OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2013 Google Inc. All rights reserved. | 2 * Copyright (C) 2013 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 21 matching lines...) Expand all Loading... |
32 | 32 |
33 #include "public/platform/WebCryptoAlgorithm.h" | 33 #include "public/platform/WebCryptoAlgorithm.h" |
34 #include <string> | 34 #include <string> |
35 | 35 |
36 using namespace WebKit; | 36 using namespace WebKit; |
37 | 37 |
38 namespace WebTestRunner { | 38 namespace WebTestRunner { |
39 | 39 |
40 namespace { | 40 namespace { |
41 | 41 |
42 std::string mockSign(const unsigned char* bytes, size_t size) | 42 std::string mockSign(const unsigned char* bytes, unsigned size) |
43 { | 43 { |
44 return "signed HMAC:" + std::string(reinterpret_cast<const char*>(bytes), si
ze); | 44 return "signed HMAC:" + std::string(reinterpret_cast<const char*>(bytes), si
ze); |
45 } | 45 } |
46 | 46 |
47 } // namespace | 47 } // namespace |
48 | 48 |
49 MockWebCrypto* MockWebCrypto::get() | 49 MockWebCrypto* MockWebCrypto::get() |
50 { | 50 { |
51 static MockWebCrypto crypto; | 51 static MockWebCrypto crypto; |
52 return &crypto; | 52 return &crypto; |
53 } | 53 } |
54 | 54 |
55 void MockWebCrypto::encrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, const unsigned char* data, size_t dataSize, WebKit::We
bCryptoResult result) | 55 void MockWebCrypto::encrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, const unsigned char* data, unsigned dataSize, WebKit::
WebCryptoResult result) |
56 { | 56 { |
57 result.completeWithError(); | 57 result.completeWithError(); |
58 } | 58 } |
59 | 59 |
60 void MockWebCrypto::decrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, const unsigned char* data, size_t dataSize, WebKit::We
bCryptoResult result) | 60 void MockWebCrypto::decrypt(const WebKit::WebCryptoAlgorithm& algorithm, const W
ebKit::WebCryptoKey& key, const unsigned char* data, unsigned dataSize, WebKit::
WebCryptoResult result) |
61 { | 61 { |
62 result.completeWithError(); | 62 result.completeWithError(); |
63 } | 63 } |
64 | 64 |
65 void MockWebCrypto::sign(const WebKit::WebCryptoAlgorithm& algorithm, const WebK
it::WebCryptoKey& key, const unsigned char* data, size_t dataSize, WebKit::WebCr
yptoResult result) | 65 void MockWebCrypto::sign(const WebKit::WebCryptoAlgorithm& algorithm, const WebK
it::WebCryptoKey& key, const unsigned char* data, unsigned dataSize, WebKit::Web
CryptoResult result) |
66 { | 66 { |
67 if (algorithm.id() != WebKit::WebCryptoAlgorithmIdHmac) | 67 if (algorithm.id() != WebKit::WebCryptoAlgorithmIdHmac) |
68 return result.completeWithError(); | 68 return result.completeWithError(); |
69 | 69 |
70 std::string signedData = mockSign(data, dataSize); | 70 std::string signedData = mockSign(data, dataSize); |
71 result.completeWithBuffer(signedData.data(), signedData.size()); | 71 result.completeWithBuffer(signedData.data(), signedData.size()); |
72 } | 72 } |
73 | 73 |
74 void MockWebCrypto::verifySignature(const WebKit::WebCryptoAlgorithm& algorithm,
const WebKit::WebCryptoKey& key, const unsigned char* signatureBytes, size_t si
gnatureSize, const unsigned char* data, size_t dataSize, WebKit::WebCryptoResult
result) | 74 void MockWebCrypto::verifySignature(const WebKit::WebCryptoAlgorithm& algorithm,
const WebKit::WebCryptoKey& key, const unsigned char* signatureBytes, unsigned
signatureSize, const unsigned char* data, unsigned dataSize, WebKit::WebCryptoRe
sult result) |
