1 | // Copyright 2018 The Chromium Authors. All rights reserved. |
2 | // Copyright (C) 2018 Apple Inc. All rights reserved. |
3 | // |
4 | // Redistribution and use in source and binary forms, with or without |
5 | // modification, are permitted provided that the following conditions are |
6 | // met: |
7 | // |
8 | // * Redistributions of source code must retain the above copyright |
9 | // notice, this list of conditions and the following disclaimer. |
10 | // * Redistributions in binary form must reproduce the above |
11 | // copyright notice, this list of conditions and the following disclaimer |
12 | // in the documentation and/or other materials provided with the |
13 | // distribution. |
14 | // * Neither the name of Google Inc. nor the names of its |
15 | // contributors may be used to endorse or promote products derived from |
16 | // this software without specific prior written permission. |
17 | // |
18 | // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
19 | // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
20 | // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
21 | // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
22 | // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
23 | // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
24 | // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
25 | // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
26 | // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
27 | // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
28 | // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
29 | |
30 | #include "config.h" |
31 | #include "AuthenticatorSupportedOptions.h" |
32 | |
33 | #if ENABLE(WEB_AUTHN) |
34 | |
35 | #include "FidoConstants.h" |
36 | |
37 | namespace fido { |
38 | |
39 | AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setSupportsResidentKey(bool supportsResidentKey) |
40 | { |
41 | m_supportsResidentKey = supportsResidentKey; |
42 | return *this; |
43 | } |
44 | |
45 | AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setUserVerificationAvailability(UserVerificationAvailability userVerificationAvailability) |
46 | { |
47 | m_userVerificationAvailability = userVerificationAvailability; |
48 | return *this; |
49 | } |
50 | |
51 | AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setUserPresenceRequired(bool userPresenceRequired) |
52 | { |
53 | m_userPresenceRequired = userPresenceRequired; |
54 | return *this; |
55 | } |
56 | |
57 | AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setClientPinAvailability(ClientPinAvailability clientPinAvailability) |
58 | { |
59 | m_clientPinAvailability = clientPinAvailability; |
60 | return *this; |
61 | } |
62 | |
63 | AuthenticatorSupportedOptions& AuthenticatorSupportedOptions::setIsPlatformDevice(bool isPlatformDevice) |
64 | { |
65 | m_isPlatformDevice = isPlatformDevice; |
66 | return *this; |
67 | } |
68 | |
69 | cbor::CBORValue convertToCBOR(const AuthenticatorSupportedOptions& options) |
70 | { |
71 | using namespace cbor; |
72 | |
73 | CBORValue::MapValue optionMap; |
74 | optionMap.emplace(CBORValue(kResidentKeyMapKey), CBORValue(options.supportsResidentKey())); |
75 | optionMap.emplace(CBORValue(kUserPresenceMapKey), CBORValue(options.userPresenceRequired())); |
76 | optionMap.emplace(CBORValue(kPlatformDeviceMapKey), CBORValue(options.isPlatformDevice())); |
77 | |
78 | using UvAvailability = AuthenticatorSupportedOptions::UserVerificationAvailability; |
79 | |
80 | switch (options.userVerificationAvailability()) { |
81 | case UvAvailability::kSupportedAndConfigured: |
82 | optionMap.emplace(CBORValue(kUserVerificationMapKey), CBORValue(true)); |
83 | break; |
84 | case UvAvailability::kSupportedButNotConfigured: |
85 | optionMap.emplace(CBORValue(kUserVerificationMapKey), CBORValue(false)); |
86 | break; |
87 | case UvAvailability::kNotSupported: |
88 | break; |
89 | } |
90 | |
91 | using ClientPinAvailability = AuthenticatorSupportedOptions::ClientPinAvailability; |
92 | |
93 | switch (options.clientPinAvailability()) { |
94 | case ClientPinAvailability::kSupportedAndPinSet: |
95 | optionMap.emplace(CBORValue(kClientPinMapKey), CBORValue(true)); |
96 | break; |
97 | case ClientPinAvailability::kSupportedButPinNotSet: |
98 | optionMap.emplace(CBORValue(kClientPinMapKey), CBORValue(false)); |
99 | break; |
100 | case ClientPinAvailability::kNotSupported: |
101 | break; |
102 | } |
103 | |
104 | return CBORValue(WTFMove(optionMap)); |
105 | } |
106 | |
107 | } // namespace fido |
108 | |
109 | #endif // ENABLE(WEB_AUTHN) |
110 | |