diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /toolkit/identity/jwcrypto.jsm | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'toolkit/identity/jwcrypto.jsm')
-rw-r--r-- | toolkit/identity/jwcrypto.jsm | 180 |
1 files changed, 180 insertions, 0 deletions
diff --git a/toolkit/identity/jwcrypto.jsm b/toolkit/identity/jwcrypto.jsm new file mode 100644 index 000000000..4bcba730f --- /dev/null +++ b/toolkit/identity/jwcrypto.jsm @@ -0,0 +1,180 @@ +/* -*- js-indent-level: 2; indent-tabs-mode: nil -*- */ +/* vim: set ft=javascript ts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this file, + * You can obtain one at http://mozilla.org/MPL/2.0/. */ + +"use strict"; + + +const Cu = Components.utils; +const Ci = Components.interfaces; +const Cc = Components.classes; +const Cr = Components.results; + +Cu.import("resource://gre/modules/XPCOMUtils.jsm"); +Cu.import("resource://gre/modules/Services.jsm"); +Cu.import("resource://gre/modules/identity/LogUtils.jsm"); + +XPCOMUtils.defineLazyServiceGetter(this, + "IdentityCryptoService", + "@mozilla.org/identity/crypto-service;1", + "nsIIdentityCryptoService"); + +this.EXPORTED_SYMBOLS = ["jwcrypto"]; + +const ALGORITHMS = { RS256: "RS256", DS160: "DS160" }; +const DURATION_MS = 1000 * 60 * 2; // 2 minutes default assertion lifetime + +function log(...aMessageArgs) { + Logger.log.apply(Logger, ["jwcrypto"].concat(aMessageArgs)); +} + +function generateKeyPair(aAlgorithmName, aCallback) { + log("Generate key pair; alg =", aAlgorithmName); + + IdentityCryptoService.generateKeyPair(aAlgorithmName, function(rv, aKeyPair) { + if (!Components.isSuccessCode(rv)) { + return aCallback("key generation failed"); + } + + var publicKey; + + switch (aKeyPair.keyType) { + case ALGORITHMS.RS256: + publicKey = { + algorithm: "RS", + exponent: aKeyPair.hexRSAPublicKeyExponent, + modulus: aKeyPair.hexRSAPublicKeyModulus + }; + break; + + case ALGORITHMS.DS160: + publicKey = { + algorithm: "DS", + y: aKeyPair.hexDSAPublicValue, + p: aKeyPair.hexDSAPrime, + q: aKeyPair.hexDSASubPrime, + g: aKeyPair.hexDSAGenerator + }; + break; + + default: + return aCallback("unknown key type"); + } + + let keyWrapper = { + serializedPublicKey: JSON.stringify(publicKey), + _kp: aKeyPair + }; + + return aCallback(null, keyWrapper); + }); +} + +function sign(aPayload, aKeypair, aCallback) { + aKeypair._kp.sign(aPayload, function(rv, signature) { + if (!Components.isSuccessCode(rv)) { + log("ERROR: signer.sign failed"); + return aCallback("Sign failed"); + } + log("signer.sign: success"); + return aCallback(null, signature); + }); +} + +function jwcryptoClass() +{ +} + +jwcryptoClass.prototype = { + /* + * Determine the expiration of the assertion. Returns expiry date + * in milliseconds as integer. + * + * @param localtimeOffsetMsec (optional) + * The number of milliseconds that must be added to the local clock + * for it to agree with the server. For example, if the local clock + * if two minutes fast, localtimeOffsetMsec would be -120000 + * + * @param now (options) + * Current date in milliseconds. Useful for mocking clock + * skew in testing. + */ + getExpiration: function(duration=DURATION_MS, localtimeOffsetMsec=0, now=Date.now()) { + return now + localtimeOffsetMsec + duration; + }, + + isCertValid: function(aCert, aCallback) { + // XXX check expiration, bug 769850 + aCallback(true); + }, + + generateKeyPair: function(aAlgorithmName, aCallback) { + log("generating"); + generateKeyPair(aAlgorithmName, aCallback); + }, + + /* + * Generate an assertion and return it through the provided callback. + * + * @param aCert + * Identity certificate + * + * @param aKeyPair + * KeyPair object + * + * @param aAudience + * Audience of the assertion + * + * @param aOptions (optional) + * Can include: + * { + * localtimeOffsetMsec: <clock offset in milliseconds>, + * now: <current date in milliseconds> + * duration: <validity duration for this assertion in milliseconds> + * } + * + * localtimeOffsetMsec is the number of milliseconds that need to be + * added to the local clock time to make it concur with the server. + * For example, if the local clock is two minutes fast, the offset in + * milliseconds would be -120000. + * + * @param aCallback + * Function to invoke with resulting assertion. Assertion + * will be string or null on failure. + */ + generateAssertion: function(aCert, aKeyPair, aAudience, aOptions, aCallback) { + if (typeof aOptions == "function") { + aCallback = aOptions; + aOptions = { }; + } + + // for now, we hack the algorithm name + // XXX bug 769851 + var header = {"alg": "DS128"}; + var headerBytes = IdentityCryptoService.base64UrlEncode( + JSON.stringify(header)); + + var payload = { + exp: this.getExpiration( + aOptions.duration, aOptions.localtimeOffsetMsec, aOptions.now), + aud: aAudience + }; + var payloadBytes = IdentityCryptoService.base64UrlEncode( + JSON.stringify(payload)); + + log("payload bytes", payload, payloadBytes); + sign(headerBytes + "." + payloadBytes, aKeyPair, function(err, signature) { + if (err) + return aCallback(err); + + var signedAssertion = headerBytes + "." + payloadBytes + "." + signature; + return aCallback(null, aCert + "~" + signedAssertion); + }); + } + +}; + +this.jwcrypto = new jwcryptoClass(); +this.jwcrypto.ALGORITHMS = ALGORITHMS; |