Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(226)

Unified Diff: net/cert/internal/verify_signed_data.cc

Issue 1209283004: Implement VerifySignedData() for ECDSA, RSA PKCS#1 and RSA PSS. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@parse_pss
Patch Set: NULL --> nullptr Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cert/internal/verify_signed_data.h ('k') | net/cert/internal/verify_signed_data_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/internal/verify_signed_data.cc
diff --git a/net/cert/internal/verify_signed_data.cc b/net/cert/internal/verify_signed_data.cc
new file mode 100644
index 0000000000000000000000000000000000000000..470e24c7bc0e6cfd72a7f213879a6b71a583dfc2
--- /dev/null
+++ b/net/cert/internal/verify_signed_data.cc
@@ -0,0 +1,296 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/cert/internal/verify_signed_data.h"
+
+#include "net/cert/internal/signature_algorithm.h"
+
+// TODO(eroman): There is no intention to implement this for non-OpenSSL. Remove
+// this branch once the migration is complete. This could have been done as a
+// conditional file (_openssl.cc) in the build file instead, but that is likely
+// not worth the effort at this point.
+
+#if !defined(USE_OPENSSL)
+
+namespace net {
+
+bool VerifySignedData(const SignatureAlgorithm& signature_algorithm,
+ const der::Input& signed_data,
+ const der::Input& signature_value,
+ const der::Input& public_key) {
+ // Not implemented
+ return false;
+}
+
+} // namespace net
+
+#else
+
+#include <openssl/evp.h>
+#include <openssl/x509.h>
+
+#include "crypto/openssl_util.h"
+#include "crypto/scoped_openssl_types.h"
+#include "net/der/input.h"
+#include "net/der/parser.h"
+
+namespace net {
+
+namespace {
+
+// Converts a DigestAlgorithm to an equivalent EVP_MD*.
+WARN_UNUSED_RESULT bool GetDigest(DigestAlgorithm digest, const EVP_MD** out) {
+ switch (digest) {
+ case DigestAlgorithm::Sha1:
+ *out = EVP_sha1();
davidben 2015/07/20 19:21:59 #include <openssl/digest.h>
eroman 2015/07/20 20:03:40 Done.
+ break;
+ case DigestAlgorithm::Sha256:
+ *out = EVP_sha256();
+ break;
+ case DigestAlgorithm::Sha384:
+ *out = EVP_sha384();
+ break;
+ case DigestAlgorithm::Sha512:
+ *out = EVP_sha512();
+ break;
+ }
+
+ return *out != nullptr;
davidben 2015/07/20 19:21:59 This assumes that *out was initialized to nullptr
eroman 2015/07/20 20:03:40 Done. Good catch.
+}
+
+// Sets the RSASSA-PSS parameters on |pctx|. Returns true on success.
+WARN_UNUSED_RESULT bool ApplyRsaPssOptions(const RsaPssParameters* params,
+ EVP_PKEY_CTX* pctx) {
+ // BoringSSL takes a signed int for the salt length, and interprets
+ // negative values in a special manner. Make sure not to silently underflow.
+ base::CheckedNumeric<int> salt_length_bytes_int(params->salt_length());
+ if (!salt_length_bytes_int.IsValid())
+ return false;
+
+ const EVP_MD* mgf1_hash;
+ if (!GetDigest(params->mgf1_hash(), &mgf1_hash))
+ return false;
+
+ return (1 == EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) &&
+ 1 == EVP_PKEY_CTX_set_rsa_mgf1_md(pctx, mgf1_hash) &&
+ 1 == EVP_PKEY_CTX_set_rsa_pss_saltlen(
+ pctx, salt_length_bytes_int.ValueOrDie()));
davidben 2015/07/20 19:21:59 In BoringSSL, these can only return 0 or 1.
eroman 2015/07/20 20:03:40 Done.
+}
+
+// Parses an RSA public key from SPKI to an EVP_PKEY.
+//
+// Returns true on success.
+//
+// There are two flavors of RSA public key that this function recognizes from
davidben 2015/07/20 19:21:59 Currently, d2i_RSA_PUBKEY also accepts 2.5.8.1.1.
eroman 2015/07/20 20:03:40 Acknowledged. Note that this is covered by my test
+// RFC 5912:
+//
+// pk-rsa PUBLIC-KEY ::= {
+// IDENTIFIER rsaEncryption
+// KEY RSAPublicKey
+// PARAMS TYPE NULL ARE absent
+// -- Private key format not in this module --
+// CERT-KEY-USAGE {digitalSignature, nonRepudiation,
+// keyEncipherment, dataEncipherment, keyCertSign, cRLSign}
+// }
+//
+// ...
