Chromium Code Reviews| Index: net/http/ntlm_buffer_reader.cc |
| diff --git a/net/http/ntlm_buffer_reader.cc b/net/http/ntlm_buffer_reader.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..4d7da581709d065c68b3f493e7dddfba447c3f7e |
| --- /dev/null |
| +++ b/net/http/ntlm_buffer_reader.cc |
| @@ -0,0 +1,304 @@ |
| +// Copyright 2017 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/http/ntlm_buffer_reader.h" |
| + |
| +#include <string.h> |
| + |
| +#include "base/logging.h" |
| + |
| +namespace net { |
|
asanka
2017/06/16 03:21:29
Curious. Why aren't these in namespace ntlm {} ?
zentaro
2017/06/21 00:38:46
Oversight. Done.
|
| + |
| +#if defined(ARCH_CPU_LITTLE_ENDIAN) |
| +#define IS_LITTLE_ENDIAN 1 |
| +#undef IS_BIG_ENDIAN |
| +#elif defined(ARCH_CPU_BIG_ENDIAN) |
| +#define IS_BIG_ENDIAN 1 |
| +#undef IS_LITTLE_ENDIAN |
| +#else |
| +#error "Unknown endianness" |
| +#endif |
| + |
| +NtlmBufferReader::NtlmBufferReader(base::StringPiece buffer) |
| + : buffer_(buffer), cursor_(0) { |
| + DCHECK(buffer.data()); |
| +} |
| + |
| +NtlmBufferReader::NtlmBufferReader(const uint8_t* ptr, size_t len) |
| + : NtlmBufferReader( |
| + base::StringPiece(reinterpret_cast<const char*>(ptr), len)) {} |
| + |
| +NtlmBufferReader::~NtlmBufferReader() {} |
| + |
| +bool NtlmBufferReader::CanRead(size_t len) const { |
| + return CanReadFrom(GetCursor(), len); |
| +} |
| + |
| +bool NtlmBufferReader::CanReadFrom(size_t offset, size_t len) const { |
| + if (len == 0) |
| + return true; |
| + |
| + return (len <= GetLength() && offset <= GetLength() - len); |
| +} |
| + |
| +void NtlmBufferReader::SetCursor(size_t cursor) { |
| + DCHECK(cursor <= GetLength()); |
|
asanka
2017/06/16 03:21:28
DCHECK_LE
zentaro
2017/06/21 00:38:46
Done.
|
| + |
| + cursor_ = cursor; |
| +} |
| + |
| +bool NtlmBufferReader::ReadUInt16(uint16_t* value) { |
| + return ReadUInt<uint16_t>(value); |
| +} |
| + |
| +bool NtlmBufferReader::ReadUInt32(uint32_t* value) { |
| + return ReadUInt<uint32_t>(value); |
| +} |
| + |
| +bool NtlmBufferReader::ReadUInt64(uint64_t* value) { |
| + return ReadUInt<uint64_t>(value); |
| +} |
| + |
| +bool NtlmBufferReader::ReadFlags(ntlm::NegotiateFlags* flags) { |
| + uint32_t raw; |
| + if (!ReadUInt32(&raw)) |
| + return false; |
| + |
| + *flags = static_cast<ntlm::NegotiateFlags>(raw); |
| + return true; |
| +} |
| + |
| +template <typename T> |
| +bool NtlmBufferReader::ReadUInt(T* value) { |
| + size_t int_size = sizeof(T); |
| + if (!CanRead(int_size)) |
| + return false; |
| + |
| + *value = 0; |
| + for (size_t i = 0; i < int_size; i++) { |
| + *value += static_cast<T>(GetByteAtCursor()) << (i * 8); |
| + AdvanceCursor(1); |
| + } |
| + |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::ReadBytes(uint8_t* buffer, size_t len) { |
| + if (!CanRead(len)) |
| + return false; |
| + |
| + memcpy(reinterpret_cast<void*>(buffer), |
| + reinterpret_cast<const void*>(GetBufferAtCursor()), len); |
| + |
| + AdvanceCursor(len); |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::ReadSecurityBuffer(ntlm::SecurityBuffer* sec_buf) { |
| + if (!CanRead(ntlm::SECURITY_BUFFER_LEN)) |
| + return false; |
| + |
| + bool result = ReadUInt16(&sec_buf->length) && SkipBytes(sizeof(uint16_t)) && |
| + ReadUInt32(&sec_buf->offset); |
| + |
| + DCHECK(result); |
| + return result; |
| +} |
| + |
| +bool NtlmBufferReader::ReadUtf8String(std::string* value, size_t num_bytes) { |
| + if (!CanRead(num_bytes)) |
| + return false; |
| + |
| + value->assign(reinterpret_cast<const char*>(GetBufferAtCursor()), num_bytes); |
| + AdvanceCursor(num_bytes); |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::ReadUtf16String(base::string16* value, |
| + size_t num_bytes) { |
| + if (!CanRead(num_bytes) || (num_bytes % 2 != 0)) |
| + return false; |
| + |
| + value->assign(reinterpret_cast<const base::char16*>(GetBufferAtCursor()), |
| + num_bytes / 2); |
| +#if IS_BIG_ENDIAN |
| + // The NTLM buffer is always little-endian. So when it was assigned to the |
| + // string above all the chars will be in little-endian order. |
| + // Now swap them all so that the resulting string |value| is big-endian. |
| + uint8_t* ptr = reinterpret_cast<uint8_t*>(value->c_str()); |
| + for (int i = 0; i < num_bytes; i += 2) { |
| + std::swap(ptr[i], ptr[i + 1]); |
| + } |
| +#endif |
| + AdvanceCursor(num_bytes); |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::ReadUtf16Payload(base::string16* value) { |
| + size_t old_cursor = GetCursor(); |
| + |
| + // First read the security buffer. |
