OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // NB: Modelled after Mozilla's code (originally written by Pamela Greene, | 5 #include "net/base/lookup_string_in_fixed_set.h" |
6 // later modified by others), but almost entirely rewritten for Chrome. | |
7 // (netwerk/dns/src/nsEffectiveTLDService.cpp) | |
8 /* ***** BEGIN LICENSE BLOCK ***** | |
9 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | |
10 * | |
11 * The contents of this file are subject to the Mozilla Public License Version | |
12 * 1.1 (the "License"); you may not use this file except in compliance with | |
13 * the License. You may obtain a copy of the License at | |
14 * http://www.mozilla.org/MPL/ | |
15 * | |
16 * Software distributed under the License is distributed on an "AS IS" basis, | |
17 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License | |
18 * for the specific language governing rights and limitations under the | |
19 * License. | |
20 * | |
21 * The Original Code is Mozilla Effective-TLD Service | |
22 * | |
23 * The Initial Developer of the Original Code is | |
24 * Google Inc. | |
25 * Portions created by the Initial Developer are Copyright (C) 2006 | |
26 * the Initial Developer. All Rights Reserved. | |
27 * | |
28 * Contributor(s): | |
29 * Pamela Greene <pamg.bugs@gmail.com> (original author) | |
30 * Daniel Witte <dwitte@stanford.edu> | |
31 * | |
32 * Alternatively, the contents of this file may be used under the terms of | |
33 * either the GNU General Public License Version 2 or later (the "GPL"), or | |
34 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), | |
35 * in which case the provisions of the GPL or the LGPL are applicable instead | |
36 * of those above. If you wish to allow use of your version of this file only | |
37 * under the terms of either the GPL or the LGPL, and not to allow others to | |
38 * use your version of this file under the terms of the MPL, indicate your | |
39 * decision by deleting the provisions above and replace them with the notice | |
40 * and other provisions required by the GPL or the LGPL. If you do not delete | |
41 * the provisions above, a recipient may use your version of this file under | |
42 * the terms of any one of the MPL, the GPL or the LGPL. | |
43 * | |
44 * ***** END LICENSE BLOCK ***** */ | |
45 | |
46 #include "net/base/registry_controlled_domains/registry_controlled_domain.h" | |
47 | 6 |
48 #include "base/logging.h" | 7 #include "base/logging.h" |
49 #include "base/strings/string_util.h" | |
50 #include "base/strings/utf_string_conversions.h" | |
51 #include "net/base/net_module.h" | |
52 #include "net/base/net_util.h" | |
53 #include "url/gurl.h" | |
54 #include "url/third_party/mozilla/url_parse.h" | |
55 | 8 |
56 namespace net { | 9 namespace net { |
57 namespace registry_controlled_domains { | |
58 | 10 |
59 namespace { | 11 namespace { |
60 #include "net/base/registry_controlled_domains/effective_tld_names-inc.cc" | |
61 | |
62 // See make_dafsa.py for documentation of the generated dafsa byte array. | |
63 | |
64 const unsigned char* g_graph = kDafsa; | |
65 size_t g_graph_length = sizeof(kDafsa); | |
66 | |
67 const int kNotFound = -1; | |
68 const int kExceptionRule = 1; | |
69 const int kWildcardRule = 2; | |
70 const int kPrivateRule = 4; | |
71 | 12 |
72 // Read next offset from pos. | 13 // Read next offset from pos. |
73 // Returns true if an offset could be read, false otherwise. | 14 // Returns true if an offset could be read, false otherwise. |
74 bool GetNextOffset(const unsigned char** pos, const unsigned char* end, | 15 bool GetNextOffset(const unsigned char** pos, |
| 16 const unsigned char* end, |
75 const unsigned char** offset) { | 17 const unsigned char** offset) { |
76 if (*pos == end) | 18 if (*pos == end) |
77 return false; | 19 return false; |
78 | 20 |
