Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/gcm_driver/crypto/gcm_encryption_provider.h" | 5 #include "components/gcm_driver/crypto/gcm_encryption_provider.h" |
| 6 | 6 |
| 7 #include "base/base64.h" | |
| 7 #include "base/bind.h" | 8 #include "base/bind.h" |
| 8 #include "base/logging.h" | 9 #include "base/logging.h" |
| 10 #include "base/strings/string_util.h" | |
| 11 #include "components/gcm_driver/common/gcm_messages.h" | |
| 12 #include "components/gcm_driver/crypto/encryption_header_parsers.h" | |
| 9 #include "components/gcm_driver/crypto/gcm_key_store.h" | 13 #include "components/gcm_driver/crypto/gcm_key_store.h" |
| 14 #include "components/gcm_driver/crypto/gcm_message_cryptographer.h" | |
| 10 #include "components/gcm_driver/crypto/proto/gcm_encryption_data.pb.h" | 15 #include "components/gcm_driver/crypto/proto/gcm_encryption_data.pb.h" |
| 16 #include "crypto/curve25519.h" | |
| 11 | 17 |
| 12 namespace gcm { | 18 namespace gcm { |
| 13 | 19 |
| 20 const char kEncryptionProperty[] = "encryption"; | |
|
jianli
2015/08/04 00:49:30
All these constants, including the previously adde
Peter Beverloo
2015/09/25 16:37:35
Done for consistency, but please do note that cons
| |
| 21 const char kEncryptionKeyProperty[] = "encryption_key"; | |
| 22 const char kEncryptionDataProperty[] = "encryption_data"; | |
| 23 | |
| 14 // Directory in the GCM Store in which the encryption database will be stored. | 24 // Directory in the GCM Store in which the encryption database will be stored. |
| 15 const base::FilePath::CharType kEncryptionDirectoryName[] = | 25 const base::FilePath::CharType kEncryptionDirectoryName[] = |
| 16 FILE_PATH_LITERAL("Encryption"); | 26 FILE_PATH_LITERAL("Encryption"); |
| 17 | 27 |
| 18 GCMEncryptionProvider::GCMEncryptionProvider() | 28 GCMEncryptionProvider::GCMEncryptionProvider() |
| 19 : weak_ptr_factory_(this) { | 29 : weak_ptr_factory_(this) { |
| 20 } | 30 } |
| 21 | 31 |
| 22 GCMEncryptionProvider::~GCMEncryptionProvider() { | 32 GCMEncryptionProvider::~GCMEncryptionProvider() { |
| 23 } | 33 } |
| (...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 64 const PublicKeyCallback& callback, | 74 const PublicKeyCallback& callback, |
| 65 const KeyPair& pair) { | 75 const KeyPair& pair) { |
| 66 if (!pair.IsInitialized()) { | 76 if (!pair.IsInitialized()) { |
| 67 callback.Run(std::string()); | 77 callback.Run(std::string()); |
| 68 return; | 78 return; |
| 69 } | 79 } |
| 70 | 80 |
| 71 DCHECK_EQ(KeyPair::ECDH_CURVE_25519, pair.type()); | 81 DCHECK_EQ(KeyPair::ECDH_CURVE_25519, pair.type()); |
| 72 callback.Run(pair.public_key()); | 82 callback.Run(pair.public_key()); |
| 73 } | 83 } |
| 84 bool GCMEncryptionProvider::IsEncryptedMessage(const IncomingMessage& message) | |
| 85 const { | |
| 86 // Both the proprietary GCM protocol and the Web Push protocol require the | |
| 87 // encryption and encryption_key properties to be set. | |
| 88 if (message.data.find(kEncryptionProperty) == message.data.end() || | |
| 89 message.data.find(kEncryptionKeyProperty) == message.data.end()) | |
| 90 return false; | |
| 91 | |
| 92 // The proprietary GCM protocol will store the encrypted payload in an app | |
| 93 // data field called "encryption_data". | |
| 94 if (message.data.find(kEncryptionDataProperty) != message.data.end()) | |
| 95 return true; | |
| 96 | |
| 97 // The Web Push protocol uses the raw message data for the encrypted payload. | |
| 98 return message.raw_data.size() > 0; | |
| 99 } | |
| 100 | |
| 101 void GCMEncryptionProvider::DecryptMessage(const std::string& app_id, | |
| 102 const IncomingMessage& message, | |
| 103 const MessageCallback& callback) { | |
| 104 DCHECK(key_store_); | |
| 105 | |
| 106 const auto& encryption_header = message.data.find(kEncryptionProperty); | |
| 107 const auto& encryption_key_header = message.data.find(kEncryptionKeyProperty); | |
| 108 | |
| 109 // Callers are expected to call IsEncryptedMessage() prior to this method. | |
| 110 DCHECK(encryption_header != message.data.end()); | |
| 111 DCHECK(encryption_key_header != message.data.end()); | |
| 112 | |
| 113 std::vector<EncryptionHeaderValue> encryption_headers; | |
