blob: 04ea514c6ce3527d88b09e6b32c36645ab5c6483 [file] [log] [blame]
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/unguessable_token.h"
#include <ostream>
#include "base/format_macros.h"
#include "base/rand_util.h"
#include "build/build_config.h"
#if !BUILDFLAG(IS_NACL)
#include "third_party/boringssl/src/include/openssl/mem.h"
#endif
namespace base {
UnguessableToken::UnguessableToken(const base::Token& token) : token_(token) {}
// static
UnguessableToken UnguessableToken::Create() {
return UnguessableToken(Token::CreateRandom());
}
// static
const UnguessableToken& UnguessableToken::Null() {
static const UnguessableToken null_token{};
return null_token;
}
// static
UnguessableToken UnguessableToken::Deserialize(uint64_t high, uint64_t low) {
// Receiving a zeroed out UnguessableToken from another process means that it
// was never initialized via Create(). The real check for this is in the
// StructTraits in mojo/public/cpp/base/unguessable_token_mojom_traits.cc
// where a zero-ed out token will fail to deserialize. This DCHECK is a
// backup check.
DCHECK(!(high == 0 && low == 0));
return UnguessableToken(Token{high, low});
}
bool UnguessableToken::operator==(const UnguessableToken& other) const {
#if BUILDFLAG(IS_NACL)
// BoringSSL is unavailable for NaCl builds so it remains timing dependent.
return token_ == other.token_;
#else
auto bytes = token_.AsBytes();
auto other_bytes = other.token_.AsBytes();
return CRYPTO_memcmp(bytes.data(), other_bytes.data(), bytes.size()) == 0;
#endif
}
std::ostream& operator<<(std::ostream& out, const UnguessableToken& token) {
return out << "(" << token.ToString() << ")";
}
} // namespace base