79 // When reading an offset the byte array must always contain at least | 21 // When reading an offset the byte array must always contain at least |
80 // three more bytes to consume. First the offset to read, then a node | 22 // three more bytes to consume. First the offset to read, then a node |
81 // to skip over and finally a destination node. No object can be smaller | 23 // to skip over and finally a destination node. No object can be smaller |
82 // than one byte. | 24 // than one byte. |
83 CHECK_LT(*pos + 2, end); | 25 CHECK_LT(*pos + 2, end); |
84 size_t bytes_consumed; | 26 size_t bytes_consumed; |
(...skipping 19 matching lines...) Expand all Loading... |
104 } | 46 } |
105 | 47 |
106 // Check if byte at offset is last in label. | 48 // Check if byte at offset is last in label. |
107 bool IsEOL(const unsigned char* offset, const unsigned char* end) { | 49 bool IsEOL(const unsigned char* offset, const unsigned char* end) { |
108 CHECK_LT(offset, end); | 50 CHECK_LT(offset, end); |
109 return (*offset & 0x80) != 0; | 51 return (*offset & 0x80) != 0; |
110 } | 52 } |
111 | 53 |
112 // Check if byte at offset matches first character in key. | 54 // Check if byte at offset matches first character in key. |
113 // This version matches characters not last in label. | 55 // This version matches characters not last in label. |
114 bool IsMatch(const unsigned char* offset, const unsigned char* end, | 56 bool IsMatch(const unsigned char* offset, |
| 57 const unsigned char* end, |
115 const char* key) { | 58 const char* key) { |
116 CHECK_LT(offset, end); | 59 CHECK_LT(offset, end); |
117 return *offset == *key; | 60 return *offset == *key; |
118 } | 61 } |
119 | 62 |
120 // Check if byte at offset matches first character in key. | 63 // Check if byte at offset matches first character in key. |
121 // This version matches characters last in label. | 64 // This version matches characters last in label. |
122 bool IsEndCharMatch(const unsigned char* offset, const unsigned char* end, | 65 bool IsEndCharMatch(const unsigned char* offset, |
| 66 const unsigned char* end, |
123 const char* key) { | 67 const char* key) { |
124 CHECK_LT(offset, end); | 68 CHECK_LT(offset, end); |
125 return *offset == (*key | 0x80); | 69 return *offset == (*key | 0x80); |
126 } | 70 } |
127 | 71 |
128 // Read return value at offset. | 72 // Read return value at offset. |
129 // Returns true if a return value could be read, false otherwise. | 73 // Returns true if a return value could be read, false otherwise. |
130 bool GetReturnValue(const unsigned char* offset, const unsigned char* end, | 74 bool GetReturnValue(const unsigned char* offset, |
| 75 const unsigned char* end, |
131 int* return_value) { | 76 int* return_value) { |
132 CHECK_LT(offset, end); | 77 CHECK_LT(offset, end); |
133 if ((*offset & 0xE0) == 0x80) { | 78 if ((*offset & 0xE0) == 0x80) { |
134 *return_value = *offset & 0x0F; | 79 *return_value = *offset & 0x0F; |
135 return true; | 80 return true; |
136 } | 81 } |
137 return false; | 82 return false; |
138 } | 83 } |
139 | 84 |
| 85 } // namespace |
| 86 |
140 // Lookup a domain key in a byte array generated by make_dafsa.py. | 87 // Lookup a domain key in a byte array generated by make_dafsa.py. |
141 // The rule type is returned if key is found, otherwise kNotFound is returned. | 88 // The rule type is returned if key is found, otherwise kDafsaNotFound is |
142 int LookupString(const unsigned char* graph, size_t length, const char* key, | 89 // returned. |
143 size_t key_length) { | 90 int LookupStringInFixedSet(const unsigned char* graph, |
| 91 size_t length, |
| 92 const char* key, |
| 93 size_t key_length) { |
144 const unsigned char* pos = graph; | 94 const unsigned char* pos = graph; |
145 const unsigned char* end = graph + length; | 95 const unsigned char* end = graph + length; |
