Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(705)

Side by Side Diff: net/cert/internal/signature_algorithm.cc

Issue 1217653006: Add DER parsing for rsaPss signature algorithms. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@sign_parse_alg
Patch Set: address all comments except the HasMore() one Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | net/cert/internal/signature_algorithm_unittest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/internal/signature_algorithm.h" 5 #include "net/cert/internal/signature_algorithm.h"
6 6
7 #include <stdint.h> 7 #include <stdint.h>
8 8
9 #include "base/numerics/safe_math.h"
9 #include "net/der/input.h" 10 #include "net/der/input.h"
11 #include "net/der/parse_values.h"
10 #include "net/der/parser.h" 12 #include "net/der/parser.h"
11 13
12 namespace net { 14 namespace net {
13 15
14 namespace { 16 namespace {
15 17
16 // From RFC 3279 section 2.2.1: 18 // From RFC 3279 section 2.2.1:
17 // sha-1WithRSAEncryption OBJECT IDENTIFIER ::= { 19 // sha-1WithRSAEncryption OBJECT IDENTIFIER ::= {
18 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 20 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
19 // pkcs-1(1) 5 } 21 // pkcs-1(1) 5 }
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
89 // In dotted notation: 1.2.840.10045.4.3.4 91 // In dotted notation: 1.2.840.10045.4.3.4
90 const uint8_t kOidEcdsaWithSha512[] = 92 const uint8_t kOidEcdsaWithSha512[] =
91 {0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x04}; 93 {0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x04};
92 94
93 // From RFC 4055 section 3.1: 95 // From RFC 4055 section 3.1:
94 // id-RSASSA-PSS OBJECT IDENTIFIER ::= { pkcs-1 10 } 96 // id-RSASSA-PSS OBJECT IDENTIFIER ::= { pkcs-1 10 }
95 // In dotted notation: 1.2.840.113549.1.1.10 97 // In dotted notation: 1.2.840.113549.1.1.10
96 const uint8_t kOidRsaSsaPss[] = 98 const uint8_t kOidRsaSsaPss[] =
97 {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0a}; 99 {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0a};
98 100
101 // From RFC 4055:
102 // id-sha1 OBJECT IDENTIFIER ::= { iso(1)
103 // identified-organization(3) oiw(14)
104 // secsig(3) algorithms(2) 26 }
105 // In dotted notation: 1.3.14.3.2.26
106 const uint8_t kOidSha1[] = {0x2B, 0x0E, 0x03, 0x02, 0x1A};
107
108 // From RFC 4055:
109 // id-sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
110 // country(16) us(840) organization(1) gov(101)
111 // csor(3) nistalgorithm(4) hashalgs(2) 1 }
112 // In dotted notation: 2.16.840.1.101.3.4.2.1
113 const uint8_t kOidSha256[] =
114 {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01};
115
116 // From RFC 4055:
117 // id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
118 // country(16) us(840) organization(1) gov(101)
119 // csor(3) nistalgorithm(4) hashalgs(2) 2 }
120 // In dotted notation: 2.16.840.1.101.3.4.2.2
121 const uint8_t kOidSha384[] =
122 {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02};
123
124 // From RFC 4055:
125 // id-sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
126 // country(16) us(840) organization(1) gov(101)
127 // csor(3) nistalgorithm(4) hashalgs(2) 3 }
128 // In dotted notation: 2.16.840.1.101.3.4.2.3
129 const uint8_t kOidSha512[] =
130 {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03};
131
132 // From RFC 4055:
133 // id-mgf1 OBJECT IDENTIFIER ::= { pkcs-1 8 }
