Chromium Code Reviews| Index: chrome/browser/autofill/wallet/full_wallet.cc |
| diff --git a/chrome/browser/autofill/wallet/full_wallet.cc b/chrome/browser/autofill/wallet/full_wallet.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..b3b0cdd1f75af292cf2cc35be7ed7c8550d59d5a |
| --- /dev/null |
| +++ b/chrome/browser/autofill/wallet/full_wallet.cc |
| @@ -0,0 +1,195 @@ |
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "chrome/browser/autofill/wallet/full_wallet.h" |
| + |
| +#include "base/logging.h" |
| +#include "base/string_number_conversions.h" |
| +#include "base/values.h" |
| + |
| +namespace { |
| + |
| +size_t kPanSize = 16; |
|
Dan Beam
2012/12/05 19:34:59
const x 3
ahutter
2012/12/05 23:37:23
Done.
|
| +size_t kBinSize = 6; |
| +size_t kCvnSize = 3; |
| + |
| +} // end anonymous namespace |
| + |
| +namespace wallet { |
| + |
| +FullWallet::FullWallet(int expiration_month, |
| + int expiration_year, |
| + const std::string& iin, |
| + const std::string& encrypted_rest, |
| + Address* billing_address, |
| + Address* shipping_address, |
| + std::vector<std::string> required_actions) |
| + : expiration_month_(expiration_month), |
| + expiration_year_(expiration_year), |
| + iin_(iin), |
| + encrypted_rest_(encrypted_rest), |
| + billing_address_(billing_address), |
| + shipping_address_(shipping_address), |
| + required_actions_(required_actions) { |
| + DCHECK(required_actions_.size() > 0 |
| + || (billing_address_ && shipping_address_)); |
|
Albert Bodenhamer
2012/12/05 18:56:45
nit: move the || to the line above and align the s
ahutter
2012/12/05 23:37:23
Done.
|
| +} |
| + |
| +FullWallet::~FullWallet() {} |
| + |
| +FullWallet* FullWallet::CreateFullWallet(const DictionaryValue& dictionary) { |
| + const ListValue* required_actions_list; |
| + std::vector<std::string> required_actions; |
| + if (dictionary.GetList("required_action", &required_actions_list)) { |
| + for (size_t i = 0; i < required_actions_list->GetSize(); i++) { |
| + std::string action; |
| + if (required_actions_list->GetString(i, &action)) |
| + required_actions.push_back(action); |
| + } |
| + if (required_actions.size() > 0) |
| + return new FullWallet(-1, -1, "", "", NULL, NULL, required_actions); |
| + } else { |
| + DVLOG(1) << "Response from Google wallet missing required actions"; |
| + } |
| + |
| + int expiration_month; |
| + if (!dictionary.GetInteger("expiration_month", &expiration_month)) { |
| + DLOG(ERROR) << "Response from Google wallet missing expiration month"; |
| + return NULL; |
| + } |
| + |
| + int expiration_year; |
| + if (!dictionary.GetInteger("expiration_year", &expiration_year)) { |
| + DLOG(ERROR) << "Response from Google wallet missing expiration year"; |
| + return NULL; |
| + } |
| + |
| + std::string iin; |
| + if (!dictionary.GetString("iin", &iin)) { |
| + DLOG(ERROR) << "Response from Google wallet missing iin"; |
| + return NULL; |
| + } |
| + |
| + std::string encrypted_rest; |
| + if (!dictionary.GetString("rest", &encrypted_rest)) { |
| + DLOG(ERROR) << "Response from Google wallet missing rest"; |
| + return NULL; |
| + } |
| + |
| + const DictionaryValue* billing_address_dict; |
| + if (!dictionary.GetDictionary("billing_address", &billing_address_dict)) { |
| + DLOG(ERROR) << "Response from Google wallet missing billing address"; |
| + return NULL; |
| + } |
| + |
| + Address* billing_address = |
| + Address::CreateAddressWithID(*billing_address_dict); |
| + if (!billing_address) { |
| + DLOG(ERROR) << "Response from Google wallet has malformed billing address"; |
| + return NULL; |
| + } |
| + |
| + const DictionaryValue* shipping_address_dict; |
| + Address* shipping_address; |
| + if (dictionary.GetDictionary("shipping_address", &shipping_address_dict)) { |