146 const unsigned char* offset = pos; | 96 const unsigned char* offset = pos; |
147 const char* key_end = key + key_length; | 97 const char* key_end = key + key_length; |
148 while (GetNextOffset(&pos, end, &offset)) { | 98 while (GetNextOffset(&pos, end, &offset)) { |
149 // char <char>+ end_char offsets | 99 // char <char>+ end_char offsets |
150 // char <char>+ return value | 100 // char <char>+ return value |
151 // char end_char offsets | 101 // char end_char offsets |
152 // char return value | 102 // char return value |
153 // end_char offsets | 103 // end_char offsets |
154 // return_value | 104 // return_value |
155 bool did_consume = false; | 105 bool did_consume = false; |
156 if (key != key_end && !IsEOL(offset, end)) { | 106 if (key != key_end && !IsEOL(offset, end)) { |
157 // Leading <char> is not a match. Don't dive into this child | 107 // Leading <char> is not a match. Don't dive into this child |
158 if (!IsMatch(offset, end, key)) | 108 if (!IsMatch(offset, end, key)) |
159 continue; | 109 continue; |
160 did_consume = true; | 110 did_consume = true; |
161 ++offset; | 111 ++offset; |
162 ++key; | 112 ++key; |
163 // Possible matches at this point: | 113 // Possible matches at this point: |
164 // <char>+ end_char offsets | 114 // <char>+ end_char offsets |
165 // <char>+ return value | 115 // <char>+ return value |
166 // end_char offsets | 116 // end_char offsets |
167 // return value | 117 // return value |
168 // Remove all remaining <char> nodes possible | 118 // Remove all remaining <char> nodes possible |
169 while (!IsEOL(offset, end) && key != key_end) { | 119 while (!IsEOL(offset, end) && key != key_end) { |
170 if (!IsMatch(offset, end, key)) | 120 if (!IsMatch(offset, end, key)) |
171 return kNotFound; | 121 return kDafsaNotFound; |
172 ++key; | 122 ++key; |
173 ++offset; | 123 ++offset; |
174 } | 124 } |
175 } | 125 } |
176 // Possible matches at this point: | 126 // Possible matches at this point: |
177 // end_char offsets | 127 // end_char offsets |
178 // return_value | 128 // return_value |
179 // If one or more <char> elements were consumed, a failure | 129 // If one or more <char> elements were consumed, a failure |
180 // to match is terminal. Otherwise, try the next node. | 130 // to match is terminal. Otherwise, try the next node. |
181 if (key == key_end) { | 131 if (key == key_end) { |
182 int return_value; | 132 int return_value; |
183 if (GetReturnValue(offset, end, &return_value)) | 133 if (GetReturnValue(offset, end, &return_value)) |
184 return return_value; | 134 return return_value; |
185 // The DAFSA guarantees that if the first char is a match, all | 135 // The DAFSA guarantees that if the first char is a match, all |
186 // remaining char elements MUST match if the key is truly present. | 136 // remaining char elements MUST match if the key is truly present. |
187 if (did_consume) | 137 if (did_consume) |
188 return kNotFound; | 138 return kDafsaNotFound; |
189 continue; | 139 continue; |
190 } | 140 } |
191 if (!IsEndCharMatch(offset, end, key)) { | 141 if (!IsEndCharMatch(offset, end, key)) { |
192 if (did_consume) | 142 if (did_consume) |
193 return kNotFound; // Unexpected | 143 return kDafsaNotFound; // Unexpected |
194 continue; | 144 continue; |
195 } | 145 } |
196 ++key; | 146 ++key; |
197 pos = ++offset; // Dive into child | 147 pos = ++offset; // Dive into child |
198 } | 148 } |
199 return kNotFound; // No match | 149 return kDafsaNotFound; // No match |
200 } | 150 } |
201 | 151 |
202 size_t GetRegistryLengthImpl( | |
203 const std::string& host, | |
204 UnknownRegistryFilter unknown_filter, | |
205 PrivateRegistryFilter private_filter) { | |
206 DCHECK(!host.empty()); | |
207 | |
208 // Skip leading dots. | |
209 const size_t host_check_begin = host.find_first_not_of('.'); | |
210 if (host_check_begin == std::string::npos) | |