134 // In dotted notation: 1.2.840.113549.1.1.8
135 const uint8_t kOidMgf1[] =
136 {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x08};
137
99 // RFC 5280 section 4.1.1.2 defines signatureAlgorithm as: 138 // RFC 5280 section 4.1.1.2 defines signatureAlgorithm as:
100 // 139 //
101 // AlgorithmIdentifier ::= SEQUENCE { 140 // AlgorithmIdentifier ::= SEQUENCE {
102 // algorithm OBJECT IDENTIFIER, 141 // algorithm OBJECT IDENTIFIER,
103 // parameters ANY DEFINED BY algorithm OPTIONAL } 142 // parameters ANY DEFINED BY algorithm OPTIONAL }
104 WARN_UNUSED_RESULT bool ParseAlgorithmIdentifier(const der::Input& input, 143 WARN_UNUSED_RESULT bool ParseAlgorithmIdentifier(const der::Input& input,
105 der::Input* algorithm, 144 der::Input* algorithm,
106 der::Input* parameters) { 145 der::Input* parameters) {
107 der::Parser parser(input); 146 der::Parser parser(input);
108 147
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after
200 WARN_UNUSED_RESULT bool ParseEcdsa(DigestAlgorithm digest, 239 WARN_UNUSED_RESULT bool ParseEcdsa(DigestAlgorithm digest,
201 const der::Input& params, 240 const der::Input& params,
202 SignatureAlgorithm* out) { 241 SignatureAlgorithm* out) {
203 if (!IsNullOrEmpty(params)) 242 if (!IsNullOrEmpty(params))
204 return false; 243 return false;
205 244
206 out->AssignEcdsa(digest); 245 out->AssignEcdsa(digest);
207 return true; 246 return true;
208 } 247 }
209 248
249 // Parses an AlgorithmIdentifier representing an RFC 4055 "HashAlgorithm".
250 // Examples of HashAlgorithms are:
251 //
252 // sha1Identifier AlgorithmIdentifier ::= { id-sha1, NULL }
253 // sha224Identifier AlgorithmIdentifier ::= { id-sha224, NULL }
254 // sha256Identifier AlgorithmIdentifier ::= { id-sha256, NULL }
255 // sha384Identifier AlgorithmIdentifier ::= { id-sha384, NULL }
256 // sha512Identifier AlgorithmIdentifier ::= { id-sha512, NULL }
257 //
258 // Note that the parameters needn't be NULL as in the examples above. RFC 4055
259 // says that:
260 //
261 // All implementations MUST accept both NULL and absent parameters as
262 // legal and equivalent encodings.
263 WARN_UNUSED_RESULT bool ParseHashAlgorithm(const der::Input input,
264 DigestAlgorithm* out) {
265 der::Input oid;
266 der::Input params;
267 if (!ParseAlgorithmIdentifier(input, &oid, &params))
268 return false;
269
270 DigestAlgorithm hash;
271
272 if (oid.Equals(der::Input(kOidSha1))) {
273 hash = DigestAlgorithm::Sha1;
274 } else if (oid.Equals(der::Input(kOidSha256))) {
275 hash = DigestAlgorithm::Sha256;
276 } else if (oid.Equals(der::Input(kOidSha384))) {
277 hash = DigestAlgorithm::Sha384;
278 } else if (oid.Equals(der::Input(kOidSha512))) {
279 hash = DigestAlgorithm::Sha512;
280 } else {
281 // Unsupported digest algorithm.
282 return false;
283 }
284
285 if (!IsNullOrEmpty(params))
286 return false;
287
288 *out = hash;
289 return true;
290 }
291
292 // Parses a MaskGenAlgorithm as defined by RFC 4055:
293 //
294 // MaskGenAlgorithm ::= AlgorithmIdentifier
295 //
296 // This function currently only supports MGF1, as that is the only function
297 // defined in RFC 4055.
298 //
299 // RFC 4055 section 2.2:
300 //
301 // One mask generation function is used with the RSASSA-PSS signature
302 // algorithm and the RSAES-OAEP key transport algorithm: MGF1 [P1v2.1].
303 // No other mask generation functions are supported by this
304 // specification.