75 { | 75 { |
76 if (algorithm.id() != WebKit::WebCryptoAlgorithmIdHmac) | 76 if (algorithm.id() != WebKit::WebCryptoAlgorithmIdHmac) |
77 return result.completeWithError(); | 77 return result.completeWithError(); |
78 | 78 |
79 std::string signature = std::string(reinterpret_cast<const char*>(signatureB
ytes), signatureSize); | 79 std::string signature = std::string(reinterpret_cast<const char*>(signatureB
ytes), signatureSize); |
80 std::string expectedSignature = mockSign(data, dataSize); | 80 std::string expectedSignature = mockSign(data, dataSize); |
81 result.completeWithBoolean(expectedSignature == signature); | 81 result.completeWithBoolean(expectedSignature == signature); |
82 } | 82 } |
83 | 83 |
84 void MockWebCrypto::digest(const WebKit::WebCryptoAlgorithm& algorithm, const un
signed char* data, size_t dataSize, WebKit::WebCryptoResult result) | 84 void MockWebCrypto::digest(const WebKit::WebCryptoAlgorithm& algorithm, const un
signed char* data, unsigned dataSize, WebKit::WebCryptoResult result) |
85 { | 85 { |
86 if (algorithm.id() != WebKit::WebCryptoAlgorithmIdSha1) | 86 if (algorithm.id() != WebKit::WebCryptoAlgorithmIdSha1) |
87 return result.completeWithError(); | 87 return result.completeWithError(); |
88 | 88 |
89 std::string input = std::string(reinterpret_cast<const char*>(data), dataSiz
e); | 89 std::string input = std::string(reinterpret_cast<const char*>(data), dataSiz
e); |
90 | 90 |
91 if (input.empty()) { | 91 if (input.empty()) { |
92 const unsigned char resultBytes[] = {0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b,
0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90, 0xaf, 0xd8, 0x07, 0
x09}; | 92 const unsigned char resultBytes[] = {0xda, 0x39, 0xa3, 0xee, 0x5e, 0x6b,
0x4b, 0x0d, 0x32, 0x55, 0xbf, 0xef, 0x95, 0x60, 0x18, 0x90, 0xaf, 0xd8, 0x07, 0
x09}; |
93 result.completeWithBuffer(resultBytes, sizeof(resultBytes)); | 93 result.completeWithBuffer(resultBytes, sizeof(resultBytes)); |
94 } else if (input == std::string("\x00", 1)) { | 94 } else if (input == std::string("\x00", 1)) { |
95 const unsigned char resultBytes[] = {0x5b, 0xa9, 0x3c, 0x9d, 0xb0, 0xcf,
0xf9, 0x3f, 0x52, 0xb5, 0x21, 0xd7, 0x42, 0x0e, 0x43, 0xf6, 0xed, 0xa2, 0x78, 0
x4f}; | 95 const unsigned char resultBytes[] = {0x5b, 0xa9, 0x3c, 0x9d, 0xb0, 0xcf,
0xf9, 0x3f, 0x52, 0xb5, 0x21, 0xd7, 0x42, 0x0e, 0x43, 0xf6, 0xed, 0xa2, 0x78, 0
x4f}; |
96 result.completeWithBuffer(resultBytes, sizeof(resultBytes)); | 96 result.completeWithBuffer(resultBytes, sizeof(resultBytes)); |
97 } else if (input == std::string("\x00\x01\x02\x03\x04\x05", 6)) { | 97 } else if (input == std::string("\x00\x01\x02\x03\x04\x05", 6)) { |
98 const unsigned char resultBytes[] = {0x86, 0x84, 0x60, 0xd9, 0x8d, 0x09,
0xd8, 0xbb, 0xb9, 0x3d, 0x7b, 0x6c, 0xdd, 0x15, 0xcc, 0x7f, 0xbe, 0xc6, 0x76, 0
xb9}; | 98 const unsigned char resultBytes[] = {0x86, 0x84, 0x60, 0xd9, 0x8d, 0x09,
0xd8, 0xbb, 0xb9, 0x3d, 0x7b, 0x6c, 0xdd, 0x15, 0xcc, 0x7f, 0xbe, 0xc6, 0x76, 0
xb9}; |
99 result.completeWithBuffer(resultBytes, sizeof(resultBytes)); | 99 result.completeWithBuffer(resultBytes, sizeof(resultBytes)); |
100 } else { | 100 } else { |
101 result.completeWithError(); | 101 result.completeWithError(); |
102 } | 102 } |
103 } | 103 } |
104 | 104 |
105 void MockWebCrypto::generateKey(const WebKit::WebCryptoAlgorithm& algorithm, boo
l extractable, WebKit::WebCryptoKeyUsageMask usages, WebKit::WebCryptoResult res