+//
+// pk-rsaSSA-PSS PUBLIC-KEY ::= {
davidben 2015/07/20 19:21:59 d2i_RSA_PUBKEY doesn't actually recognize this one
eroman 2015/07/20 20:03:40 Acknowledged. Same response as above. I will add
+// IDENTIFIER id-RSASSA-PSS
+// KEY RSAPublicKey
+// PARAMS TYPE RSASSA-PSS-params ARE optional
+// -- Private key format not in this module --
+// CERT-KEY-USAGE { nonRepudiation, digitalSignature,
+// keyCertSign, cRLSign }
+// }
+//
+// Any RSA signature algorithm can accept a "pk-rsa" (rsaEncryption). However a
+// "pk-rsaSSA-PSS" key is only accepted if the signature algorithm was for PSS
+// mode:
+//
+// sa-rsaSSA-PSS SIGNATURE-ALGORITHM ::= {
+// IDENTIFIER id-RSASSA-PSS
+// PARAMS TYPE RSASSA-PSS-params ARE required
+// HASHES { mda-sha1 | mda-sha224 | mda-sha256 | mda-sha384
+// | mda-sha512 }
+// PUBLIC-KEYS { pk-rsa | pk-rsaSSA-PSS }
+// SMIME-CAPS { IDENTIFIED BY id-RSASSA-PSS }
+// }
+//
+// Moreover, if a "pk-rsaSSA-PSS" key was used and it optionally provided
+// parameters for the algorithm, they must match those of the signature
+// algorithm.
davidben 2015/07/20 19:21:59 This isn't implemented.
eroman 2015/07/20 20:03:40 Acknowledged.
+//
+// COMPATIBILITY NOTE: RFC 5912 specifies that the algorithm parameters for
+// pk-rsa (rsaEncryption) are absent. However in practice though it is common
+// for these to be present and NULL.
davidben 2015/07/20 19:21:59 This one says it MUST be NULL. https://tools.ietf.
eroman 2015/07/20 20:03:40 Correct, "ARE absent" in this case means MUST be a
davidben 2015/07/20 21:17:22 If RFC 3279 is treated authoritative, it's not eve
+WARN_UNUSED_RESULT bool ParseRsaKeyFromSpki(const der::Input& public_key_spki,
+ crypto::ScopedEVP_PKEY* pkey) {
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
+
+ const uint8_t* ptr = public_key_spki.UnsafeData();
+ crypto::ScopedRSA rsa(
davidben 2015/07/20 19:21:59 #include <openssl/rsa.h>
eroman 2015/07/20 20:03:40 Done.
+ d2i_RSA_PUBKEY(nullptr, &ptr, public_key_spki.Length()));
+
+ if (!rsa || ptr != public_key_spki.UnsafeData() + public_key_spki.Length())
+ return false;
+
+ // Create a corresponding EVP_PKEY.
+ pkey->reset(EVP_PKEY_new());
+ if (!pkey || !EVP_PKEY_set1_RSA(pkey->get(), rsa.get()))
davidben 2015/07/20 19:21:59 This is slightly odd since d2i_RSA_PUBKEY will act
eroman 2015/07/20 20:03:40 Do you want me to go back to using d2i_PUBKEY() as
davidben 2015/07/20 21:17:22 *shrug* That's all d2i_RSA_PUBKEY is doing. But i
eroman 2015/07/20 22:28:08 Done, changed to use d2i_PUBKEY().
davidben 2015/07/21 15:29:05 Fair enough. Though RSASSA-PSS SPKI isn't the only
+ return false;
+
+ return true;
+}
+
+// Does signature verification using either RSA or ECDSA.
+WARN_UNUSED_RESULT bool DoVerify(const SignatureAlgorithm& algorithm,
+ const der::Input& signed_data,
+ const der::Input& signature_value,
+ EVP_PKEY* public_key) {
+ DCHECK(algorithm.algorithm() == SignatureAlgorithmId::RsaPkcs1 ||
+ algorithm.algorithm() == SignatureAlgorithmId::RsaPss ||
+ algorithm.algorithm() == SignatureAlgorithmId::Ecdsa);
+
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
+
+ crypto::ScopedEVP_MD_CTX ctx(EVP_MD_CTX_create());
+ EVP_PKEY_CTX* pctx = nullptr; // Owned by |ctx|.
+
+ const EVP_MD* digest;
+ if (!GetDigest(algorithm.digest(), &digest))
+ return false;
+
+ if (!EVP_DigestVerifyInit(ctx.get(), &pctx, digest, nullptr, public_key))
+ return false;
+
+ // Set the RSASSA-PSS specific options.
+ if (algorithm.algorithm() == SignatureAlgorithmId::RsaPss &&
+ !ApplyRsaPssOptions(algorithm.ParamsForRsaPss(), pctx)) {
+ return false;
+ }
+
+ if (!EVP_DigestVerifyUpdate(ctx.get(), signed_data.UnsafeData(),
+ signed_data.Length())) {
+ return false;
+ }
+
+ return 1 == EVP_DigestVerifyFinal(ctx.get(), signature_value.UnsafeData(),
+ signature_value.Length());
+}
+
+// Returns true if the given curve is allowed for ECDSA. The input is a
+// BoringSSL NID.
+//
+// TODO(eroman): Extract policy decisions such as allowed curves, hashes, RSA
+// modulus size, to somewhere more central.