305 //
306 // MGF1 is identified by the following object identifier:
307 //
308 // id-mgf1 OBJECT IDENTIFIER ::= { pkcs-1 8 }
309 //
310 // The parameters field associated with id-mgf1 MUST have a
311 // hashAlgorithm value which identifies the hash function being used
312 // with MGF1. This value MUST be sha1Identifier, sha224Identifier,
313 // sha256Identifier, sha384Identifier, or sha512Identifier, as specified
314 // in Section 2.1. Implementations MUST support the default value,
315 // sha1Identifier, and MAY support the other four values.
316 WARN_UNUSED_RESULT bool ParseMaskGenAlgorithm(const der::Input input,
317 DigestAlgorithm* mgf1_hash) {
318 der::Input oid;
319 der::Input params;
320 if (!ParseAlgorithmIdentifier(input, &oid, &params))
321 return false;
322
323 // MGF1 is the only supported mask generation algorithm.
324 if (!oid.Equals(der::Input(kOidMgf1)))
325 return false;
326
327 return ParseHashAlgorithm(params, mgf1_hash);
328 }
329
330 // Consumes an optional, explicitly-tagged INTEGER from |parser|, using the
331 // indicated context-specific class number. Values greater than 32-bits will be
332 // rejected.
333 //
334 // Returns true on success and sets |*present| to true if the field was present.
335 WARN_UNUSED_RESULT bool ReadOptionalContextSpecificUint32(der::Parser* parser,
336 uint8_t class_number,
337 uint32_t* out,
338 bool* present) {
339 der::Input value;
340 bool has_value;
341
342 // Read the context specific value.
343 if (!parser->ReadOptionalTag(der::ContextSpecificConstructed(class_number),
344 &value, &has_value)) {
345 return false;
346 }
347
348 if (has_value) {
349 // Parse the integer contained in it.
350 der::Parser number_parser(value);
351 uint64_t uint64_value;
352
353 if (!number_parser.ReadUint64(&uint64_value))
354 return false;
355 if (number_parser.HasMore())
356 return false;
357
358 // Cast the number to a uint32_t
359 base::CheckedNumeric<uint32_t> casted(uint64_value);
360 if (!casted.IsValid())
361 return false;
362 *out = casted.ValueOrDie();
363 }
364
365 *present = has_value;
366 return true;
367 }
368
210 // From RFC 4055: 369 // From RFC 4055:
211 // RSASSA-PSS-params ::= SEQUENCE { 370 // RSASSA-PSS-params ::= SEQUENCE {
212 // hashAlgorithm [0] HashAlgorithm DEFAULT 371 // hashAlgorithm [0] HashAlgorithm DEFAULT
213 // sha1Identifier, 372 // sha1Identifier,
214 // maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT 373 // maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT
215 // mgf1SHA1Identifier, 374 // mgf1SHA1Identifier,
216 // saltLength [2] INTEGER DEFAULT 20, 375 // saltLength [2] INTEGER DEFAULT 20,
217 // trailerField [3] INTEGER DEFAULT 1 } 376 // trailerField [3] INTEGER DEFAULT 1 }
218 // 377 //
219 // HashAlgorithm ::= AlgorithmIdentifier 378 // HashAlgorithm ::= AlgorithmIdentifier
220 // 379 //
221 // MaskGenAlgorithm ::= AlgorithmIdentifier 380 // MaskGenAlgorithm ::= AlgorithmIdentifier
222 WARN_UNUSED_RESULT bool ParseRsaPss(const der::Input& params, 381 WARN_UNUSED_RESULT bool ParseRsaPss(const der::Input& params,
223 SignatureAlgorithm* out) { 382 SignatureAlgorithm* out) {
224 // TODO(eroman): Implement. 383 // RFC 4055 says that the RSASSA-PSS-params must be present in signature
225 return false; 384 // algorithms. (However because each field is optional, the sequence could be
385 // empty when using all the defaults).