ult) | 105 void MockWebCrypto::generateKey(const WebKit::WebCryptoAlgorithm& algorithm, boo
l extractable, WebKit::WebCryptoKeyUsageMask usages, WebKit::WebCryptoResult res
ult) |
106 { | 106 { |
107 if (algorithm.id() == WebKit::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5) { | 107 if (algorithm.id() == WebKit::WebCryptoAlgorithmIdRsaSsaPkcs1v1_5) { |
108 result.completeWithKeyPair(WebKit::WebCryptoKey::create(0, WebKit::WebCr
yptoKeyTypePublic, extractable, algorithm, usages), WebKit::WebCryptoKey::create
(0, WebKit::WebCryptoKeyTypePrivate, extractable, algorithm, usages)); | 108 result.completeWithKeyPair(WebKit::WebCryptoKey::create(0, WebKit::WebCr
yptoKeyTypePublic, extractable, algorithm, usages), WebKit::WebCryptoKey::create
(0, WebKit::WebCryptoKeyTypePrivate, extractable, algorithm, usages)); |
109 } else { | 109 } else { |
110 result.completeWithKey(WebKit::WebCryptoKey::create(0, WebKit::WebCrypto
KeyTypePrivate, extractable, algorithm, usages)); | 110 result.completeWithKey(WebKit::WebCryptoKey::create(0, WebKit::WebCrypto
KeyTypePrivate, extractable, algorithm, usages)); |
111 } | 111 } |
112 } | 112 } |
113 | 113 |
114 void MockWebCrypto::importKey(WebKit::WebCryptoKeyFormat, const unsigned char* k
eyData, size_t keyDataSize, const WebKit::WebCryptoAlgorithm& algorithm, bool ex
tractable, WebKit::WebCryptoKeyUsageMask usages, WebKit::WebCryptoResult result) | 114 void MockWebCrypto::importKey(WebKit::WebCryptoKeyFormat, const unsigned char* k
eyData, unsigned keyDataSize, const WebKit::WebCryptoAlgorithm& algorithm, bool
extractable, WebKit::WebCryptoKeyUsageMask usages, WebKit::WebCryptoResult resul
t) |
115 { | 115 { |
116 std::string keyDataString(reinterpret_cast<const char*>(keyData), keyDataSiz
e); | 116 std::string keyDataString(reinterpret_cast<const char*>(keyData), keyDataSiz
e); |
117 | 117 |
118 if (keyDataString == "error") | 118 if (keyDataString == "error") |
119 return result.completeWithError(); | 119 return result.completeWithError(); |
120 | 120 |
121 WebKit::WebCryptoKeyType type = WebKit::WebCryptoKeyTypePrivate; | 121 WebKit::WebCryptoKeyType type = WebKit::WebCryptoKeyTypePrivate; |
122 if (keyDataString == "public") | 122 if (keyDataString == "public") |
123 type = WebKit::WebCryptoKeyTypePublic; | 123 type = WebKit::WebCryptoKeyTypePublic; |
124 | 124 |
125 result.completeWithKey(WebKit::WebCryptoKey::create(0, type, extractable, al
gorithm, usages)); | 125 result.completeWithKey(WebKit::WebCryptoKey::create(0, type, extractable, al
gorithm, usages)); |
126 } | 126 } |
127 | 127 |
128 void MockWebCrypto::exportKey(WebKit::WebCryptoKeyFormat format, const WebKit::W
ebCryptoKey& key, WebKit::WebCryptoResult result) | 128 void MockWebCrypto::exportKey(WebKit::WebCryptoKeyFormat format, const WebKit::W
ebCryptoKey& key, WebKit::WebCryptoResult result) |
129 { | 129 { |
130 std::string buffer; | 130 std::string buffer; |
131 | 131 |
132 if (format == WebKit::WebCryptoKeyFormatRaw) | 132 if (format == WebKit::WebCryptoKeyFormatRaw) |
133 buffer = "raw"; | 133 buffer = "raw"; |
134 else if (format == WebKit::WebCryptoKeyFormatPkcs8) | 134 else if (format == WebKit::WebCryptoKeyFormatPkcs8) |
135 buffer = "pkcs8"; | 135 buffer = "pkcs8"; |
136 | 136 |
137 result.completeWithBuffer(buffer.data(), buffer.size()); | 137 result.completeWithBuffer(buffer.data(), buffer.size()); |
138 } | 138 } |
139 | 139 |
140 | 140 |
141 } // namespace WebTestRunner | 141 } // namespace WebTestRunner |
OLD | NEW |