| + shipping_address = |
| + Address::CreateAddressWithID(*shipping_address_dict); |
| + } else { |
| + DVLOG(1) << "Response from Google wallet missing shipping address"; |
| + } |
| + |
| + return new FullWallet(expiration_month, |
| + expiration_year, |
| + iin, |
| + encrypted_rest, |
| + billing_address, |
| + shipping_address, |
| + required_actions); |
| +} |
| + |
| +bool FullWallet::operator==(const FullWallet& other) const { |
| + if (expiration_month_ != other.expiration_month_) |
| + return false; |
| + if (expiration_year_ != other.expiration_year_) |
| + return false; |
| + if (iin_ != other.iin_) |
| + return false; |
| + if (encrypted_rest_ != other.encrypted_rest_) |
| + return false; |
| + if (billing_address_.get() && other.billing_address_.get()) { |
| + if (*billing_address_.get() != *other.billing_address_.get()) |
| + return false; |
| + } else if (billing_address_.get() || other.billing_address_.get()) { |
| + return false; |
| + } |
| + if (shipping_address_.get() && other.shipping_address_.get()) { |
| + if (*shipping_address_.get() != *other.shipping_address_.get()) |
| + return false; |
| + } else if (shipping_address_.get() || other.shipping_address_.get()) { |
| + return false; |
| + } |
| + if (required_actions_ != other.required_actions_) |
| + return false; |
| + return true; |
| +} |
| + |
| +bool FullWallet::operator!=(const FullWallet& other) const { |
| + return !(*this == other); |
| +} |
| + |
| +const std::string FullWallet::GetPan(void* otp, size_t length) { |
| + if (cvn_.empty()) |
| + DecryptCardInfo(reinterpret_cast<uint8*>(otp), length); |
| + return pan_; |
| +} |
| + |
| +const std::string FullWallet::GetCvn(void* otp, size_t length) { |
| + if (pan_.empty()) |
| + DecryptCardInfo(reinterpret_cast<uint8*>(otp), length); |
| + return cvn_; |
| +} |
| + |
| +void FullWallet::DecryptCardInfo(uint8* otp, size_t length) { |
| + std::vector<uint8> operating_data; |
| + // Convert the encrypted rest to bytes so we can decrypt it with the OTP. |
| + if (!base::HexStringToBytes(encrypted_rest_, &operating_data)) { |
| + DLOG(ERROR) << "Failed to parse encrypted rest"; |
| + return; |
| + } |
| + |
| + // Ensure the OTP and encrypted data are of the same length otherwise |
| + // something has gone wrong and we can't decrypt the data. |
| + DCHECK_EQ(length, operating_data.size()); |
| + |
| + uint8* result = new uint8[length]; |
| + // XOR the OTP with the encrypted data to decrypt. |
| + for (size_t i = 0; i < length; i++) |
| + result[i] = otp[i] ^ operating_data[i]; |
| + |
| + // There is no uint8* to int64 so I convert the encrypted data to hex and then |
| + // parse the hex to an int64 before getting the int64 as a string. |
| + std::string hex_decrypted = base::HexEncode(&result, length); |
| + delete[] result; |
| + |
| + int64 decrypted; |
| + if (!base::HexStringToInt64(hex_decrypted, &decrypted)) { |
| + DLOG(ERROR) << "Failed to parse decrypted data in hex to int64"; |
| + return; |
| + } |
| + std::string card_info = base::Int64ToString(decrypted); |
| + |
| + size_t padded_length = kPanSize - kBinSize + kCvnSize; |
| + // The decrypted data is PAN without the IIN concatenated with the CVN, i.e. |
| + // PANPANPANPCVN. If what was decrypted is not of that size the front needs |
| + // to be padded with 0's until it is. |
| + if (card_info.size() != padded_length) |
| + card_info.insert(card_info.begin(), padded_length - card_info.size(), '0'); |
| + |
| + // Separate out the PAN from the CVN. |
| + size_t split = kPanSize - kBinSize; |
| + cvn_ = card_info.substr(split); |
| + pan_ = iin_ + card_info.substr(0, split); |
| +} |
| + |
| +} // end wallet namespace |