OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "config.h" | 5 #include "config.h" |
6 #include "core/frame/csp/CSPSourceList.h" | 6 #include "core/frame/csp/CSPSourceList.h" |
7 | 7 |
8 #include "core/frame/csp/CSPSource.h" | 8 #include "core/frame/csp/CSPSource.h" |
9 #include "core/frame/csp/ContentSecurityPolicy.h" | 9 #include "core/frame/csp/ContentSecurityPolicy.h" |
| 10 #include "platform/CryptoUtilities.h" |
10 #include "platform/ParsingUtilities.h" | 11 #include "platform/ParsingUtilities.h" |
11 #include "platform/weborigin/KURL.h" | 12 #include "platform/weborigin/KURL.h" |
12 #include "platform/weborigin/SecurityOrigin.h" | 13 #include "platform/weborigin/SecurityOrigin.h" |
13 #include "wtf/HashSet.h" | 14 #include "wtf/HashSet.h" |
14 #include "wtf/StringHasher.h" | |
15 #include "wtf/text/Base64.h" | 15 #include "wtf/text/Base64.h" |
16 #include "wtf/text/WTFString.h" | 16 #include "wtf/text/WTFString.h" |
17 | 17 |
18 namespace WTF { | |
19 | |
20 struct DigestValueHash { | |
21 static unsigned hash(const WebCore::DigestValue& v) | |
22 { | |
23 return StringHasher::computeHash(v.data(), v.size()); | |
24 } | |
25 static bool equal(const WebCore::DigestValue& a, const WebCore::DigestValue&
b) | |
26 { | |
27 return a == b; | |
28 }; | |
29 static const bool safeToCompareToEmptyOrDeleted = true; | |
30 }; | |
31 template <> | |
32 struct DefaultHash<WebCore::DigestValue> { | |
33 typedef DigestValueHash Hash; | |
34 }; | |
35 | |
36 template <> | |
37 struct DefaultHash<WebCore::ContentSecurityPolicyHashAlgorithm> { | |
38 typedef IntHash<WebCore::ContentSecurityPolicyHashAlgorithm> Hash; | |
39 }; | |
40 template <> | |
41 struct HashTraits<WebCore::ContentSecurityPolicyHashAlgorithm> : UnsignedWithZer
oKeyHashTraits<WebCore::ContentSecurityPolicyHashAlgorithm> { | |
42 }; | |
43 | |
44 } // namespace WTF | |
45 | |
46 namespace WebCore { | 18 namespace WebCore { |
47 | 19 |
48 static bool isSourceListNone(const UChar* begin, const UChar* end) | 20 static bool isSourceListNone(const UChar* begin, const UChar* end) |
49 { | 21 { |
50 skipWhile<UChar, isASCIISpace>(begin, end); | 22 skipWhile<UChar, isASCIISpace>(begin, end); |
51 | 23 |
52 const UChar* position = begin; | 24 const UChar* position = begin; |
53 skipWhile<UChar, isSourceCharacter>(position, end); | 25 skipWhile<UChar, isSourceCharacter>(position, end); |
54 if (!equalIgnoringCase("'none'", begin, position - begin)) | 26 if (!equalIgnoringCase("'none'", begin, position - begin)) |
55 return false; | 27 return false; |
(...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
190 if (m_policy->experimentalFeaturesEnabled()) { | 162 if (m_policy->experimentalFeaturesEnabled()) { |
191 String nonce; | 163 String nonce; |
192 if (!parseNonce(begin, end, nonce)) | 164 if (!parseNonce(begin, end, nonce)) |
193 return false; | 165 return false; |
194 | 166 |
195 if (!nonce.isNull()) { | 167 if (!nonce.isNull()) { |
196 addSourceNonce(nonce); | 168 addSourceNonce(nonce); |
197 return true; | 169 return true; |
198 } | 170 } |
199 | 171 |
200 DigestValue hash; | 172 CryptoUtil::DigestValue hash; |
201 ContentSecurityPolicyHashAlgorithm algorithm = ContentSecurityPolicyHash
AlgorithmNone; | 173 ContentSecurityPolicyHashAlgorithm algorithm = ContentSecurityPolicyHash
AlgorithmNone; |
202 if (!parseHash(begin, end, hash, algorithm)) | 174 if (!parseHash(begin, end, hash, algorithm)) |
203 return false; | 175 return false; |
204 | 176 |
205 if (hash.size() > 0) { | 177 if (hash.size() > 0) { |
206 addSourceHash(algorithm, hash); | 178 addSourceHash(algorithm, hash); |
207 return true; | 179 return true; |
208 } | 180 } |
209 } | 181 } |
210 | 182 |
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
302 return false; | 274 return false; |
303 | 275 |
304 nonce = String(nonceBegin, position - nonceBegin); | 276 nonce = String(nonceBegin, position - nonceBegin); |
305 return true; | 277 return true; |
306 } | 278 } |
307 | 279 |
308 // hash-source = "'" hash-algorithm "-" hash-value "'" | 280 // hash-source = "'" hash-algorithm "-" hash-value "'" |
309 // hash-algorithm = "sha1" / "sha256" / "sha384" / "sha512" | 281 // hash-algorithm = "sha1" / "sha256" / "sha384" / "sha512" |
