OLD | NEW |
---|---|
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/renderer/origin_trials/trial_token.h" | 5 #include "content/renderer/origin_trials/trial_token.h" |
6 | 6 |
7 #include <openssl/curve25519.h> | 7 #include <openssl/curve25519.h> |
8 | 8 |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
11 #include "base/base64.h" | 11 #include "base/base64.h" |
12 #include "base/macros.h" | 12 #include "base/macros.h" |
13 #include "base/strings/string_number_conversions.h" | 13 #include "base/strings/string_number_conversions.h" |
14 #include "base/strings/string_split.h" | 14 #include "base/strings/string_split.h" |
15 #include "base/strings/string_util.h" | 15 #include "base/strings/string_util.h" |
16 #include "base/strings/utf_string_conversions.h" | 16 #include "base/strings/utf_string_conversions.h" |
17 #include "base/time/time.h" | 17 #include "base/time/time.h" |
18 #include "content/public/common/content_client.h" | |
19 #include "content/public/renderer/content_renderer_client.h" | |
18 #include "url/origin.h" | 20 #include "url/origin.h" |
19 | 21 |
20 namespace content { | 22 namespace content { |
21 | 23 |
22 namespace { | 24 namespace { |
23 | 25 |
24 // Version 1 is the only token version currently supported | 26 // Version 1 is the only token version currently supported |
25 const uint8_t kVersion1 = 1; | 27 const uint8_t kVersion1 = 1; |
26 | 28 |
27 const char* kFieldSeparator = "|"; | 29 const char* kFieldSeparator = "|"; |
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
70 const std::string& origin_string = parts[1]; | 72 const std::string& origin_string = parts[1]; |
71 const std::string& feature_name = parts[2]; | 73 const std::string& feature_name = parts[2]; |
72 const std::string& expiry_string = parts[3]; | 74 const std::string& expiry_string = parts[3]; |
73 | 75 |
74 uint64_t expiry_timestamp; | 76 uint64_t expiry_timestamp; |
75 if (!base::StringToUint64(expiry_string, &expiry_timestamp)) { | 77 if (!base::StringToUint64(expiry_string, &expiry_timestamp)) { |
76 return nullptr; | 78 return nullptr; |
77 } | 79 } |
78 | 80 |
79 // Ensure that the origin is a valid (non-unique) origin URL | 81 // Ensure that the origin is a valid (non-unique) origin URL |
80 GURL origin_url(origin_string); | 82 url::Origin origin = url::Origin(GURL(origin_string)); |
81 if (url::Origin(origin_url).unique()) { | 83 if (origin.unique()) { |
82 return nullptr; | 84 return nullptr; |
83 } | 85 } |
84 | 86 |
85 // Signed data is (origin + "|" + feature_name + "|" + expiry). | 87 // Signed data is (origin + "|" + feature_name + "|" + expiry). |
86 std::string data = token_contents.substr(signature.length() + 1); | 88 std::string data = token_contents.substr(signature.length() + 1); |
87 | 89 |
88 return make_scoped_ptr(new TrialToken(version, signature, data, origin_url, | 90 return make_scoped_ptr(new TrialToken(version, signature, data, origin, |
89 feature_name, expiry_timestamp)); | 91 feature_name, expiry_timestamp)); |
90 } | 92 } |
91 | 93 |
92 TrialToken::TrialToken(uint8_t version, | 94 bool TrialToken::Verify(const url::Origin& origin, |
93 const std::string& signature, | 95 base::StringPiece feature_name) { |
94 const std::string& data, | 96 if (!IsAppropriate(origin, feature_name)) |
95 const GURL& origin, | 97 return false; |
96 const std::string& feature_name, | 98 ContentClient* content_client = GetContentClient(); |
iclelland
2016/03/02 22:36:29
Why is this logic moved here? The separation betwe
Marijn Kruisselbrink
2016/03/02 22:43:12
I could have left this in part 2 of my change inst
| |
97 uint64_t expiry_timestamp) | 99 // TODO(iclelland): Allow for multiple signing keys, and iterate over all |
98 : version_(version), | 100 // active keys here. https://crbug.com/543220 |
99 signature_(signature), | 101 base::StringPiece public_key = |
100 data_(data), | 102 content_client->renderer()->GetOriginTrialPublicKey(); |
101 origin_(origin), | 103 return IsValid(base::Time::Now(), public_key); |
102 feature_name_(feature_name), | 104 } |
103 expiry_timestamp_(expiry_timestamp) {} | |
104 | 105 |
