File: unencoded_digest.cc

package info (click to toggle)
chromium 138.0.7204.183-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 6,071,908 kB
  • sloc: cpp: 34,937,088; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,953; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,806; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (135 lines) | stat: -rw-r--r-- 4,594 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "third_party/blink/renderer/platform/loader/unencoded_digest.h"

#include "base/containers/span.h"
#include "base/notreached.h"
#include "net/http/structured_headers.h"
#include "third_party/blink/renderer/platform/crypto.h"
#include "third_party/blink/renderer/platform/network/http_header_map.h"
#include "third_party/blink/renderer/platform/network/http_names.h"
#include "third_party/blink/renderer/platform/wtf/shared_buffer.h"
#include "third_party/blink/renderer/platform/wtf/text/atomic_string.h"
#include "third_party/blink/renderer/platform/wtf/text/base64.h"

namespace blink {

namespace {

const char kSHA256Token[] = "sha-256";
const char kSHA512Token[] = "sha-512";

HashAlgorithm GetHashAlgorithm(IntegrityAlgorithm integrity) {
  switch (integrity) {
    case IntegrityAlgorithm::kSha256:
      return kHashAlgorithmSha256;
    case IntegrityAlgorithm::kSha512:
      return kHashAlgorithmSha512;

    // `sha-384` is not a valid algorithm for digest headers:
    // https://www.iana.org/assignments/http-digest-hash-alg/http-digest-hash-alg.xhtml
    case IntegrityAlgorithm::kSha384:
      NOTREACHED();

    // We don't parse signature algorithms, so we should never generate
    // a parsed `Unencoded-Digest` header with such a prefix:
    case IntegrityAlgorithm::kEd25519:
      NOTREACHED();
  }
}

}  // namespace

UnencodedDigest::UnencodedDigest(IntegrityMetadataSet integrity_metadata)
    : integrity_metadata_(integrity_metadata) {
  CHECK(integrity_metadata.public_keys.empty());
}

std::optional<UnencodedDigest> UnencodedDigest::Create(
    const HTTPHeaderMap& headers) {
  AtomicString header_value = headers.Get(http_names::kUnencodedDigest);
  if (header_value == g_null_atom) {
    return std::nullopt;
  }

  std::optional<net::structured_headers::Dictionary> dictionary =
      net::structured_headers::ParseDictionary(header_value.Utf8());
  if (!dictionary) {
    return std::nullopt;
  }

  IntegrityMetadataSet integrity_metadata;
  for (const auto& entry : dictionary.value()) {
    IntegrityMetadata parsed_digest;
    size_t expected_digest_length = 0;
    if (entry.first == kSHA256Token) {
      parsed_digest.algorithm = IntegrityAlgorithm::kSha256;
      expected_digest_length = 32;
    } else if (entry.first == kSHA512Token) {
      parsed_digest.algorithm = IntegrityAlgorithm::kSha512;
      expected_digest_length = 64;
    } else {
      // Skip over entries with unknown algorithm tokens.
      //
      // TODO(https://crbug.com/381044049): Emit errors.
      continue;
    }

    if (entry.second.member_is_inner_list || entry.second.member.empty() ||
        !entry.second.member[0].item.is_byte_sequence()) {
      // Likewise skip over entries with unparsable digests.
      //
      // TODO(https://crbug.com/381044049): Emit errors.
      continue;
    }

    std::string digest = entry.second.member[0].item.GetString();
    if (digest.length() != expected_digest_length) {
      // Skip entries with digests of incorrect length.
      //
      // TODO(https://crbug.com/381044049): Emit errors.
      continue;
    }

    // Store the byte sequence as a base64-encoded digest, matching CSP and
    // SRI's existing `IntegrityMetadata` implementation.
    parsed_digest.digest = Base64Encode(base::as_byte_span(digest));
    integrity_metadata.Insert(std::move(parsed_digest));
  }

  if (integrity_metadata.hashes.empty()) {
    return std::nullopt;
  }
  return UnencodedDigest(integrity_metadata);
}

bool UnencodedDigest::DoesMatch(WTF::SegmentedBuffer* data) {
  for (const IntegrityMetadata& digest : integrity_metadata_.hashes) {
    HashAlgorithm algorithm = GetHashAlgorithm(digest.algorithm);
    DigestValue computed_digest;
    if (!ComputeDigest(algorithm, data, computed_digest)) {
      // TODO(https://crbug.com/381044049): Emit errors.
      return false;
    }

    // Convert the stored digest into a `DigestValue`
    Vector<uint8_t> digest_bytes;
    Base64Decode(digest.digest, digest_bytes);
    DigestValue expected_digest(base::as_byte_span(digest_bytes));

    // If any specified digest doesn't match the digest computed over |data|,
    // matching fails.
    if (computed_digest != expected_digest) {
      // TODO(https://crbug.com/381044049): Emit errors.
      return false;
    }
  }

  // If no digest failed to match (or if we didn't have any digests in the
  // first place), matching succeeded.
  return true;
}

}  // namespace blink