+WARN_UNUSED_RESULT bool IsAllowedCurveName(int curve_nid) {
+ switch (curve_nid) {
+ case NID_X9_62_prime256v1:
+ case NID_secp384r1:
+ case NID_secp521r1:
+ return true;
+ }
+ return false;
+}
+
+// Parses an EC public key from SPKI to an EVP_PKEY.
+//
+// Returns true on success.
+//
+// RFC 5912 describes all the ECDSA signature algorithms as requiring a public
+// key of type "pk-ec":
+//
+// pk-ec PUBLIC-KEY ::= {
+// IDENTIFIER id-ecPublicKey
+// KEY ECPoint
+// PARAMS TYPE ECParameters ARE required
+// -- Private key format not in this module --
+// CERT-KEY-USAGE { digitalSignature, nonRepudiation, keyAgreement,
+// keyCertSign, cRLSign }
+// }
+//
+// Moreover RFC 5912 stipulates what curves are allowed. The ECParameters
+// MUST NOT use an implicitCurve or specificCurve for PKIX:
+//
+// ECParameters ::= CHOICE {
+// namedCurve CURVE.&id({NamedCurve})
+// -- implicitCurve NULL
+// -- implicitCurve MUST NOT be used in PKIX
+// -- specifiedCurve SpecifiedCurve
+// -- specifiedCurve MUST NOT be used in PKIX
+// -- Details for specifiedCurve can be found in [X9.62]
+// -- Any future additions to this CHOICE should be coordinated
+// -- with ANSI X.9.
+// }
+// -- If you need to be able to decode ANSI X.9 parameter structures,
+// -- uncomment the implicitCurve and specifiedCurve above, and also
+// -- uncomment the following:
+// --(WITH COMPONENTS {namedCurve PRESENT})
+//
+// The namedCurves are extensible. The ones described by RFC 5912 are:
+//
+// NamedCurve CURVE ::= {
+// { ID secp192r1 } | { ID sect163k1 } | { ID sect163r2 } |
+// { ID secp224r1 } | { ID sect233k1 } | { ID sect233r1 } |
+// { ID secp256r1 } | { ID sect283k1 } | { ID sect283r1 } |
+// { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } |
+// { ID secp521r1 } | { ID sect571k1 } | { ID sect571r1 },
+// ... -- Extensible
+// }
+WARN_UNUSED_RESULT bool ParseEcKeyFromSpki(const der::Input& public_key_spki,
+ crypto::ScopedEVP_PKEY* pkey) {
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
+
+ const uint8_t* ptr = public_key_spki.UnsafeData();
+ crypto::ScopedEC_KEY ec(
+ d2i_EC_PUBKEY(nullptr, &ptr, public_key_spki.Length()));
+
+ if (!ec || ptr != public_key_spki.UnsafeData() + public_key_spki.Length())
+ return false;
+
+ // Enforce policy on allowed curves in case d2i_EC_PUBKEY() were to recognize
+ // and allow use of a weak curve.
+ if (!IsAllowedCurveName(EC_GROUP_get_curve_name(EC_KEY_get0_group(ec.get()))))
davidben 2015/07/20 19:21:59 #include <openssl/ec.h> #include <openssl/ec_key.h
eroman 2015/07/20 20:03:40 Done.
+ return false;
+
+ // Create a corresponding EVP_PKEY.
+ pkey->reset(EVP_PKEY_new());
+ if (!pkey || !EVP_PKEY_set1_EC_KEY(pkey->get(), ec.get()))
davidben 2015/07/20 19:21:59 (Ditto about this dismantling an EVP_PKEY, only to
eroman 2015/07/20 22:28:08 Done.
+ return false;
+
+ return true;
+}
+
+} // namespace
+
+bool VerifySignedData(const SignatureAlgorithm& signature_algorithm,
+ const der::Input& signed_data,
+ const der::Input& signature_value,
+ const der::Input& public_key_spki) {
+ crypto::ScopedEVP_PKEY public_key;
+
+ // Parse the SPKI to an EVP_PKEY appropriate for the signature algorithm.
+ switch (signature_algorithm.algorithm()) {
+ case SignatureAlgorithmId::RsaPkcs1:
+ case SignatureAlgorithmId::RsaPss:
+ // TODO(eroman): This does not enforce that the SPKI's algorithm matches
+ // the signature algorithm. For instance it would not forbid a key with
+ // PSS parameters being used with PKCS1 padding.
+ if (!ParseRsaKeyFromSpki(public_key_spki, &public_key))
+ return false;
+ break;
+ case SignatureAlgorithmId::Ecdsa:
+ if (!ParseEcKeyFromSpki(public_key_spki, &public_key))
+ return false;
+ break;
+ }
+
+ return DoVerify(signature_algorithm, signed_data, signature_value,
+ public_key.get());
+}
+
+} // namespace net
+
+#endif
« no previous file with comments | « net/cert/internal/verify_signed_data.h ('k') | net/cert/internal/verify_signed_data_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698