blob: 1b5654b8c51602352ea37b747644a942a551344c [file] [log] [blame]
/*
* Copyright (C) 2019 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "FidoService.h"
#if ENABLE(WEB_AUTHN)
#include "CtapAuthenticator.h"
#include "CtapDriver.h"
#include "U2fAuthenticator.h"
#include <WebCore/DeviceRequestConverter.h>
#include <WebCore/DeviceResponseConverter.h>
#include <WebCore/FidoConstants.h>
#include <WebCore/FidoHidMessage.h>
#include <wtf/RunLoop.h>
namespace WebKit {
using namespace fido;
FidoService::FidoService(Observer& observer)
: AuthenticatorTransportService(observer)
{
}
void FidoService::getInfo(std::unique_ptr<CtapDriver>&& driver)
{
// Get authenticator info from the device.
driver->transact(encodeEmptyAuthenticatorRequest(CtapRequestCommand::kAuthenticatorGetInfo), [weakThis = makeWeakPtr(*this), weakDriver = makeWeakPtr(*driver)] (Vector<uint8_t>&& response) mutable {
ASSERT(RunLoop::isMain());
if (!weakThis)
return;
weakThis->continueAfterGetInfo(WTFMove(weakDriver), WTFMove(response));
});
auto addResult = m_drivers.add(WTFMove(driver));
ASSERT_UNUSED(addResult, addResult.isNewEntry);
}
void FidoService::continueAfterGetInfo(WeakPtr<CtapDriver>&& weakDriver, Vector<uint8_t>&& response)
{
if (!weakDriver)
return;
auto driver = m_drivers.take(weakDriver.get());
if (!driver || !observer() || response.isEmpty())
return;
auto info = readCTAPGetInfoResponse(response);
if (info && info->versions().find(ProtocolVersion::kCtap) != info->versions().end()) {
observer()->authenticatorAdded(CtapAuthenticator::create(WTFMove(driver), WTFMove(*info)));
return;
}
LOG_ERROR("Couldn't parse a ctap get info response.");
driver->setProtocol(ProtocolVersion::kU2f);
observer()->authenticatorAdded(U2fAuthenticator::create(WTFMove(driver)));
}
} // namespace WebKit
#endif // ENABLE(WEB_AUTHN)