blob: cd945d11a650e5380572809974873b92084093df [file] [log] [blame]
// Copyright 2018 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/webauth/virtual_authenticator.h"
#include <utility>
#include "base/functional/bind.h"
#include "base/guid.h"
#include "device/fido/fido_parsing_utils.h"
#include "device/fido/public_key_credential_rp_entity.h"
#include "device/fido/public_key_credential_user_entity.h"
#include "device/fido/virtual_ctap2_device.h"
#include "device/fido/virtual_u2f_device.h"
#include "mojo/public/cpp/base/big_buffer.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
namespace content {
VirtualAuthenticator::VirtualAuthenticator(
const blink::test::mojom::VirtualAuthenticatorOptions& options)
: protocol_(options.protocol),
ctap2_version_(options.ctap2_version),
attachment_(options.attachment),
has_resident_key_(options.has_resident_key),
has_user_verification_(options.has_user_verification),
has_large_blob_(options.has_large_blob),
has_cred_blob_(options.has_cred_blob),
has_min_pin_length_(options.has_min_pin_length),
has_prf_(options.has_prf),
unique_id_(base::GenerateGUID()),
state_(base::MakeRefCounted<device::VirtualFidoDevice::State>()) {
state_->transport = options.transport;
// If the authenticator has user verification, simulate having set it up
// already.
state_->fingerprints_enrolled = has_user_verification_;
observation_.Observe(state_.get());
SetUserPresence(true);
}
VirtualAuthenticator::~VirtualAuthenticator() {
for (Observer& observer : observers_) {
observer.OnAuthenticatorWillBeDestroyed(this);
}
}
void VirtualAuthenticator::AddReceiver(
mojo::PendingReceiver<blink::test::mojom::VirtualAuthenticator> receiver) {
receiver_set_.Add(this, std::move(receiver));
}
bool VirtualAuthenticator::AddRegistration(
std::vector<uint8_t> key_handle,
const std::string& rp_id,
base::span<const uint8_t> private_key,
int32_t counter) {
absl::optional<std::unique_ptr<device::VirtualFidoDevice::PrivateKey>>
fido_private_key =
device::VirtualFidoDevice::PrivateKey::FromPKCS8(private_key);
if (!fido_private_key)
return false;
return state_->registrations
.emplace(
std::move(key_handle),
device::VirtualFidoDevice::RegistrationData(
std::move(*fido_private_key),
device::fido_parsing_utils::CreateSHA256Hash(rp_id), counter))
.second;
}
bool VirtualAuthenticator::AddResidentRegistration(
std::vector<uint8_t> key_handle,
std::string rp_id,
base::span<const uint8_t> private_key,
int32_t counter,
std::vector<uint8_t> user_handle) {
absl::optional<std::unique_ptr<device::VirtualFidoDevice::PrivateKey>>
fido_private_key =
device::VirtualFidoDevice::PrivateKey::FromPKCS8(private_key);
if (!fido_private_key)
return false;
return state_->InjectResidentKey(
std::move(key_handle),
device::PublicKeyCredentialRpEntity(std::move(rp_id)),
device::PublicKeyCredentialUserEntity(std::move(user_handle)), counter,
std::move(*fido_private_key));
}
void VirtualAuthenticator::ClearRegistrations() {
state_->registrations.clear();
}
bool VirtualAuthenticator::RemoveRegistration(
const std::vector<uint8_t>& key_handle) {
return state_->registrations.erase(key_handle) != 0;
}
void VirtualAuthenticator::SetUserPresence(bool is_user_present) {
is_user_present_ = is_user_present;
state_->simulate_press_callback = base::BindRepeating(
[](bool is_user_present, device::VirtualFidoDevice* device) {
return is_user_present;
},
is_user_present);
}
std::unique_ptr<device::VirtualFidoDevice>
VirtualAuthenticator::ConstructDevice() {
switch (protocol_) {
case device::ProtocolVersion::kU2f:
return std::make_unique<device::VirtualU2fDevice>(state_);
case device::ProtocolVersion::kCtap2: {
device::VirtualCtap2Device::Config config;
switch (ctap2_version_) {
case device::Ctap2Version::kCtap2_0:
config.ctap2_versions = {std::begin(device::kCtap2Versions2_0),
std::end(device::kCtap2Versions2_0)};
break;
case device::Ctap2Version::kCtap2_1:
config.ctap2_versions = {std::begin(device::kCtap2Versions2_1),
std::end(device::kCtap2Versions2_1)};
break;
}
config.resident_key_support = has_resident_key_;
config.large_blob_support = has_large_blob_;
config.cred_protect_support = config.cred_blob_support = has_cred_blob_;
config.min_pin_length_extension_support = has_min_pin_length_;
config.hmac_secret_support = has_prf_;
if (
// Writing a large blob requires obtaining a PinUvAuthToken with
// permissions if the authenticator is protected by user verification.