310 // hash-value = 1*( ALPHA / DIGIT / "+" / "/" / "=" ) | 282 // hash-value = 1*( ALPHA / DIGIT / "+" / "/" / "=" ) |
311 // | 283 // |
312 bool CSPSourceList::parseHash(const UChar* begin, const UChar* end, DigestValue&
hash, ContentSecurityPolicyHashAlgorithm& hashAlgorithm) | 284 bool CSPSourceList::parseHash(const UChar* begin, const UChar* end, CryptoUtil::
DigestValue& hash, ContentSecurityPolicyHashAlgorithm& hashAlgorithm) |
313 { | 285 { |
314 // Any additions or subtractions from this struct should also modify the | 286 // Any additions or subtractions from this struct should also modify the |
315 // respective entries in the kAlgorithmMap array in checkDigest(). | 287 // respective entries in the kAlgorithmMap array in checkDigest(). |
316 static const struct { | 288 static const struct { |
317 const char* prefix; | 289 const char* prefix; |
318 ContentSecurityPolicyHashAlgorithm algorithm; | 290 ContentSecurityPolicyHashAlgorithm algorithm; |
319 } kSupportedPrefixes[] = { | 291 } kSupportedPrefixes[] = { |
320 { "'sha1-", ContentSecurityPolicyHashAlgorithmSha1 }, | 292 { "'sha1-", ContentSecurityPolicyHashAlgorithmSha1 }, |
321 { "'sha256-", ContentSecurityPolicyHashAlgorithmSha256 }, | 293 { "'sha256-", ContentSecurityPolicyHashAlgorithmSha256 }, |
322 { "'sha384-", ContentSecurityPolicyHashAlgorithmSha384 }, | 294 { "'sha384-", ContentSecurityPolicyHashAlgorithmSha384 }, |
(...skipping 28 matching lines...) Expand all Loading... |
351 | 323 |
352 // Base64 encodings may end with exactly one or two '=' characters | 324 // Base64 encodings may end with exactly one or two '=' characters |
353 skipExactly<UChar>(position, position + 1, '='); | 325 skipExactly<UChar>(position, position + 1, '='); |
354 skipExactly<UChar>(position, position + 1, '='); | 326 skipExactly<UChar>(position, position + 1, '='); |
355 | 327 |
356 if ((position + 1) != end || *position != '\'' || !(position - hashBegin)) | 328 if ((position + 1) != end || *position != '\'' || !(position - hashBegin)) |
357 return false; | 329 return false; |
358 | 330 |
359 Vector<char> hashVector; | 331 Vector<char> hashVector; |
360 base64Decode(hashBegin, position - hashBegin, hashVector); | 332 base64Decode(hashBegin, position - hashBegin, hashVector); |
361 if (hashVector.size() > kMaxDigestSize) | 333 if (hashVector.size() > CryptoUtil::kMaxDigestSize) |
362 return false; | 334 return false; |
363 hash.append(reinterpret_cast<uint8_t*>(hashVector.data()), hashVector.size()
); | 335 hash.append(reinterpret_cast<uint8_t*>(hashVector.data()), hashVector.size()
); |
364 return true; | 336 return true; |
365 } | 337 } |
366 | 338 |
367 // ; <scheme> production from RFC 3986 | 339 // ; <scheme> production from RFC 3986 |
368 // scheme = ALPHA *( ALPHA / DIGIT / "+" / "-" / "." ) | 340 // scheme = ALPHA *( ALPHA / DIGIT / "+" / "-" / "." ) |
369 // | 341 // |
370 bool CSPSourceList::parseScheme(const UChar* begin, const UChar* end, String& sc
heme) | 342 bool CSPSourceList::parseScheme(const UChar* begin, const UChar* end, String& sc
heme) |
371 { | 343 { |
(...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
499 void CSPSourceList::addSourceUnsafeEval() | 471 void CSPSourceList::addSourceUnsafeEval() |
500 { | 472 { |
501 m_allowEval = true; | 473 m_allowEval = true; |
502 } | 474 } |
503 | 475 |
504 void CSPSourceList::addSourceNonce(const String& nonce) | 476 void CSPSourceList::addSourceNonce(const String& nonce) |
505 { | 477 { |
506 m_nonces.add(nonce); | 478 m_nonces.add(nonce); |
507 } | 479 } |
508 | 480 |
509 void CSPSourceList::addSourceHash(const ContentSecurityPolicyHashAlgorithm& algo
rithm, const DigestValue& hash) | 481 void CSPSourceList::addSourceHash(const ContentSecurityPolicyHashAlgorithm& algo
rithm, const CryptoUtil::DigestValue& hash) |
510 { | 482 { |
511 m_hashes.add(CSPHashValue(algorithm, hash)); | 483 m_hashes.add(CSPHashValue(algorithm, hash)); |
512 m_hashAlgorithmsUsed |= algorithm; | 484 m_hashAlgorithmsUsed |= algorithm; |
513 } | 485 } |
514 | 486 |
515 | 487 |
516 } // namespace WebCore | 488 } // namespace WebCore |
OLD | NEW |