Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(377)

Side by Side Diff: chrome/browser/net/packed_ct_ev_whitelist.cc

Issue 811353002: Move CT EV white list packaging API from chrome/ to components/. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixed missed nit Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/net/packed_ct_ev_whitelist.h"
6
7 #include <string.h>
8
9 #include <algorithm>
10
11 #include "base/big_endian.h"
12 #include "base/files/file_util.h"
13 #include "base/lazy_instance.h"
14 #include "base/logging.h"
15 #include "chrome/browser/net/bit_stream_reader.h"
16 #include "content/public/browser/browser_thread.h"
17 #include "net/ssl/ssl_config_service.h"
18
19 namespace {
20 const uint8_t kCertHashLengthBits = 64; // 8 bytes
21 const uint8_t kCertHashLength = kCertHashLengthBits / 8;
22 const uint64_t kGolombMParameterBits = 47; // 2^47
23
24 void SetEVWhitelistInSSLConfigService(
25 const scoped_refptr<net::ct::EVCertsWhitelist>& new_whitelist) {
26 VLOG(1) << "Setting new EV Certs whitelist.";
27 net::SSLConfigService::SetEVCertsWhitelist(new_whitelist);
28 }
29
30 int TruncatedHashesComparator(const void* v1, const void* v2) {
31 const uint64_t& h1(*(static_cast<const uint64_t*>(v1)));
32 const uint64_t& h2(*(static_cast<const uint64_t*>(v2)));
33 if (h1 < h2)
34 return -1;
35 else if (h1 > h2)
36 return 1;
37 return 0;
38 }
39 } // namespace
40
41 void SetEVCertsWhitelist(scoped_refptr<net::ct::EVCertsWhitelist> whitelist) {
42 if (!whitelist->IsValid()) {
43 VLOG(1) << "EV Certs whitelist is not valid, not setting.";
44 return;
45 }
46
47 base::Closure assign_cb =
48 base::Bind(SetEVWhitelistInSSLConfigService, whitelist);
49 content::BrowserThread::PostTask(
50 content::BrowserThread::IO, FROM_HERE, assign_cb);
51 }
52
53 bool PackedEVCertsWhitelist::UncompressEVWhitelist(
54 const std::string& compressed_whitelist,
55 std::vector<uint64_t>* uncompressed_list) {
56 internal::BitStreamReader reader(base::StringPiece(
57 compressed_whitelist.data(), compressed_whitelist.size()));
58 std::vector<uint64_t> result;
59
60 VLOG(1) << "Uncompressing EV whitelist of size "
61 << compressed_whitelist.size();
62 uint64_t curr_hash(0);
63 if (!reader.ReadBits(kCertHashLengthBits, &curr_hash)) {
64 VLOG(1) << "Failed reading first hash.";
65 return false;
66 }
67 result.push_back(curr_hash);
68 // M is the tunable parameter used by the Golomb coding.
69 static const uint64_t kGolombParameterM = static_cast<uint64_t>(1)
70 << kGolombMParameterBits;
71
72 while (reader.BitsLeft() > kGolombMParameterBits) {
73 uint64_t read_prefix = 0;
74 if (!reader.ReadUnaryEncoding(&read_prefix)) {
75 VLOG(1) << "Failed reading unary-encoded prefix.";
76 return false;
77 }
78 if (read_prefix > (UINT64_MAX / kGolombParameterM)) {
79 VLOG(1) << "Received value that would cause overflow: " << read_prefix;
80 return false;
81 }
82
83 uint64_t r = 0;
84 if (!reader.ReadBits(kGolombMParameterBits, &r)) {
85 VLOG(1) << "Failed reading " << kGolombMParameterBits << " bits.";
86 return false;
87 }
88 DCHECK_LT(r, kGolombParameterM);
89
90 uint64_t curr_diff = read_prefix * kGolombParameterM + r;
91 curr_hash += curr_diff;
92
93 result.push_back(curr_hash);
94 }
95
96 uncompressed_list->swap(result);
97 return true;
98 }
99
100 PackedEVCertsWhitelist::PackedEVCertsWhitelist(
101 const std::string& compressed_whitelist,
102 const base::Version& version)
103 : version_(version) {
104 if (!UncompressEVWhitelist(compressed_whitelist, &whitelist_)) {
105 whitelist_.clear();
106 return;
107 }
108 }
109
110 PackedEVCertsWhitelist::~PackedEVCertsWhitelist() {
111 }
112
113 bool PackedEVCertsWhitelist::ContainsCertificateHash(
114 const std::string& certificate_hash) const {
115 DCHECK(!whitelist_.empty());
116 uint64_t hash_to_lookup;
117
118 base::ReadBigEndian(certificate_hash.data(), &hash_to_lookup);
119 return bsearch(&hash_to_lookup,
120 &whitelist_[0],
121 whitelist_.size(),
122 kCertHashLength,
123 TruncatedHashesComparator) != NULL;
124 }
125
126 bool PackedEVCertsWhitelist::IsValid() const {
127 return whitelist_.size() > 0;
128 }
129
130 base::Version PackedEVCertsWhitelist::Version() const {
131 return version_;
132 }
OLDNEW
« no previous file with comments | « chrome/browser/net/packed_ct_ev_whitelist.h ('k') | chrome/browser/net/packed_ct_ev_whitelist_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698