void finish() OVERRIDE |
| 67 { | 78 { |
| 68 const unsigned char digest1[20] = {0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b, 0
x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90, 0xaf, 0xd8, 0x07, 0x0
9}; | 79 if (m_algorithm.id() == WebKit::WebCryptoAlgorithmIdSha1 && m_operation
== Digest) { |
| 69 const unsigned char digest2[20] = {0x5b, 0xa9, 0x3c, 0x9d, 0xb0, 0xcf, 0
xf9, 0x3f, 0x52, 0xb5, 0x21, 0xd7, 0x42, 0x0e, 0x43, 0xf6, 0xed, 0xa2, 0x78, 0x4
f}; | |
| 70 const unsigned char digest3[20] = {0x86, 0x84, 0x60, 0xd9, 0x8d, 0x09, 0
xd8, 0xbb, 0xb9, 0x3d, 0x7b, 0x6c, 0xdd, 0x15, 0xcc, 0x7f, 0xbe, 0xc6, 0x76, 0xb
9}; | |
| 71 | |
| 72 const unsigned char* result = 0; | |
| 73 size_t resultSize; | |
| 74 | |
| 75 if (m_algorithm.id() == WebKit::WebCryptoAlgorithmIdSha1) { | |
| 76 resultSize = 20; | |
| 77 | |
| 78 if (m_data.empty()) { | 80 if (m_data.empty()) { |
| 79 result = digest1; | 81 const unsigned char result[] = {0xda, 0x39, 0xa3, 0xee, 0x5e, 0x
6b, 0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90, 0xaf, 0xd8, 0x07
, 0x09}; |
| 82 completeWithArrayBuffer(result, sizeof(result)); |
| 80 } else if (m_data == std::string("\x00", 1)) { | 83 } else if (m_data == std::string("\x00", 1)) { |
| 81 result = digest2; | 84 const unsigned char result[] = {0x5b, 0xa9, 0x3c, 0x9d, 0xb0, 0x
cf, 0xf9, 0x3f, 0x52, 0xb5, 0x21, 0xd7, 0x42, 0x0e, 0x43, 0xf6, 0xed, 0xa2, 0x78
, 0x4f}; |
| 85 completeWithArrayBuffer(result, sizeof(result)); |
| 82 } else if (m_data == std::string("\x00\x01\x02\x03\x04\x05", 6)) { | 86 } else if (m_data == std::string("\x00\x01\x02\x03\x04\x05", 6)) { |
| 83 result = digest3; | 87 const unsigned char result[] = {0x86, 0x84, 0x60, 0xd9, 0x8d, 0x
09, 0xd8, 0xbb, 0xb9, 0x3d, 0x7b, 0x6c, 0xdd, 0x15, 0xcc, 0x7f, 0xbe, 0xc6, 0x76
, 0xb9}; |
| 88 completeWithArrayBuffer(result, sizeof(result)); |
| 89 } else { |
| 90 m_result.completeWithError(); |
| 84 } | 91 } |
| 85 } | 92 } else if (m_algorithm.id() == WebKit::WebCryptoAlgorithmIdHmac && m_ope
ration == Sign) { |
| 86 | 93 std::string result = "signed HMAC:" + m_data; |
| 87 if (result) { | 94 completeWithArrayBuffer(result.data(), result.size()); |
| 88 WebKit::WebArrayBuffer buffer = WebKit::WebArrayBuffer::create(resul
tSize, 1); | 95 } else if (m_algorithm.id() == WebKit::WebCryptoAlgorithmIdHmac && m_ope
ration == Verify) { |
| 89 memcpy(buffer.data(), result, resultSize); | 96 std::string expectedSignature = "signed HMAC:" + m_data; |
| 90 m_result.completeWithArrayBuffer(buffer); | 97 m_result.completeWithBoolean(expectedSignature == m_signature); |
| 91 } else { | 98 } else { |
| 92 m_result.completeWithError(); | 99 m_result.completeWithError(); |
| 93 } | 100 } |
| 94 delete this; | 101 delete this; |
| 95 } | 102 } |
| 96 | 103 |
| 97 protected: | 104 void setSignature(const unsigned char* signatureBytes, size_t signatureLengt
h) |
| 105 { |
| 106 m_signature.assign(reinterpret_cast<const char*>(signatureBytes), signat
ureLength); |
| 107 } |
| 108 |
| 109 private: |
| 110 void completeWithArrayBuffer(const void* data, size_t bytes) |
| 111 { |
| 112 WebKit::WebArrayBuffer buffer = WebKit::WebArrayBuffer::create(bytes, 1)
; |
| 113 memcpy(buffer.data(), data, bytes); |
| 114 m_result.completeWithArrayBuffer(buffer); |
| 115 } |
| 116 |
| 98 WebKit::WebCryptoAlgorithm m_algorithm; | 117 WebKit::WebCryptoAlgorithm m_algorithm; |
| 118 Operation m_operation; |
| 99 WebKit::WebCryptoOperationResult m_result; | 119 WebKit::WebCryptoOperationResult m_result; |
| 100 std::string m_data; | 120 std::string m_data; |
| 121 std::string m_signature; |
| 101 }; | 122 }; |
| 102 | 123 |
| 103 } // namespace | 124 } // namespace |
| 104 | 125 |
| 105 MockWebCrypto* MockWebCrypto::get() | 126 MockWebCrypto* MockWebCrypto::get() |
| 106 { | 127 { |
| 107 static MockWebCrypto crypto; | 128 static MockWebCrypto crypto; |
| 108 return &crypto; | 129 return &crypto; |
| 109 } | 130 } |
| 110 | 131 |
