blob: 5be041336c2caf07218aaa09c7dc797d5a88afbd [file] [log] [blame]
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/web_package/signed_exchange_signature_header_field.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_piece.h"
#include "base/strings/stringprintf.h"
#include "base/trace_event/trace_event.h"
#include "content/browser/web_package/http_structured_header.h"
#include "content/browser/web_package/signed_exchange_consts.h"
#include "content/browser/web_package/signed_exchange_utils.h"
#include "crypto/sha2.h"
namespace content {
// static
base::Optional<std::vector<SignedExchangeSignatureHeaderField::Signature>>
SignedExchangeSignatureHeaderField::ParseSignature(
base::StringPiece signature_str,
SignedExchangeDevToolsProxy* devtools_proxy) {
TRACE_EVENT0(TRACE_DISABLED_BY_DEFAULT("loading"),
"SignedExchangeSignatureHeaderField::ParseSignature");
base::Optional<http_structured_header::ParameterisedList> values =
http_structured_header::ParseParameterisedList(signature_str);
if (!values) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "Failed to parse signature header.");
return base::nullopt;
}
std::vector<Signature> signatures;
signatures.reserve(values->size());
for (auto& value : *values) {
signatures.push_back(Signature());
Signature& sig = signatures.back();
sig.label = value.identifier;
sig.sig = value.params[kSig];
if (sig.sig.empty()) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'sig' parameter is not set,");
return base::nullopt;
}
sig.integrity = value.params[kIntegrity];
if (sig.integrity.empty()) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'integrity' parameter is not set.");
return base::nullopt;
}
sig.cert_url = GURL(value.params[kCertUrl]);
if (!sig.cert_url.is_valid() || sig.cert_url.has_ref()) {
// TODO(https://crbug.com/819467) : When we will support "ed25519Key", the
// params may not have "cert-url".
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'cert-url' parameter is not a valid URL.");
return base::nullopt;
}
if (!sig.cert_url.SchemeIs("https") && !sig.cert_url.SchemeIs("data")) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'cert-url' should have 'https' or 'data' scheme.");
return base::nullopt;
}
const std::string cert_sha256_string = value.params[kCertSha256Key];
if (cert_sha256_string.size() != crypto::kSHA256Length) {
// TODO(https://crbug.com/819467) : When we will support "ed25519Key", the
// params may not have "cert-sha256".
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'cert-sha256' parameter is not a SHA-256 digest.");
return base::nullopt;
}
net::SHA256HashValue cert_sha256;
memcpy(&cert_sha256.data, cert_sha256_string.data(), crypto::kSHA256Length);
sig.cert_sha256 = std::move(cert_sha256);
// TODO(https://crbug.com/819467): Support ed25519key.
// sig.ed25519_key = value.params["ed25519Key"];
sig.validity_url =
signed_exchange_utils::URLWithRawString(value.params[kValidityUrlKey]);
if (!sig.validity_url.url.is_valid()) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'validity-url' parameter is not a valid URL.");
return base::nullopt;
}
if (sig.validity_url.url.has_ref()) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'validity-url' parameter can't have a fragment.");
return base::nullopt;
}
if (!sig.validity_url.url.SchemeIs("https")) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'validity-url' should have 'https' scheme.");
return base::nullopt;
}
if (!base::StringToUint64(value.params[kDateKey], &sig.date)) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'date' parameter is not a number.");
return base::nullopt;
}
if (!base::StringToUint64(value.params[kExpiresKey], &sig.expires)) {
signed_exchange_utils::ReportErrorAndTraceEvent(
devtools_proxy, "'expires' parameter is not a number.");
return base::nullopt;
}
}
return signatures;
}
SignedExchangeSignatureHeaderField::Signature::Signature() = default;
SignedExchangeSignatureHeaderField::Signature::Signature(
const Signature& other) = default;
SignedExchangeSignatureHeaderField::Signature::~Signature() = default;
} // namespace content