386 //
387 // Section 3.1:
388 //
389 // When RSASSA-PSS is used in an AlgorithmIdentifier, the parameters
390 // MUST employ the RSASSA-PSS-params syntax. The parameters may be
391 // either absent or present when used as subject public key information.
392 // The parameters MUST be present when used in the algorithm identifier
393 // associated with a signature value.
394 der::Parser parser(params);
395 der::Parser params_parser;
396 if (!parser.ReadSequence(&params_parser))
397 return false;
398
399 // There shouldn't be anything after the sequence.
400 if (parser.HasMore())
Ryan Sleevi 2015/07/08 11:30:39 This is fine
401 return false;
402
403 // Initialize parameters to their default values.
404 DigestAlgorithm hash = DigestAlgorithm::Sha1;
405 DigestAlgorithm mgf1_hash = DigestAlgorithm::Sha1;
406 uint32_t salt_length = 20u;
407 uint32_t trailer_field = 1u;
408
409 bool has_field;
410 der::Input field;
411
412 // Parse hashAlgorithm [0]
413 if (!params_parser.ReadOptionalTag(der::ContextSpecificConstructed(0), &field,
414 &has_field)) {
415 return false;
416 }
417 if (has_field && !ParseHashAlgorithm(field, &hash))
418 return false;
419
420 // Parse maskGenAlgorithm [1]
421 if (!params_parser.ReadOptionalTag(der::ContextSpecificConstructed(1), &field,
422 &has_field)) {
423 return false;
424 }
425 if (has_field && !ParseMaskGenAlgorithm(field, &mgf1_hash))
426 return false;
427
428 // Parse saltLength [2]
429 if (!ReadOptionalContextSpecificUint32(&params_parser, 2, &salt_length,
430 &has_field)) {
431 return false;
432 }
433
434 // Parse trailerField [3]
435 if (!ReadOptionalContextSpecificUint32(&params_parser, 3, &trailer_field,
436 &has_field)) {
437 return false;
438 }
439
440 // The trailer field MUST be 1 per RFC 4055.
441 if (trailer_field != 1)
442 return false;
443
444 // There must not be any unconsumed data left.
445 if (params_parser.HasMore())
Ryan Sleevi 2015/07/08 11:30:39 The related discussion (re; RFC 5912, RFC 6025, re
eroman 2015/07/14 20:50:27 I have updated comments to reference RFC 5912, and
446 return false;
447
448 out->AssignRsaPss(hash, mgf1_hash, salt_length);
449 return true;
226 } 450 }
227 451
228 } // namespace 452 } // namespace
229 453
230 RsaPssParameters::RsaPssParameters(DigestAlgorithm mgf1_hash, 454 RsaPssParameters::RsaPssParameters(DigestAlgorithm mgf1_hash,
231 uint32_t salt_length) 455 uint32_t salt_length)
232 : mgf1_hash_(mgf1_hash), salt_length_(salt_length) { 456 : mgf1_hash_(mgf1_hash), salt_length_(salt_length) {
233 } 457 }
234 458
235 bool RsaPssParameters::Equals(const SignatureAlgorithmParameters* other) const { 459 bool RsaPssParameters::Equals(const SignatureAlgorithmParameters* other) const {
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after
345 return nullptr; 569 return nullptr;
346 } 570 }
347 571
348 void SignatureAlgorithm::AssignInvalid() { 572 void SignatureAlgorithm::AssignInvalid() {
349 algorithm_ = static_cast<SignatureAlgorithmId>(-1); 573 algorithm_ = static_cast<SignatureAlgorithmId>(-1);
350 digest_ = static_cast<DigestAlgorithm>(-1); 574 digest_ = static_cast<DigestAlgorithm>(-1);
351 params_.reset(); 575 params_.reset();
352 } 576 }
353 577
354 } // namespace net 578 } // namespace net
OLDNEW
« no previous file with comments | « no previous file | net/cert/internal/signature_algorithm_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698