OLD | NEW |
---|---|
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/internal/signature_algorithm.h" | 5 #include "net/cert/internal/signature_algorithm.h" |
6 | 6 |
7 #include <stdint.h> | 7 #include <stdint.h> |
8 | 8 |
9 #include "base/numerics/safe_math.h" | |
9 #include "net/der/input.h" | 10 #include "net/der/input.h" |
11 #include "net/der/parse_values.h" | |
10 #include "net/der/parser.h" | 12 #include "net/der/parser.h" |
11 | 13 |
12 namespace net { | 14 namespace net { |
13 | 15 |
14 namespace { | 16 namespace { |
15 | 17 |
16 // From RFC 3279 section 2.2.1: | 18 // From RFC 3279 section 2.2.1: |
17 // sha-1WithRSAEncryption OBJECT IDENTIFIER ::= { | 19 // sha-1WithRSAEncryption OBJECT IDENTIFIER ::= { |
18 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) | 20 // iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) |
19 // pkcs-1(1) 5 } | 21 // pkcs-1(1) 5 } |
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
89 // In dotted notation: 1.2.840.10045.4.3.4 | 91 // In dotted notation: 1.2.840.10045.4.3.4 |
90 const uint8_t kOidEcdsaWithSha512[] = | 92 const uint8_t kOidEcdsaWithSha512[] = |
91 {0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x04}; | 93 {0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x04}; |
92 | 94 |
93 // From RFC 4055 section 3.1: | 95 // From RFC 4055 section 3.1: |
94 // id-RSASSA-PSS OBJECT IDENTIFIER ::= { pkcs-1 10 } | 96 // id-RSASSA-PSS OBJECT IDENTIFIER ::= { pkcs-1 10 } |
95 // In dotted notation: 1.2.840.113549.1.1.10 | 97 // In dotted notation: 1.2.840.113549.1.1.10 |
96 const uint8_t kOidRsaSsaPss[] = | 98 const uint8_t kOidRsaSsaPss[] = |
97 {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0a}; | 99 {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0a}; |
98 | 100 |
101 // From RFC 4055: | |
102 // id-sha1 OBJECT IDENTIFIER ::= { iso(1) | |
103 // identified-organization(3) oiw(14) | |
104 // secsig(3) algorithms(2) 26 } | |
105 // In dotted notation: 1.3.14.3.2.26 | |
106 const uint8_t kOidSha1[] = {0x2B, 0x0E, 0x03, 0x02, 0x1A}; | |
107 | |
108 // From RFC 4055: | |
109 // id-sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) | |
110 // country(16) us(840) organization(1) gov(101) | |
111 // csor(3) nistalgorithm(4) hashalgs(2) 1 } | |
112 // In dotted notation: 2.16.840.1.101.3.4.2.1 | |
113 const uint8_t kOidSha256[] = | |
114 {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01}; | |
115 | |
116 // From RFC 4055: | |
117 // id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) | |
118 // country(16) us(840) organization(1) gov(101) | |
119 // csor(3) nistalgorithm(4) hashalgs(2) 2 } | |
120 // In dotted notation: 2.16.840.1.101.3.4.2.2 | |
121 const uint8_t kOidSha384[] = | |
122 {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02}; | |
123 | |
124 // From RFC 4055: | |
125 // id-sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) | |
126 // country(16) us(840) organization(1) gov(101) | |
127 // csor(3) nistalgorithm(4) hashalgs(2) 3 } | |
128 // In dotted notation: 2.16.840.1.101.3.4.2.3 | |
129 const uint8_t kOidSha512[] = | |
130 {0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03}; | |
131 | |
132 // From RFC 4055: | |
133 // id-mgf1 OBJECT IDENTIFIER ::= { pkcs-1 8 } | |
134 // In dotted notation: 1.2.840.113549.1.1.8 | |
135 const uint8_t kOidMgf1[] = | |
136 {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x08}; | |
137 | |
99 // RFC 5280 section 4.1.1.2 defines signatureAlgorithm as: | 138 // RFC 5280 section 4.1.1.2 defines signatureAlgorithm as: |
100 // | 139 // |
101 // AlgorithmIdentifier ::= SEQUENCE { | 140 // AlgorithmIdentifier ::= SEQUENCE { |
102 // algorithm OBJECT IDENTIFIER, | 141 // algorithm OBJECT IDENTIFIER, |
103 // parameters ANY DEFINED BY algorithm OPTIONAL } | 142 // parameters ANY DEFINED BY algorithm OPTIONAL } |
104 WARN_UNUSED_RESULT bool ParseAlgorithmIdentifier(const der::Input& input, | 143 WARN_UNUSED_RESULT bool ParseAlgorithmIdentifier(const der::Input& input, |
