diff options
author | Lorry Tar Creator <lorry-tar-importer@lorry> | 2017-06-27 06:07:23 +0000 |
---|---|---|
committer | Lorry Tar Creator <lorry-tar-importer@lorry> | 2017-06-27 06:07:23 +0000 |
commit | 1bf1084f2b10c3b47fd1a588d85d21ed0eb41d0c (patch) | |
tree | 46dcd36c86e7fbc6e5df36deb463b33e9967a6f7 /Source/WebCore/crypto/gnutls/CryptoAlgorithmHMACGnuTLS.cpp | |
parent | 32761a6cee1d0dee366b885b7b9c777e67885688 (diff) | |
download | WebKitGtk-tarball-master.tar.gz |
webkitgtk-2.16.5HEADwebkitgtk-2.16.5master
Diffstat (limited to 'Source/WebCore/crypto/gnutls/CryptoAlgorithmHMACGnuTLS.cpp')
-rw-r--r-- | Source/WebCore/crypto/gnutls/CryptoAlgorithmHMACGnuTLS.cpp | 109 |
1 files changed, 109 insertions, 0 deletions
diff --git a/Source/WebCore/crypto/gnutls/CryptoAlgorithmHMACGnuTLS.cpp b/Source/WebCore/crypto/gnutls/CryptoAlgorithmHMACGnuTLS.cpp new file mode 100644 index 000000000..3935c5515 --- /dev/null +++ b/Source/WebCore/crypto/gnutls/CryptoAlgorithmHMACGnuTLS.cpp @@ -0,0 +1,109 @@ +/* + * Copyright (C) 2014 Igalia S.L. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, + * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF + * THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "config.h" +#include "CryptoAlgorithmHMAC.h" + +#if ENABLE(SUBTLE_CRYPTO) + +#include "CryptoAlgorithmHmacParamsDeprecated.h" +#include "CryptoKeyHMAC.h" +#include "ExceptionCode.h" +#include "NotImplemented.h" +#include <gnutls/gnutls.h> +#include <gnutls/crypto.h> +#include <wtf/CryptographicUtilities.h> + +namespace WebCore { + +static gnutls_mac_algorithm_t getGnutlsDigestAlgorithm(CryptoAlgorithmIdentifier hashFunction) +{ + switch (hashFunction) { + case CryptoAlgorithmIdentifier::SHA_1: + return GNUTLS_MAC_SHA1; + case CryptoAlgorithmIdentifier::SHA_224: + return GNUTLS_MAC_SHA224; + case CryptoAlgorithmIdentifier::SHA_256: + return GNUTLS_MAC_SHA256; + case CryptoAlgorithmIdentifier::SHA_384: + return GNUTLS_MAC_SHA384; + case CryptoAlgorithmIdentifier::SHA_512: + return GNUTLS_MAC_SHA512; + default: + return GNUTLS_MAC_UNKNOWN; + } +} + +static Vector<uint8_t> calculateSignature(gnutls_mac_algorithm_t algorithm, const Vector<uint8_t>& key, const CryptoOperationData& data) +{ + size_t digestLength = gnutls_hmac_get_len(algorithm); + + Vector<uint8_t> result(digestLength); + const void* keyData = key.data() ? key.data() : reinterpret_cast<const uint8_t*>(""); + int ret = gnutls_hmac_fast(algorithm, keyData, key.size(), data.first, data.second, result.data()); + ASSERT(ret == GNUTLS_E_SUCCESS); + UNUSED_PARAM(ret); + + return result; +} + +void CryptoAlgorithmHMAC::platformSign(Ref<CryptoKey>&&, Vector<uint8_t>&&, VectorCallback&&, ExceptionCallback&&, ScriptExecutionContext&, WorkQueue&) +{ + notImplemented(); +} + +void CryptoAlgorithmHMAC::platformVerify(Ref<CryptoKey>&&, Vector<uint8_t>&&, Vector<uint8_t>&&, BoolCallback&&, ExceptionCallback&&, ScriptExecutionContext&, WorkQueue&) +{ + notImplemented(); +} + +ExceptionOr<void> CryptoAlgorithmHMAC::platformSign(const CryptoAlgorithmHmacParamsDeprecated& parameters, const CryptoKeyHMAC& key, const CryptoOperationData& data, VectorCallback&& callback, VoidCallback&&) +{ + gnutls_mac_algorithm_t algorithm = getGnutlsDigestAlgorithm(parameters.hash); + if (algorithm == GNUTLS_MAC_UNKNOWN) + return Exception { NOT_SUPPORTED_ERR }; + callback(calculateSignature(algorithm, key.key(), data)); + return { }; +} + +ExceptionOr<void> CryptoAlgorithmHMAC::platformVerify(const CryptoAlgorithmHmacParamsDeprecated& parameters, const CryptoKeyHMAC& key, const CryptoOperationData& expectedSignature, const CryptoOperationData& data, BoolCallback&& callback, VoidCallback&&) +{ + gnutls_mac_algorithm_t algorithm = getGnutlsDigestAlgorithm(parameters.hash); + if (algorithm == GNUTLS_MAC_UNKNOWN) + return Exception { NOT_SUPPORTED_ERR }; + + Vector<uint8_t> signature = calculateSignature(algorithm, key.key(), data); + + // Using a constant time comparison to prevent timing attacks. + bool result = signature.size() == expectedSignature.second && !constantTimeMemcmp(signature.data(), expectedSignature.first, signature.size()); + + callback(result); + + return { }; +} + +} + +#endif // ENABLE(SUBTLE_CRYPTO) |