Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4)

Side by Side Diff: components/webauth/authenticator_impl.cc

Issue 2788823002: Add the Mojo implementation of authenticator.mojom's MakeCredential. (Closed)
Patch Set: Addressing comments Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2017 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "components/webauth/authenticator_impl.h"
6
7 #include <memory>
8
9 #include "base/json/json_writer.h"
10 #include "base/memory/ptr_util.h"
11 #include "content/public/browser/render_frame_host.h"
12 #include "content/public/browser/web_contents.h"
13 #include "crypto/sha2.h"
14 #include "mojo/public/cpp/bindings/strong_binding.h"
15
16 using content::RenderFrameHost;
17 using content::WebContents;
18
19 namespace webauth {
20
21 const char kGetAssertionType[] = "navigator.id.getAssertion";
22
23 // JSON key values
24 const char kTypeKey[] = "type";
25 const char kChallengeKey[] = "challenge";
26 const char kOriginKey[] = "origin";
27 const char kCidPubkeyKey[] = "cid_pubkey";
28
29 // Serializes the |value| to a JSON string and returns the result.
30 std::string SerializeValueToJson(const base::Value& value) {
31 std::string json;
32 base::JSONWriter::Write(value, &json);
33 return json;
34 }
35
36 // static
37 void AuthenticatorImpl::Create(RenderFrameHost* render_frame_host,
38 mojom::AuthenticatorRequest request) {
39 auto authenticator_impl =
40 base::WrapUnique(new AuthenticatorImpl(render_frame_host));
41 mojo::MakeStrongBinding(std::move(authenticator_impl), std::move(request));
42 }
43
44 AuthenticatorImpl::~AuthenticatorImpl() {
45 if (!connection_error_handler_.is_null())
46 connection_error_handler_.Run();
47 }
48
49 AuthenticatorImpl::AuthenticatorImpl(RenderFrameHost* render_frame_host) {
50 DCHECK(render_frame_host);
51 set_connection_error_handler(base::Bind(
52 &AuthenticatorImpl::OnConnectionTerminated, base::Unretained(this)));
53 callerOrigin_ = render_frame_host->GetLastCommittedOrigin();
54 }
55
56 // mojom:Authenticator
57 void AuthenticatorImpl::MakeCredential(
58 mojom::RelyingPartyAccountPtr account,
59 std::vector<mojom::ScopedCredentialParametersPtr> parameters,
60 const std::vector<uint8_t>& challenge,
61 mojom::ScopedCredentialOptionsPtr options,
62 MakeCredentialCallback callback) {
63 std::string effective_domain;
64 std::string relying_party_id;
65 std::string client_data_json;
66 base::DictionaryValue client_data;
67
68 // Steps 3 & 4 of https://w3c.github.io/webauthn/#makeCredential
69 // opaque origin
70 if (caller_origin_.unique() == "") {
Mike West 2017/06/13 21:11:23 `unique()` is a bool, so comparing it to an empty
kpaulhamus 2017/06/15 01:27:13 Ah, I had changed that, guess I didn't upload it.
71 std::move(callback).Run(mojom::AuthenticatorStatus::NOT_ALLOWED_ERROR,
72 NULL);
73 return;
74 }
75
76 if (!options->relying_party_id) {
77 relying_party_id = caller_origin_.Serialize();
78 } else {
79 effective_domain = caller_origin_.host();
80
81 if (effective_domain.empty()) {
82 std::move(callback).Run(mojom::AuthenticatorStatus::SECURITY_ERROR, NULL);
83 return;
84 }
85 // TODO(kpaulhamus): Check if relyingPartyId is a registrable domain
86 // suffix of and equal to effectiveDomain and set relyingPartyId
87 // appropriately.
88 relying_party_id = options->relying_party_id.value_or(std::string());
89 }
90
91 // TODO(kpaulhamus): Check ScopedCredentialParameter's type and
92 // algorithmIdentifier after algorithmIdentifier is added to mojom to
93 // make sure it is U2F_V2.
94
95 client_data.SetString(kTypeKey, kGetAssertionType);
96 client_data.SetString(
97 kChallengeKey,
98 base::StringPiece(reinterpret_cast<const char*>(challenge.data()),
99 challenge.size()));
100 client_data.SetString(kOriginKey, relying_party_id);
101 // Channel ID is optional, and missing if the browser doesn't support it.
102 // It is present and set to the constant "unused" if the browser
103 // supports Channel ID but is not using it to talk to the origin.
104 // TODO(kpaulhamus): Fetch and add the Channel ID public key used to
105 // communicate with the origin.
106 client_data.SetString(kCidPubkeyKey, "unused");
107
108 // SHA-256 hash the JSON data structure
109 client_data_json = SerializeValueToJson(client_data);
110 std::string client_data_hash = crypto::SHA256HashString(client_data_json);
111
112 auto copyable_callback = base::AdaptCallbackForRepeating(std::move(callback));
113
114 // Step 16 of https://w3c.github.io/webauthn/#makeCredential
115 timeout_callback_.Reset(base::Bind(&AuthenticatorImpl::OnTimeout,
116 base::Unretained(this),
117 copyable_callback));
118
119 // base::Unretained(this), Passed(&callback)));
Mike West 2017/06/13 21:11:22 Nit: Drop commented-out code.
kpaulhamus 2017/06/15 01:27:13 Done.
120 base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(
121 FROM_HERE, timeout_callback_.callback(),
122 base::TimeDelta::FromSecondsD(options->adjusted_timeout));
123
124 // Per fido-u2f-raw-message-formats:
125 // The challenge parameter is the SHA-256 hash of the Client Data,
126 // a stringified JSON data structure that the FIDO Client prepares.
127 // Among other things, the Client Data contains the challenge from the
128 // relying party (hence the name of the parameter).
129 // The application parameter is the SHA-256 hash of the UTF-8 encoding of
130 // the application identity of the application requesting the registration
131 /*
132 U2fRegister(clientDataHash, app_param, base::Bind(
133 &AuthenticatorImpl::onRegister, weak_factory_.GetWeakPtr(),
134 std::move(clientDataJSON), callback));
135 */
Mike West 2017/06/13 21:11:22 Nit: If this isn't implemented yet, it's better to
kpaulhamus 2017/06/15 01:27:13 Done.
136
137 timeout_callback_.Cancel();
138 std::move(callback).Run(mojom::AuthenticatorStatus::NOT_ALLOWED_ERROR, NULL);
139 }
140
141 // Callback to handle the async response from a U2fDevice.
142 void AuthenticatorImpl::OnRegister(MakeCredentialCallback callback,
143 std::string& client_data_json,
144 uint8_t status_code,
145 std::vector<uint8_t> data) {
146 timeout_callback_.Cancel();
147 std::move(callback).Run(mojom::AuthenticatorStatus::NOT_ALLOWED_ERROR, NULL);
148 }
149
150 // Runs when timer expires and cancels all issued requests to a U2fDevice.
151 void AuthenticatorImpl::OnTimeout(MakeCredentialCallback callback) {
152 std::move(callback).Run(mojom::AuthenticatorStatus::NOT_ALLOWED_ERROR, NULL);
153 }
154
155 void AuthenticatorImpl::OnConnectionTerminated() {
156 // Closures and cleanup due to either a browser-side error or
157 // as a result of the connection_error_handler, which can mean
158 // that the renderer has decided to close the pipe for various
159 // reasons.
160 }
161 } // namespace webauth
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698