fune/security/sandbox/chromium/base/unguessable_token.cc
Bob Owen 2cad8de361 Bug 1552160 Part 1: Roll-up of chromium sandbox update and mozilla patches to get a running browser. r=jld,aklotz,tjr,bobowen
This updates security/sandbox/chromium/ files to chromium commit 84108231f6e6e0772fb9a4643679ce76aa771e67.

Existing and new patches applied from security/sandbox/chromium-shim/patches/with_update/ to give a compiling and mostly working browser.
See patch files for additional commit comments.

--HG--
rename : security/sandbox/chromium-shim/base/debug/debugging_flags.h => security/sandbox/chromium-shim/base/debug/debugging_buildflags.h
rename : security/sandbox/chromium-shim/base/win/base_features.h => security/sandbox/chromium-shim/base/win/base_win_buildflags.h
2019-06-12 11:10:48 +01:00

39 lines
1.1 KiB
C++

// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/unguessable_token.h"
#include "base/format_macros.h"
#include "base/no_destructor.h"
#include "base/rand_util.h"
#include "base/strings/stringprintf.h"
namespace base {
UnguessableToken::UnguessableToken(const base::Token& token) : token_(token) {}
// static
UnguessableToken UnguessableToken::Create() {
return UnguessableToken(Token::CreateRandom());
}
// static
const UnguessableToken& UnguessableToken::Null() {
static const NoDestructor<UnguessableToken> null_token;
return *null_token;
}
// static
UnguessableToken UnguessableToken::Deserialize(uint64_t high, uint64_t low) {
// Receiving a zeroed out UnguessableToken from another process means that it
// was never initialized via Create(). Treat this case as a security issue.
DCHECK(!(high == 0 && low == 0));
return UnguessableToken(Token{high, low});
}
std::ostream& operator<<(std::ostream& out, const UnguessableToken& token) {
return out << "(" << token.ToString() << ")";
}
} // namespace base