| + ntlm::SecurityBuffer sec_buf; |
| + if (!ReadSecurityBuffer(&sec_buf)) |
| + return false; |
| + |
| + if (!CanReadFrom(sec_buf)) { |
| + SetCursor(old_cursor); |
| + return false; |
| + } |
| + |
| + old_cursor = GetCursor(); |
| + SetCursor(sec_buf.offset); |
| + bool result = ReadUtf16String(value, sec_buf.length); |
| + DCHECK(result); |
| + SetCursor(old_cursor); |
| + |
| + return result; |
| +} |
| + |
| +bool NtlmBufferReader::ReadBytesPayload(uint8_t* buffer, size_t buffer_len) { |
| + size_t old_cursor = GetCursor(); |
| + |
| + // First read the security buffer. |
| + ntlm::SecurityBuffer sec_buf; |
| + if (!ReadSecurityBuffer(&sec_buf)) |
| + return false; |
| + |
| + if (!CanReadFrom(sec_buf) || sec_buf.length > buffer_len) { |
| + SetCursor(old_cursor); |
| + return false; |
| + } |
| + |
| + old_cursor = GetCursor(); |
| + SetCursor(sec_buf.offset); |
| + bool result = ReadBytes(buffer, sec_buf.length); |
|
asanka
2017/06/16 03:21:28
Seems unnecessary to invoke ReadBytes() since we a
zentaro
2017/06/21 00:38:47
Done. Was just trying to keep it consistent with t
|
| + DCHECK(result); |
| + SetCursor(old_cursor); |
| + |
| + return result; |
| +} |
| + |
| +bool NtlmBufferReader::ReadUtf8Payload(std::string* value) { |
| + size_t old_cursor = GetCursor(); |
| + |
| + // First read the security buffer. |
| + ntlm::SecurityBuffer sec_buf; |
| + if (!ReadSecurityBuffer(&sec_buf)) |
| + return false; |
| + |
| + if (!CanReadFrom(sec_buf)) { |
| + SetCursor(old_cursor); |
| + return false; |
| + } |
| + |
| + old_cursor = GetCursor(); |
| + SetCursor(sec_buf.offset); |
| + bool result = ReadUtf8String(value, sec_buf.length); |
| + DCHECK(result); |
| + SetCursor(old_cursor); |
| + |
| + return result; |
| +} |
| + |
| +bool NtlmBufferReader::ReadMessageType(ntlm::MessageType* message_type) { |
| + size_t old_cursor = GetCursor(); |
| + |
| + uint32_t raw_message_type; |
| + if (!ReadUInt32(&raw_message_type)) |
| + return false; |
| + |
| + *message_type = static_cast<ntlm::MessageType>(raw_message_type); |
| + |
| + if (*message_type != ntlm::MessageType::NEGOTIATE && |
| + *message_type != ntlm::MessageType::CHALLENGE && |
| + *message_type != ntlm::MessageType::AUTHENTICATE) { |
| + SetCursor(old_cursor); |
| + return false; |
| + } |
| + |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::SkipSecurityBuffer() { |
| + return SkipBytes(ntlm::SECURITY_BUFFER_LEN); |
| +} |
| + |
| +bool NtlmBufferReader::SkipSecurityBufferWithValidation() { |
| + size_t old_cursor = GetCursor(); |
| + |
| + ntlm::SecurityBuffer sec_buf; |
| + if (!ReadSecurityBuffer(&sec_buf)) { |
| + return false; |
| + } |
| + |
| + // If the security buffer indicates to read outside |
| + // the message buffer then fail. |
| + if (!CanReadFrom(sec_buf)) { |
| + SetCursor(old_cursor); |
| + return false; |
| + } |
| + |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::SkipBytes(size_t count) { |
| + if (!CanRead(count)) |
| + return false; |
| + |
| + AdvanceCursor(count); |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::MatchSignature() { |
| + if (!CanRead(ntlm::SIGNATURE_LEN)) |
| + return false; |
| + |
| + if (memcmp(ntlm::SIGNATURE, GetBufferAtCursor(), ntlm::SIGNATURE_LEN) != 0) |
| + return false; |
| + |
| + AdvanceCursor(ntlm::SIGNATURE_LEN); |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::MatchMessageType(ntlm::MessageType message_type) { |
| + size_t old_cursor = GetCursor(); |
| + ntlm::MessageType actual_message_type; |
| + if (!ReadMessageType(&actual_message_type)) |
| + return false; |
| + |
| + if (actual_message_type != message_type) { |
| + SetCursor(old_cursor); |
|
asanka
2017/06/16 03:21:28
I'm guessing that in practice all of these failure
zentaro
2017/06/21 00:38:46
I was just trying to leave things in a predictable
|
| + return false; |
| + } |
| + |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::MatchMessageHeader(ntlm::MessageType message_type) { |
| + size_t old_cursor = GetCursor(); |
| + if (MatchSignature() && MatchMessageType(message_type)) |
| + return true; |
| + |
| + SetCursor(old_cursor); |
| + return false; |
| +} |
| + |
| +bool NtlmBufferReader::MatchZeros(size_t count) { |
| + if (!CanRead(count)) |
| + return false; |
| + |
| + for (size_t i = 0; i < count; i++) { |
| + if (GetBufferAtCursor()[i] != 0) |
| + return false; |
| + } |
| + |
| + AdvanceCursor(count); |
| + return true; |
| +} |
| + |
| +bool NtlmBufferReader::MatchEmptySecurityBuffer() { |
| + return MatchZeros(ntlm::SECURITY_BUFFER_LEN); |
| +} |
| + |
| +} // namespace net |