1// Copyright 2018 The Chromium Authors. All rights reserved.
2// Copyright (C) 2018 Apple Inc. All rights reserved.
3//
4// Redistribution and use in source and binary forms, with or without
5// modification, are permitted provided that the following conditions are
6// met:
7//
8// * Redistributions of source code must retain the above copyright
9// notice, this list of conditions and the following disclaimer.
10// * Redistributions in binary form must reproduce the above
11// copyright notice, this list of conditions and the following disclaimer
12// in the documentation and/or other materials provided with the
13// distribution.
14// * Neither the name of Google Inc. nor the names of its
15// contributors may be used to endorse or promote products derived from
16// this software without specific prior written permission.
17//
18// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29
30#include "config.h"
31#include "AuthenticatorSupportedOptions.h"
32
33#if ENABLE(WEB_AUTHN)
34
35#include "FidoConstants.h"
36
37namespace fido {
38
39AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setSupportsResidentKey(bool supportsResidentKey)
40{
41 m_supportsResidentKey = supportsResidentKey;
42 return *this;
43}
44
45AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setUserVerificationAvailability(UserVerificationAvailability userVerificationAvailability)
46{
47 m_userVerificationAvailability = userVerificationAvailability;
48 return *this;
49}
50
51AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setUserPresenceRequired(bool userPresenceRequired)
52{
53 m_userPresenceRequired = userPresenceRequired;
54 return *this;
55}
56
57AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setClientPinAvailability(ClientPinAvailability clientPinAvailability)
58{
59 m_clientPinAvailability = clientPinAvailability;
60 return *this;
61}
62
63AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setIsPlatformDevice(bool isPlatformDevice)
64{
65 m_isPlatformDevice = isPlatformDevice;
66 return *this;
67}
68
69cbor::CBORValue convertToCBOR(const AuthenticatorSupportedOptions& options)
70{
71 using namespace cbor;
72
73 CBORValue::MapValue optionMap;
74 optionMap.emplace(CBORValue(kResidentKeyMapKey), CBORValue(options.supportsResidentKey()));
75 optionMap.emplace(CBORValue(kUserPresenceMapKey), CBORValue(options.userPresenceRequired()));
76 optionMap.emplace(CBORValue(kPlatformDeviceMapKey), CBORValue(options.isPlatformDevice()));
77
78 using UvAvailability = AuthenticatorSupportedOptions::UserVerificationAvailability;
79
80 switch (options.userVerificationAvailability()) {
81 case UvAvailability::kSupportedAndConfigured:
82 optionMap.emplace(CBORValue(kUserVerificationMapKey), CBORValue(true));
83 break;
84 case UvAvailability::kSupportedButNotConfigured:
85 optionMap.emplace(CBORValue(kUserVerificationMapKey), CBORValue(false));
86 break;
87 case UvAvailability::kNotSupported:
88 break;
89 }
90
91 using ClientPinAvailability = AuthenticatorSupportedOptions::ClientPinAvailability;
92
93 switch (options.clientPinAvailability()) {
94 case ClientPinAvailability::kSupportedAndPinSet:
95 optionMap.emplace(CBORValue(kClientPinMapKey), CBORValue(true));
96 break;
97 case ClientPinAvailability::kSupportedButPinNotSet:
98 optionMap.emplace(CBORValue(kClientPinMapKey), CBORValue(false));
99 break;
100 case ClientPinAvailability::kNotSupported:
101 break;
102 }
103
104 return CBORValue(WTFMove(optionMap));
105}
106
107} // namespace fido
108
109#endif // ENABLE(WEB_AUTHN)
110