105 bool TrialToken::IsAppropriate(const std::string& origin, | 106 bool TrialToken::IsAppropriate(const url::Origin& origin, |
106 const std::string& feature_name) const { | 107 base::StringPiece feature_name) const { |
107 return ValidateOrigin(origin) && ValidateFeatureName(feature_name); | 108 return ValidateOrigin(origin) && ValidateFeatureName(feature_name); |
108 } | 109 } |
109 | 110 |
110 bool TrialToken::IsValid(const base::Time& now, | 111 bool TrialToken::IsValid(const base::Time& now, |
111 const base::StringPiece& public_key) const { | 112 base::StringPiece public_key) const { |
112 // TODO(iclelland): Allow for multiple signing keys, and iterate over all | |
113 // active keys here. https://crbug.com/543220 | |
114 return ValidateDate(now) && ValidateSignature(public_key); | 113 return ValidateDate(now) && ValidateSignature(public_key); |
115 } | 114 } |
116 | 115 |
117 bool TrialToken::ValidateOrigin(const std::string& origin) const { | 116 bool TrialToken::ValidateOrigin(const url::Origin& origin) const { |
118 return GURL(origin) == origin_; | 117 return origin == origin_; |
119 } | 118 } |
120 | 119 |
121 bool TrialToken::ValidateFeatureName(const std::string& feature_name) const { | 120 bool TrialToken::ValidateFeatureName(base::StringPiece feature_name) const { |
122 return feature_name == feature_name_; | 121 return feature_name == feature_name_; |
123 } | 122 } |
124 | 123 |
125 bool TrialToken::ValidateDate(const base::Time& now) const { | 124 bool TrialToken::ValidateDate(const base::Time& now) const { |
126 base::Time expiry_time = base::Time::FromDoubleT((double)expiry_timestamp_); | 125 return expiry_time_ > now; |
127 return expiry_time > now; | |
128 } | 126 } |
129 | 127 |
130 bool TrialToken::ValidateSignature(const base::StringPiece& public_key) const { | 128 bool TrialToken::ValidateSignature(base::StringPiece public_key) const { |
131 return ValidateSignature(signature_, data_, public_key); | 129 return ValidateSignature(signature_, data_, public_key); |
132 } | 130 } |
133 | 131 |
134 // static | 132 // static |
135 bool TrialToken::ValidateSignature(const std::string& signature_text, | 133 bool TrialToken::ValidateSignature(const std::string& signature_text, |
136 const std::string& data, | 134 const std::string& data, |
137 const base::StringPiece& public_key) { | 135 base::StringPiece public_key) { |
138 // Public key must be 32 bytes long for Ed25519. | 136 // Public key must be 32 bytes long for Ed25519. |
139 CHECK_EQ(public_key.length(), 32UL); | 137 CHECK_EQ(public_key.length(), 32UL); |
140 | 138 |
141 std::string signature; | 139 std::string signature; |
142 // signature_text is base64-encoded; decode first. | 140 // signature_text is base64-encoded; decode first. |
143 if (!base::Base64Decode(signature_text, &signature)) { | 141 if (!base::Base64Decode(signature_text, &signature)) { |
144 return false; | 142 return false; |
145 } | 143 } |
146 | 144 |
147 // Signature must be 64 bytes long | 145 // Signature must be 64 bytes long |
148 if (signature.length() != 64) { | 146 if (signature.length() != 64) { |
149 return false; | 147 return false; |
150 } | 148 } |
151 | 149 |
152 int result = ED25519_verify( | 150 int result = ED25519_verify( |
153 reinterpret_cast<const uint8_t*>(data.data()), data.length(), | 151 reinterpret_cast<const uint8_t*>(data.data()), data.length(), |
154 reinterpret_cast<const uint8_t*>(signature.data()), | 152 reinterpret_cast<const uint8_t*>(signature.data()), |
155 reinterpret_cast<const uint8_t*>(public_key.data())); | 153 reinterpret_cast<const uint8_t*>(public_key.data())); |
156 return (result != 0); | 154 return (result != 0); |
157 } | 155 } |
158 | 156 |
157 TrialToken::TrialToken(uint8_t version, | |
158 const std::string& signature, | |
159 const std::string& data, | |
160 const url::Origin& origin, | |
161 const std::string& feature_name, | |
162 uint64_t expiry_timestamp) | |
163 : version_(version), | |
164 signature_(signature), | |
165 data_(data), | |
166 origin_(origin), | |
167 feature_name_(feature_name), | |
168 expiry_time_(base::Time::FromDoubleT(expiry_timestamp)) {} | |
169 | |
159 } // namespace content | 170 } // namespace content |
OLD | NEW |