1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "components/nacl/loader/nacl_validation_query.h"
7 #include "base/logging.h"
8 #include "components/nacl/loader/nacl_validation_db.h"
9 #include "crypto/nss_util.h"
10 #include "native_client/src/include/portability.h"
11 #include "native_client/src/trusted/validator/nacl_file_info.h"
12 #include "native_client/src/trusted/validator/validation_cache.h"
14 NaClValidationQueryContext::NaClValidationQueryContext(
16 const std::string
& profile_key
,
17 const std::string
& nacl_version
)
19 profile_key_(profile_key
),
20 nacl_version_(nacl_version
) {
23 CHECK(profile_key
.length() >= 8);
24 CHECK(nacl_version
.length() >= 4);
27 NaClValidationQuery
* NaClValidationQueryContext::CreateQuery() {
28 NaClValidationQuery
* query
= new NaClValidationQuery(db_
, profile_key_
);
29 // Changing the version effectively invalidates existing hashes.
30 query
->AddData(nacl_version_
);
34 bool NaClValidationQueryContext::ResolveFileToken(
35 struct NaClFileToken
* file_token
,
38 return db_
->ResolveFileToken(file_token
, fd
, path
);
41 NaClValidationQuery::NaClValidationQuery(NaClValidationDB
* db
,
42 const std::string
& profile_key
)
44 hasher_(crypto::HMAC::SHA256
),
47 // Without this line on Linux, HMAC::Init will instantiate a singleton that
48 // in turn attempts to open a file. Disabling this behavior avoids a ~70 ms
49 // stall the first time HMAC is used.
50 // This function is also called in nacl_helper_linux.cc, but nacl_helper may
51 // not be used in all cases.
52 // TODO(ncbray) remove when nacl_helper becomes the only code path.
53 // http://code.google.com/p/chromium/issues/detail?id=118263
55 crypto::ForceNSSNoDBInit();
57 CHECK(hasher_
.Init(profile_key
));
60 void NaClValidationQuery::AddData(const char* data
, size_t length
) {
61 CHECK(state_
== READY
);
62 CHECK(buffer_length_
<= sizeof(buffer_
));
63 // Chrome's HMAC class doesn't support incremental signing. Work around
64 // this by using a (small) temporary buffer to accumulate data.
65 // Check if there is space in the buffer.
66 if (buffer_length_
+ kDigestLength
> sizeof(buffer_
)) {
67 // Hash the buffer to make space.
70 // Hash the input data into the buffer. Assumes that sizeof(buffer_) >=
71 // kDigestLength * 2 (the buffer can store at least two digests.)
72 CHECK(hasher_
.Sign(base::StringPiece(data
, length
),
73 reinterpret_cast<unsigned char*>(buffer_
+ buffer_length_
),
75 buffer_length_
+= kDigestLength
;
78 void NaClValidationQuery::AddData(const unsigned char* data
, size_t length
) {
79 AddData(reinterpret_cast<const char*>(data
), length
);
82 void NaClValidationQuery::AddData(const base::StringPiece
& data
) {
83 AddData(data
.data(), data
.length());
86 int NaClValidationQuery::QueryKnownToValidate() {
87 CHECK(state_
== READY
);
88 // It is suspicious if we have less than a digest's worth of data.
89 CHECK(buffer_length_
>= kDigestLength
);
90 CHECK(buffer_length_
<= sizeof(buffer_
));
92 // Ensure the buffer contains only one digest worth of data.
94 return db_
->QueryKnownToValidate(std::string(buffer_
, buffer_length_
));
97 void NaClValidationQuery::SetKnownToValidate() {
98 CHECK(state_
== GET_CALLED
);
99 CHECK(buffer_length_
== kDigestLength
);
101 db_
->SetKnownToValidate(std::string(buffer_
, buffer_length_
));
104 // Reduce the size of the data in the buffer by hashing it and writing it back
106 void NaClValidationQuery::CompressBuffer() {
107 // Calculate the digest into a temp buffer. It is likely safe to calculate it
108 // directly back into the buffer, but this is an "accidental" semantic we're
109 // avoiding depending on.
110 unsigned char temp
[kDigestLength
];
111 CHECK(hasher_
.Sign(base::StringPiece(buffer_
, buffer_length_
), temp
,
113 memcpy(buffer_
, temp
, kDigestLength
);
114 buffer_length_
= kDigestLength
;
119 static void* CreateQuery(void* handle
) {
120 return static_cast<NaClValidationQueryContext
*>(handle
)->CreateQuery();
123 static void AddData(void* query
, const uint8
* data
, size_t length
) {
124 static_cast<NaClValidationQuery
*>(query
)->AddData(data
, length
);
127 static int QueryKnownToValidate(void* query
) {
128 return static_cast<NaClValidationQuery
*>(query
)->QueryKnownToValidate();
131 static void SetKnownToValidate(void* query
) {
132 static_cast<NaClValidationQuery
*>(query
)->SetKnownToValidate();
135 static void DestroyQuery(void* query
) {
136 delete static_cast<NaClValidationQuery
*>(query
);
139 static int ResolveFileToken(void* handle
, struct NaClFileToken
* file_token
,
140 int32
* fd
, char** file_path
,
141 uint32
* file_path_length
) {
144 *file_path_length
= 0;
145 bool ok
= static_cast<NaClValidationQueryContext
*>(handle
)->
146 ResolveFileToken(file_token
, fd
, &path
);
148 *file_path
= static_cast<char*>(malloc(path
.length() + 1));
150 memcpy(*file_path
, path
.data(), path
.length());
151 (*file_path
)[path
.length()] = 0;
152 *file_path_length
= static_cast<uint32
>(path
.length());
157 struct NaClValidationCache
* CreateValidationCache(
158 NaClValidationDB
* db
, const std::string
& profile_key
,
159 const std::string
& nacl_version
) {
160 NaClValidationCache
* cache
=
161 static_cast<NaClValidationCache
*>(malloc(sizeof(NaClValidationCache
)));
162 // Make sure any fields introduced in a cross-repo change are zeroed.
163 memset(cache
, 0, sizeof(*cache
));
164 cache
->handle
= new NaClValidationQueryContext(db
, profile_key
, nacl_version
);
165 cache
->CreateQuery
= CreateQuery
;
166 cache
->AddData
= AddData
;
167 cache
->QueryKnownToValidate
= QueryKnownToValidate
;
168 cache
->SetKnownToValidate
= SetKnownToValidate
;
169 cache
->DestroyQuery
= DestroyQuery
;
170 cache
->ResolveFileToken
= ResolveFileToken
;