211 return 0; // Host is only dots. | |
212 | |
213 // A single trailing dot isn't relevant in this determination, but does need | |
214 // to be included in the final returned length. | |
215 size_t host_check_len = host.length(); | |
216 if (host[host_check_len - 1] == '.') { | |
217 --host_check_len; | |
218 DCHECK(host_check_len > 0); // If this weren't true, the host would be ".", | |
219 // and we'd have already returned above. | |
220 if (host[host_check_len - 1] == '.') | |
221 return 0; // Multiple trailing dots. | |
222 } | |
223 | |
224 // Walk up the domain tree, most specific to least specific, | |
225 // looking for matches at each level. | |
226 size_t prev_start = std::string::npos; | |
227 size_t curr_start = host_check_begin; | |
228 size_t next_dot = host.find('.', curr_start); | |
229 if (next_dot >= host_check_len) // Catches std::string::npos as well. | |
230 return 0; // This can't have a registry + domain. | |
231 while (1) { | |
232 const char* domain_str = host.data() + curr_start; | |
233 size_t domain_length = host_check_len - curr_start; | |
234 int type = LookupString(g_graph, g_graph_length, domain_str, domain_length); | |
235 bool do_check = | |
236 type != kNotFound && (!(type & kPrivateRule) || | |
237 private_filter == INCLUDE_PRIVATE_REGISTRIES); | |
238 | |
239 // If the apparent match is a private registry and we're not including | |
240 // those, it can't be an actual match. | |
241 if (do_check) { | |
242 // Exception rules override wildcard rules when the domain is an exact | |
243 // match, but wildcards take precedence when there's a subdomain. | |
244 if (type & kWildcardRule && (prev_start != std::string::npos)) { | |
245 // If prev_start == host_check_begin, then the host is the registry | |
246 // itself, so return 0. | |
247 return (prev_start == host_check_begin) ? 0 | |
248 : (host.length() - prev_start); | |
249 } | |
250 | |
251 if (type & kExceptionRule) { | |
252 if (next_dot == std::string::npos) { | |
253 // If we get here, we had an exception rule with no dots (e.g. | |
254 // "!foo"). This would only be valid if we had a corresponding | |
255 // wildcard rule, which would have to be "*". But we explicitly | |
256 // disallow that case, so this kind of rule is invalid. | |
257 NOTREACHED() << "Invalid exception rule"; | |
258 return 0; | |
259 } | |
260 return host.length() - next_dot - 1; | |
261 } | |
262 | |
263 // If curr_start == host_check_begin, then the host is the registry | |
264 // itself, so return 0. | |
265 return (curr_start == host_check_begin) ? 0 | |
266 : (host.length() - curr_start); | |
267 } | |
268 | |
269 if (next_dot >= host_check_len) // Catches std::string::npos as well. | |
270 break; | |
271 | |
272 prev_start = curr_start; | |
273 curr_start = next_dot + 1; | |
274 next_dot = host.find('.', curr_start); | |
275 } | |
276 | |
277 // No rule found in the registry. curr_start now points to the first | |
278 // character of the last subcomponent of the host, so if we allow unknown | |
279 // registries, return the length of this subcomponent. | |
280 return unknown_filter == INCLUDE_UNKNOWN_REGISTRIES ? | |
281 (host.length() - curr_start) : 0; | |
282 } | |
283 | |
284 std::string GetDomainAndRegistryImpl( | |
285 const std::string& host, PrivateRegistryFilter private_filter) { | |
286 DCHECK(!host.empty()); | |
287 | |
288 // Find the length of the registry for this host. | |
289 const size_t registry_length = | |
290 GetRegistryLengthImpl(host, INCLUDE_UNKNOWN_REGISTRIES, private_filter); | |
291 if ((registry_length == std::string::npos) || (registry_length == 0)) | |
292 return std::string(); // No registry. | |
293 // The "2" in this next line is 1 for the dot, plus a 1-char minimum preceding | |
294 // subcomponent length. | |
295 DCHECK(host.length() >= 2); | |
