mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
127 lines
3.5 KiB
C++
127 lines
3.5 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim:set ts=2 sw=2 sts=2 et cindent: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "mozilla/dom/KeyAlgorithm.h"
|
|
#include "mozilla/dom/WebCryptoCommon.h"
|
|
#include "mozilla/dom/AesKeyAlgorithm.h"
|
|
#include "mozilla/dom/HmacKeyAlgorithm.h"
|
|
#include "mozilla/dom/RsaKeyAlgorithm.h"
|
|
#include "mozilla/dom/RsaHashedKeyAlgorithm.h"
|
|
#include "mozilla/dom/SubtleCryptoBinding.h"
|
|
#include "mozilla/dom/WebCryptoCommon.h"
|
|
|
|
namespace mozilla {
|
|
namespace dom {
|
|
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_WRAPPERCACHE(KeyAlgorithm, mGlobal)
|
|
NS_IMPL_CYCLE_COLLECTING_ADDREF(KeyAlgorithm)
|
|
NS_IMPL_CYCLE_COLLECTING_RELEASE(KeyAlgorithm)
|
|
NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(KeyAlgorithm)
|
|
NS_WRAPPERCACHE_INTERFACE_MAP_ENTRY
|
|
NS_INTERFACE_MAP_ENTRY(nsISupports)
|
|
NS_INTERFACE_MAP_END
|
|
|
|
KeyAlgorithm::KeyAlgorithm(nsIGlobalObject* aGlobal, const nsString& aName)
|
|
: mGlobal(aGlobal)
|
|
, mName(aName)
|
|
{
|
|
SetIsDOMBinding();
|
|
|
|
// Set mechanism based on algorithm name
|
|
if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_CBC)) {
|
|
mMechanism = CKM_AES_CBC_PAD;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_CTR)) {
|
|
mMechanism = CKM_AES_CTR;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_AES_GCM)) {
|
|
mMechanism = CKM_AES_GCM;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_SHA1)) {
|
|
mMechanism = CKM_SHA_1;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_SHA224)) {
|
|
mMechanism = CKM_SHA224;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_SHA256)) {
|
|
mMechanism = CKM_SHA256;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_SHA384)) {
|
|
mMechanism = CKM_SHA384;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_SHA512)) {
|
|
mMechanism = CKM_SHA512;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSAES_PKCS1)) {
|
|
mMechanism = CKM_RSA_PKCS;
|
|
} else if (mName.EqualsLiteral(WEBCRYPTO_ALG_RSASSA_PKCS1)) {
|
|
mMechanism = CKM_RSA_PKCS;
|
|
} else {
|
|
mMechanism = UNKNOWN_CK_MECHANISM;
|
|
}
|
|
// HMAC not handled here, since it requires extra info
|
|
}
|
|
|
|
KeyAlgorithm::~KeyAlgorithm()
|
|
{
|
|
}
|
|
|
|
JSObject*
|
|
KeyAlgorithm::WrapObject(JSContext* aCx)
|
|
{
|
|
return KeyAlgorithmBinding::Wrap(aCx, this);
|
|
}
|
|
|
|
void
|
|
KeyAlgorithm::GetName(nsString& aRetVal) const
|
|
{
|
|
aRetVal.Assign(mName);
|
|
}
|
|
|
|
bool
|
|
KeyAlgorithm::WriteStructuredClone(JSStructuredCloneWriter* aWriter) const
|
|
{
|
|
return WriteString(aWriter, mName);
|
|
}
|
|
|
|
KeyAlgorithm*
|
|
KeyAlgorithm::Create(nsIGlobalObject* aGlobal, JSStructuredCloneReader* aReader)
|
|
{
|
|
uint32_t tag, zero;
|
|
bool read = JS_ReadUint32Pair( aReader, &tag, &zero );
|
|
if (!read) {
|
|
return nullptr;
|
|
}
|
|
|
|
KeyAlgorithm* algorithm = nullptr;
|
|
switch (tag) {
|
|
case SCTAG_KEYALG: {
|
|
nsString name;
|
|
read = ReadString(aReader, name);
|
|
if (!read) {
|
|
return nullptr;
|
|
}
|
|
algorithm = new KeyAlgorithm(aGlobal, name);
|
|
break;
|
|
}
|
|
case SCTAG_AESKEYALG: {
|
|
algorithm = AesKeyAlgorithm::Create(aGlobal, aReader);
|
|
break;
|
|
}
|
|
case SCTAG_HMACKEYALG: {
|
|
algorithm = HmacKeyAlgorithm::Create(aGlobal, aReader);
|
|
break;
|
|
}
|
|
case SCTAG_RSAKEYALG: {
|
|
algorithm = RsaKeyAlgorithm::Create(aGlobal, aReader);
|
|
break;
|
|
}
|
|
case SCTAG_RSAHASHEDKEYALG: {
|
|
algorithm = RsaHashedKeyAlgorithm::Create(aGlobal, aReader);
|
|
break;
|
|
}
|
|
// No default, algorithm is already nullptr
|
|
}
|
|
|
|
return algorithm;
|
|
}
|
|
|
|
} // namespace dom
|
|
} // namespace mozilla
|