(has_large_blob_ && has_user_verification_) ||
// PRF support always requires PIN support because the exchange is
// encrypted.
has_prf_) {
config.pin_uv_auth_token_support = true;
}
config.internal_uv_support = has_user_verification_;
config.is_platform_authenticator =
attachment_ == device::AuthenticatorAttachment::kPlatform;
config.user_verification_succeeds = is_user_verified_;
return std::make_unique<device::VirtualCtap2Device>(state_, config);
}
default:
NOTREACHED();
return std::make_unique<device::VirtualU2fDevice>(state_);
}
}
void VirtualAuthenticator::AddObserver(Observer* observer) {
observers_.AddObserver(observer);
}
void VirtualAuthenticator::RemoveObserver(Observer* observer) {
observers_.RemoveObserver(observer);
}
bool VirtualAuthenticator::HasObserversForTest() {
return !observers_.empty();
}
void VirtualAuthenticator::GetLargeBlob(const std::vector<uint8_t>& key_handle,
GetLargeBlobCallback callback) {
auto registration = state_->registrations.find(key_handle);
if (registration == state_->registrations.end()) {
std::move(callback).Run(absl::nullopt);
return;
}
absl::optional<device::LargeBlob> blob =
state_->GetLargeBlob(registration->second);
if (!blob) {
std::move(callback).Run(absl::nullopt);
return;
}
data_decoder_.Inflate(
std::move(blob->compressed_data), blob->original_size,
base::BindOnce(&VirtualAuthenticator::OnLargeBlobUncompressed,
weak_factory_.GetWeakPtr(), std::move(callback)));
}
void VirtualAuthenticator::SetLargeBlob(const std::vector<uint8_t>& key_handle,
const std::vector<uint8_t>& blob,
SetLargeBlobCallback callback) {
data_decoder_.Deflate(
blob, base::BindOnce(&VirtualAuthenticator::OnLargeBlobCompressed,
weak_factory_.GetWeakPtr(), key_handle, blob.size(),
std::move(callback)));
}
void VirtualAuthenticator::GetUniqueId(GetUniqueIdCallback callback) {
std::move(callback).Run(unique_id_);
}
void VirtualAuthenticator::GetRegistrations(GetRegistrationsCallback callback) {
std::vector<blink::test::mojom::RegisteredKeyPtr> mojo_registered_keys;
for (const auto& registration : state_->registrations) {
auto mojo_registered_key = blink::test::mojom::RegisteredKey::New();
mojo_registered_key->key_handle = registration.first;
mojo_registered_key->counter = registration.second.counter;
mojo_registered_key->rp_id =
registration.second.rp ? registration.second.rp->id : "";
mojo_registered_key->private_key =
registration.second.private_key->GetPKCS8PrivateKey();
mojo_registered_keys.push_back(std::move(mojo_registered_key));
}
std::move(callback).Run(std::move(mojo_registered_keys));
}
void VirtualAuthenticator::AddRegistration(
blink::test::mojom::RegisteredKeyPtr registration,
AddRegistrationCallback callback) {
std::move(callback).Run(AddRegistration(
std::move(registration->key_handle), std::move(registration->rp_id),
registration->private_key, registration->counter));
}
void VirtualAuthenticator::ClearRegistrations(
ClearRegistrationsCallback callback) {
ClearRegistrations();
std::move(callback).Run();
}
void VirtualAuthenticator::RemoveRegistration(
const std::vector<uint8_t>& key_handle,
RemoveRegistrationCallback callback) {
std::move(callback).Run(RemoveRegistration(std::move(key_handle)));
}
void VirtualAuthenticator::SetUserVerified(bool verified,
SetUserVerifiedCallback callback) {
is_user_verified_ = verified;
std::move(callback).Run();
}
void VirtualAuthenticator::OnCredentialCreated(
const device::VirtualFidoDevice::Credential& credential) {
for (Observer& observer : observers_) {
observer.OnCredentialCreated(this, credential);
}
}
void VirtualAuthenticator::OnAssertion(
const device::VirtualFidoDevice::Credential& credential) {
for (Observer& observer : observers_) {
observer.OnAssertion(this, credential);
}
}
void VirtualAuthenticator::OnLargeBlobUncompressed(
GetLargeBlobCallback callback,
base::expected<mojo_base::BigBuffer, std::string> result) {
absl::optional<mojo_base::BigBuffer> value;
if (result.has_value())
value = std::move(*result);
std::move(callback).Run(device::fido_parsing_utils::MaterializeOrNull(value));
}
void VirtualAuthenticator::OnLargeBlobCompressed(
base::span<const uint8_t> key_handle,
uint64_t original_size,
SetLargeBlobCallback callback,
base::expected<mojo_base::BigBuffer, std::string> result) {
auto registration = state_->registrations.find(key_handle);
if (registration == state_->registrations.end()) {
std::move(callback).Run(false);
return;
}
if (!result.has_value()) {
std::move(callback).Run(false);
return;
}
state_->InjectLargeBlob(
&registration->second,
device::LargeBlob(device::fido_parsing_utils::Materialize(*result),
original_size));
std::move(callback).Run(true);
}
} // namespace content