296 if (registry_length > (host.length() - 2)) { | |
297 NOTREACHED() << | |
298 "Host does not have at least one subcomponent before registry!"; | |
299 return std::string(); | |
300 } | |
301 | |
302 // Move past the dot preceding the registry, and search for the next previous | |
303 // dot. Return the host from after that dot, or the whole host when there is | |
304 // no dot. | |
305 const size_t dot = host.rfind('.', host.length() - registry_length - 2); | |
306 if (dot == std::string::npos) | |
307 return host; | |
308 return host.substr(dot + 1); | |
309 } | |
310 | |
311 } // namespace | |
312 | |
313 std::string GetDomainAndRegistry( | |
314 const GURL& gurl, | |
315 PrivateRegistryFilter filter) { | |
316 const url::Component host = gurl.parsed_for_possibly_invalid_spec().host; | |
317 if ((host.len <= 0) || gurl.HostIsIPAddress()) | |
318 return std::string(); | |
319 return GetDomainAndRegistryImpl(std::string( | |
320 gurl.possibly_invalid_spec().data() + host.begin, host.len), filter); | |
321 } | |
322 | |
323 std::string GetDomainAndRegistry( | |
324 const std::string& host, | |
325 PrivateRegistryFilter filter) { | |
326 url::CanonHostInfo host_info; | |
327 const std::string canon_host(CanonicalizeHost(host, &host_info)); | |
328 if (canon_host.empty() || host_info.IsIPAddress()) | |
329 return std::string(); | |
330 return GetDomainAndRegistryImpl(canon_host, filter); | |
331 } | |
332 | |
333 bool SameDomainOrHost( | |
334 const GURL& gurl1, | |
335 const GURL& gurl2, | |
336 PrivateRegistryFilter filter) { | |
337 // See if both URLs have a known domain + registry, and those values are the | |
338 // same. | |
339 const std::string domain1(GetDomainAndRegistry(gurl1, filter)); | |
340 const std::string domain2(GetDomainAndRegistry(gurl2, filter)); | |
341 if (!domain1.empty() || !domain2.empty()) | |
342 return domain1 == domain2; | |
343 | |
344 // No domains. See if the hosts are identical. | |
345 const url::Component host1 = gurl1.parsed_for_possibly_invalid_spec().host; | |
346 const url::Component host2 = gurl2.parsed_for_possibly_invalid_spec().host; | |
347 if ((host1.len <= 0) || (host1.len != host2.len)) | |
348 return false; | |
349 return !strncmp(gurl1.possibly_invalid_spec().data() + host1.begin, | |
350 gurl2.possibly_invalid_spec().data() + host2.begin, | |
351 host1.len); | |
352 } | |
353 | |
354 size_t GetRegistryLength( | |
355 const GURL& gurl, | |
356 UnknownRegistryFilter unknown_filter, | |
357 PrivateRegistryFilter private_filter) { | |
358 const url::Component host = gurl.parsed_for_possibly_invalid_spec().host; | |
359 if (host.len <= 0) | |
360 return std::string::npos; | |
361 if (gurl.HostIsIPAddress()) | |
362 return 0; | |
363 return GetRegistryLengthImpl( | |
364 std::string(gurl.possibly_invalid_spec().data() + host.begin, host.len), | |
365 unknown_filter, | |
366 private_filter); | |
367 } | |
368 | |
369 size_t GetRegistryLength( | |
370 const std::string& host, | |
371 UnknownRegistryFilter unknown_filter, | |
372 PrivateRegistryFilter private_filter) { | |
373 url::CanonHostInfo host_info; | |
374 const std::string canon_host(CanonicalizeHost(host, &host_info)); | |
375 if (canon_host.empty()) | |
376 return std::string::npos; | |
377 if (host_info.IsIPAddress()) | |
378 return 0; | |
379 return GetRegistryLengthImpl(canon_host, unknown_filter, private_filter); | |
380 } | |
381 | |
382 void SetFindDomainGraph() { | |
383 g_graph = kDafsa; | |
384 g_graph_length = sizeof(kDafsa); | |
385 } | |
386 | |
387 void SetFindDomainGraph(const unsigned char* domains, size_t length) { | |
388 CHECK(domains); | |
389 CHECK_NE(length, 0u); | |
390 g_graph = domains; | |
391 g_graph_length = length; | |
392 } | |
393 | |
394 } // namespace registry_controlled_domains | |
395 } // namespace net | 152 } // namespace net |
OLD | NEW |