| 111 void MockWebCrypto::encrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) | 132 void MockWebCrypto::encrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) |
| 112 { | 133 { |
| 113 result.initializationSucceeded(new MockCryptoOperation(algorithm, result)); | 134 result.initializationSucceeded(new MockCryptoOperation(algorithm, Encrypt, r
esult)); |
| 114 } | 135 } |
| 115 | 136 |
| 116 void MockWebCrypto::decrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) | 137 void MockWebCrypto::decrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) |
| 117 { | 138 { |
| 118 result.initializationSucceeded(new MockCryptoOperation(algorithm, result)); | 139 result.initializationSucceeded(new MockCryptoOperation(algorithm, Decrypt, r
esult)); |
| 119 } | 140 } |
| 120 | 141 |
| 121 void MockWebCrypto::sign(const WebKit::WebCryptoAlgorithm& algorithm, const WebK
it::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) | 142 void MockWebCrypto::sign(const WebKit::WebCryptoAlgorithm& algorithm, const WebK
it::WebCryptoKey& key, WebKit::WebCryptoOperationResult& result) |
| 122 { | 143 { |
| 123 result.initializationSucceeded(new MockCryptoOperation(algorithm, result)); | 144 result.initializationSucceeded(new MockCryptoOperation(algorithm, Sign, resu
lt)); |
| 145 } |
| 146 |
| 147 void MockWebCrypto::verifySignature(const WebKit::WebCryptoAlgorithm& algorithm,
const WebKit::WebCryptoKey& key, const unsigned char* signature, size_t signatu
reLength, WebKit::WebCryptoOperationResult& result) |
| 148 { |
| 149 MockCryptoOperation* op = new MockCryptoOperation(algorithm, Verify, result)
; |
| 150 op->setSignature(signature, signatureLength); |
| 151 result.initializationSucceeded(op); |
| 124 } | 152 } |
| 125 | 153 |
| 126 void MockWebCrypto::digest(const WebKit::WebCryptoAlgorithm& algorithm, WebKit::
WebCryptoOperationResult& result) | 154 void MockWebCrypto::digest(const WebKit::WebCryptoAlgorithm& algorithm, WebKit::
WebCryptoOperationResult& result) |
| 127 { | 155 { |
| 128 result.initializationSucceeded(new MockCryptoOperation(algorithm, result)); | 156 result.initializationSucceeded(new MockCryptoOperation(algorithm, Digest, re
sult)); |
| 129 } | 157 } |
| 130 | 158 |
| 131 void MockWebCrypto::importKey(WebKit::WebCryptoKeyFormat, const unsigned char* k
eyData, size_t keyDataSize, const WebKit::WebCryptoAlgorithm& algorithm, bool ex
tractable, WebKit::WebCryptoKeyUsageMask usages, WebKit::WebCryptoKeyOperationRe
sult& result) | 159 void MockWebCrypto::importKey(WebKit::WebCryptoKeyFormat, const unsigned char* k
eyData, size_t keyDataSize, const WebKit::WebCryptoAlgorithm& algorithm, bool ex
tractable, WebKit::WebCryptoKeyUsageMask usages, WebKit::WebCryptoKeyOperationRe
sult& result) |
| 132 { | 160 { |
| 133 std::string keyDataString(reinterpret_cast<const char*>(keyData), keyDataSiz
e); | 161 std::string keyDataString(reinterpret_cast<const char*>(keyData), keyDataSiz
e); |
| 134 | 162 |
| 135 if (keyDataString == "reject") { | 163 if (keyDataString == "reject") { |
| 136 result.completeWithError(); | 164 result.completeWithError(); |
| 137 } else if (keyDataString == "throw") { | 165 } else if (keyDataString == "throw") { |
| 138 result.initializationFailed(); | 166 result.initializationFailed(); |
| 139 } else { | 167 } else { |
| 140 WebKit::WebCryptoKeyType type = WebKit::WebCryptoKeyTypePrivate; | 168 WebKit::WebCryptoKeyType type = WebKit::WebCryptoKeyTypePrivate; |
| 141 if (keyDataString == "public") | 169 if (keyDataString == "public") |
| 142 type = WebKit::WebCryptoKeyTypePublic; | 170 type = WebKit::WebCryptoKeyTypePublic; |
| 143 result.completeWithKey(WebKit::WebCryptoKey::create(0, type, extractable
, algorithm, usages)); | 171 result.completeWithKey(WebKit::WebCryptoKey::create(0, type, extractable
, algorithm, usages)); |
| 144 } | 172 } |
| 145 } | 173 } |
| 146 | 174 |
| 147 } // namespace WebTestRunner | 175 } // namespace WebTestRunner |
| OLD | NEW |