| 114 if (!ParseEncryptionHeader(encryption_header->second, &encryption_headers)) { | |
| 115 DLOG(ERROR) << "Unable to parse the value of the Encryption header"; | |
| 116 callback.Run(IncomingMessage(), false /* success */); | |
| 117 return; | |
| 118 } | |
| 119 | |
| 120 std::vector<EncryptionKeyHeaderValue> encryption_key_headers; | |
| 121 if (!ParseEncryptionKeyHeader(encryption_key_header->second, | |
| 122 &encryption_key_headers)) { | |
| 123 DLOG(ERROR) << "Unable to parse the value of the Encryption-Key header"; | |
| 124 callback.Run(IncomingMessage(), false /* success */); | |
| 125 return; | |
| 126 } | |
| 127 | |
| 128 // Note: The HTTP Encrypted Content specification defines that multiple rounds | |
| 129 // of encryption are allowed. Chrome's Web Push protocol implementation does | |
| 130 // not currently support this, due to not using the "keyid" parameter. | |
| 131 if (encryption_headers.size() != 1 || encryption_key_headers.size() != 1) { | |
| 132 DLOG(ERROR) << "Only a single encryption key is currently supported"; | |
| 133 callback.Run(IncomingMessage(), false /* success */); | |
| 134 return; | |
| 135 } | |
| 136 | |
| 137 std::string ciphertext; | |
| 138 | |
| 139 // Determine the payload. For the proprietary GCM protocol the payload is part | |
| 140 // of the app data, base64 URL encoded. For the Web Push protocol, it's | |
| 141 // included as raw data for the incoming message. | |
| 142 const auto& encryption_data_iter = message.data.find(kEncryptionDataProperty); | |
| 143 if (encryption_data_iter != message.data.end()) { | |
| 144 if (!Base64DecodeUrlSafe(encryption_data_iter->second, &ciphertext)) { | |
| 145 DLOG(ERROR) << "Unable to URL-safe base64 decode the encrypted data"; | |
| 146 callback.Run(IncomingMessage(), false /* success */); | |
| 147 return; | |
| 148 } | |
| 149 } else { | |
| 150 DCHECK(message.raw_data.size()); | |
| 151 ciphertext = message.raw_data; | |
| 152 } | |
| 153 | |
| 154 key_store_->GetKeys( | |
| 155 app_id, base::Bind(&GCMEncryptionProvider::DecryptMessageWithKey, | |
| 156 weak_ptr_factory_.GetWeakPtr(), message, callback, | |
| 157 encryption_headers[0], encryption_key_headers[0], | |
| 158 ciphertext)); | |
| 159 } | |
| 160 | |
| 161 void GCMEncryptionProvider::DecryptMessageWithKey( | |
| 162 const IncomingMessage& message, | |
| 163 const MessageCallback& callback, | |
| 164 const EncryptionHeaderValue& encryption_header, | |
| 165 const EncryptionKeyHeaderValue& encryption_key_header, | |
| 166 const std::string& ciphertext, | |
| 167 const KeyPair& pair) { | |
| 168 if (!pair.IsInitialized()) { | |
| 169 DLOG(ERROR) << "Unable to retrieve the keys for the incoming message."; | |
| 170 callback.Run(IncomingMessage(), false /* success */); | |
| 171 return; | |
| 172 } | |
| 173 | |
| 174 DCHECK_EQ(KeyPair::ECDH_CURVE_25519, pair.type()); | |
| 175 | |
| 176 // Calculate the shared secret between the client's private key and the | |
| 177 // server's public key. | |
| 178 uint8_t shared_key[crypto::curve25519::kBytes]; | |
| 179 crypto::curve25519::ScalarMult( | |
| 180 reinterpret_cast<const unsigned char*>(pair.private_key().data()), | |
| 181 reinterpret_cast<const unsigned char*>(encryption_key_header.dh.data()), | |
| 182 shared_key); | |
| 183 | |
| 184 const std::string shared_key_string(shared_key, | |
| 185 shared_key + sizeof(shared_key)); | |
| 186 | |
| 187 std::string plaintext; | |
| 188 | |
| 189 // TODO(peter): Support explicit keys for the decryption (don't use HKDF). | |
| 190 | |
| 191 GCMMessageCryptographer cryptographer; | |
| 192 if (!cryptographer.Decrypt(ciphertext, shared_key_string, | |
| 193 encryption_header.salt, encryption_header.rs, | |
| 194 &plaintext)) { | |
| 195 DLOG(ERROR) << "Unable to decrypt the incoming data."; | |
| 196 callback.Run(IncomingMessage(), false /* success */); | |
| 197 return; | |
| 198 } | |
| 199 | |
| 200 IncomingMessage decrypted_message; | |
| 201 decrypted_message.collapse_key = message.collapse_key; | |
| 202 decrypted_message.raw_data = plaintext; | |
| 203 | |
| 204 callback.Run(decrypted_message, true /* success */); | |
| 205 } | |
| 74 | 206 |
| 75 } // namespace gcm | 207 } // namespace gcm |
| OLD | NEW |