mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-01 06:35:42 +00:00
1068414e39
From 1a684ed61615d32965201e55335478d5f403ac4a Mon Sep 17 00:00:00 2001 cpp files in the dom/base/ directory. r=jwalden --- dom/base/Crypto.cpp | 3 +- dom/base/DOMRequest.cpp | 12 +++--- dom/base/DOMRequest.h | 4 +- dom/base/Navigator.cpp | 10 ++--- dom/base/nsDOMJSUtils.h | 6 +-- dom/base/nsDOMWindowUtils.cpp | 20 ++++----- dom/base/nsGlobalWindow.cpp | 24 +++++------ dom/base/nsIJSNativeInitializer.h | 4 +- dom/base/nsJSEnvironment.cpp | 73 +++++++++++++++++---------------- dom/base/nsJSEnvironment.h | 8 ++-- dom/base/nsJSTimeoutHandler.cpp | 4 +- dom/base/nsJSUtils.h | 2 +- dom/base/nsStructuredCloneContainer.cpp | 10 ++--- 13 files changed, 91 insertions(+), 89 deletions(-) --HG-- extra : rebase_source : af1420550a745aba9fd6c20297ac3cd0075f5ead
203 lines
4.6 KiB
C++
203 lines
4.6 KiB
C++
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
#include "Crypto.h"
|
|
#include "nsIDOMClassInfo.h"
|
|
#include "DOMError.h"
|
|
#include "nsString.h"
|
|
#include "jsapi.h"
|
|
#include "jsfriendapi.h"
|
|
#include "nsIServiceManager.h"
|
|
#include "nsCOMPtr.h"
|
|
#include "nsIRandomGenerator.h"
|
|
|
|
#include "mozilla/dom/ContentChild.h"
|
|
|
|
using mozilla::dom::ContentChild;
|
|
|
|
using namespace js::ArrayBufferView;
|
|
|
|
namespace mozilla {
|
|
namespace dom {
|
|
|
|
NS_INTERFACE_MAP_BEGIN(Crypto)
|
|
NS_INTERFACE_MAP_ENTRY(nsISupports)
|
|
NS_INTERFACE_MAP_ENTRY(nsIDOMCrypto)
|
|
NS_DOM_INTERFACE_MAP_ENTRY_CLASSINFO(Crypto)
|
|
NS_INTERFACE_MAP_END
|
|
|
|
NS_IMPL_ADDREF(Crypto)
|
|
NS_IMPL_RELEASE(Crypto)
|
|
|
|
Crypto::Crypto()
|
|
{
|
|
MOZ_COUNT_CTOR(Crypto);
|
|
}
|
|
|
|
Crypto::~Crypto()
|
|
{
|
|
MOZ_COUNT_DTOR(Crypto);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::GetRandomValues(const JS::Value& aData, JSContext *cx,
|
|
JS::Value* _retval)
|
|
{
|
|
NS_ABORT_IF_FALSE(NS_IsMainThread(), "Called on the wrong thread");
|
|
|
|
// Make sure this is a JavaScript object
|
|
if (!aData.isObject()) {
|
|
return NS_ERROR_DOM_NOT_OBJECT_ERR;
|
|
}
|
|
|
|
JSObject* view = &aData.toObject();
|
|
|
|
// Make sure this object is an ArrayBufferView
|
|
if (!JS_IsTypedArrayObject(view)) {
|
|
return NS_ERROR_DOM_TYPE_MISMATCH_ERR;
|
|
}
|
|
|
|
// Throw if the wrong type of ArrayBufferView is passed in
|
|
// (Part of the Web Crypto API spec)
|
|
switch (JS_GetArrayBufferViewType(view)) {
|
|
case TYPE_INT8:
|
|
case TYPE_UINT8:
|
|
case TYPE_UINT8_CLAMPED:
|
|
case TYPE_INT16:
|
|
case TYPE_UINT16:
|
|
case TYPE_INT32:
|
|
case TYPE_UINT32:
|
|
break;
|
|
default:
|
|
return NS_ERROR_DOM_TYPE_MISMATCH_ERR;
|
|
}
|
|
|
|
uint32_t dataLen = JS_GetTypedArrayByteLength(view);
|
|
|
|
if (dataLen == 0) {
|
|
NS_WARNING("ArrayBufferView length is 0, cannot continue");
|
|
return NS_OK;
|
|
} else if (dataLen > 65536) {
|
|
return NS_ERROR_DOM_QUOTA_EXCEEDED_ERR;
|
|
}
|
|
|
|
void *dataptr = JS_GetArrayBufferViewData(view);
|
|
NS_ENSURE_TRUE(dataptr, NS_ERROR_FAILURE);
|
|
unsigned char* data =
|
|
static_cast<unsigned char*>(dataptr);
|
|
|
|
if (XRE_GetProcessType() != GeckoProcessType_Default) {
|
|
InfallibleTArray<uint8_t> randomValues;
|
|
// Tell the parent process to generate random values via PContent
|
|
ContentChild* cc = ContentChild::GetSingleton();
|
|
if (!cc->SendGetRandomValues(dataLen, &randomValues)) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
NS_ASSERTION(dataLen == randomValues.Length(),
|
|
"Invalid length returned from parent process!");
|
|
memcpy(data, randomValues.Elements(), dataLen);
|
|
} else {
|
|
uint8_t *buf = GetRandomValues(dataLen);
|
|
|
|
if (!buf) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
memcpy(data, buf, dataLen);
|
|
NS_Free(buf);
|
|
}
|
|
|
|
*_retval = OBJECT_TO_JSVAL(view);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
#ifndef MOZ_DISABLE_CRYPTOLEGACY
|
|
// Stub out the legacy nsIDOMCrypto methods. The actual
|
|
// implementations are in security/manager/ssl/src/nsCrypto.{cpp,h}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::GetVersion(nsAString & aVersion)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::GetEnableSmartCardEvents(bool *aEnableSmartCardEvents)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::SetEnableSmartCardEvents(bool aEnableSmartCardEvents)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::GenerateCRMFRequest(nsIDOMCRMFObject * *_retval)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::ImportUserCertificates(const nsAString & nickname,
|
|
const nsAString & cmmfResponse,
|
|
bool doForcedBackup, nsAString & _retval)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::PopChallengeResponse(const nsAString & challenge,
|
|
nsAString & _retval)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::Random(int32_t numBytes, nsAString & _retval)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::SignText(const nsAString & stringToSign, const nsAString & caOption,
|
|
nsAString & _retval)
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::Logout()
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
Crypto::DisableRightClick()
|
|
{
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
#endif
|
|
|
|
uint8_t*
|
|
Crypto::GetRandomValues(uint32_t aLength)
|
|
{
|
|
nsCOMPtr<nsIRandomGenerator> randomGenerator;
|
|
nsresult rv;
|
|
randomGenerator =
|
|
do_GetService("@mozilla.org/security/random-generator;1");
|
|
NS_ENSURE_TRUE(randomGenerator, nullptr);
|
|
|
|
uint8_t* buf;
|
|
rv = randomGenerator->GenerateRandomBytes(aLength, &buf);
|
|
|
|
NS_ENSURE_SUCCESS(rv, nullptr);
|
|
|
|
return buf;
|
|
}
|
|
|
|
} // namespace dom
|
|
} // namespace mozilla
|