105 der::Input* algorithm, | 144 der::Input* algorithm, |
106 der::Input* parameters) { | 145 der::Input* parameters) { |
107 der::Parser parser(input); | 146 der::Parser parser(input); |
108 | 147 |
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
200 WARN_UNUSED_RESULT bool ParseEcdsa(DigestAlgorithm digest, | 239 WARN_UNUSED_RESULT bool ParseEcdsa(DigestAlgorithm digest, |
201 const der::Input& params, | 240 const der::Input& params, |
202 SignatureAlgorithm* out) { | 241 SignatureAlgorithm* out) { |
203 if (!IsNullOrEmpty(params)) | 242 if (!IsNullOrEmpty(params)) |
204 return false; | 243 return false; |
205 | 244 |
206 out->AssignEcdsa(digest); | 245 out->AssignEcdsa(digest); |
207 return true; | 246 return true; |
208 } | 247 } |
209 | 248 |
249 // Parses an AlgorithmIdentifier representing an RFC 4055 "HashAlgorithm". | |
250 // Examples of HashAlgorithms are: | |
251 // | |
252 // sha1Identifier AlgorithmIdentifier ::= { id-sha1, NULL } | |
253 // sha224Identifier AlgorithmIdentifier ::= { id-sha224, NULL } | |
254 // sha256Identifier AlgorithmIdentifier ::= { id-sha256, NULL } | |
255 // sha384Identifier AlgorithmIdentifier ::= { id-sha384, NULL } | |
256 // sha512Identifier AlgorithmIdentifier ::= { id-sha512, NULL } | |
257 // | |
258 // Note that the parameters needn't be NULL as in the examples above. RFC 4055 | |
259 // says that: | |
260 // | |
261 // All implementations MUST accept both NULL and absent parameters as | |
262 // legal and equivalent encodings. | |
263 WARN_UNUSED_RESULT bool ParseHashAlgorithm(const der::Input input, | |
264 DigestAlgorithm* out) { | |
265 der::Input oid; | |
266 der::Input params; | |
267 if (!ParseAlgorithmIdentifier(input, &oid, ¶ms)) | |
268 return false; | |
269 | |
270 DigestAlgorithm hash; | |
271 | |
272 if (oid.Equals(der::Input(kOidSha1))) { | |
273 hash = DigestAlgorithm::Sha1; | |
274 } else if (oid.Equals(der::Input(kOidSha256))) { | |
275 hash = DigestAlgorithm::Sha256; | |
276 } else if (oid.Equals(der::Input(kOidSha384))) { | |
277 hash = DigestAlgorithm::Sha384; | |
278 } else if (oid.Equals(der::Input(kOidSha512))) { | |
279 hash = DigestAlgorithm::Sha512; | |
280 } else { | |
281 // Unsupported digest algorithm. | |
282 return false; | |
283 } | |
284 | |
285 if (!IsNullOrEmpty(params)) | |
286 return false; | |
287 | |
288 *out = hash; | |
289 return true; | |
290 } | |
291 | |
292 // Parses a MaskGenAlgorithm as defined by RFC 4055: | |
293 // | |
294 // MaskGenAlgorithm ::= AlgorithmIdentifier | |
295 // | |
296 // This function currently only supports MGF1, as that is the only function | |
297 // defined in RFC 4055. | |
298 // | |
299 // RFC 4055 section 2.2: | |
300 // | |
301 // One mask generation function is used with the RSASSA-PSS signature | |
302 // algorithm and the RSAES-OAEP key transport algorithm: MGF1 [P1v2.1]. | |
303 // No other mask generation functions are supported by this | |
304 // specification. | |
305 // | |
306 // MGF1 is identified by the following object identifier: | |
307 // | |
308 // id-mgf1 OBJECT IDENTIFIER ::= { pkcs-1 8 } | |
309 // | |
310 // The parameters field associated with id-mgf1 MUST have a | |
311 // hashAlgorithm value which identifies the hash function being used | |
312 // with MGF1. This value MUST be sha1Identifier, sha224Identifier, | |
313 // sha256Identifier, sha384Identifier, or sha512Identifier, as specified | |
314 // in Section 2.1. Implementations MUST support the default value, | |
315 // sha1Identifier, and MAY support the other four values. | |
316 WARN_UNUSED_RESULT bool ParseMaskGenAlgorithm(const der::Input input, | |
317 DigestAlgorithm* mgf1_hash) { | |
318 der::Input oid; | |
319 der::Input params; | |
320 if (!ParseAlgorithmIdentifier(input, &oid, ¶ms)) | |
321 return false; | |
322 | |
323 // MGF1 is the only supported mask generation algorithm. | |
324 if (!oid.Equals(der::Input(kOidMgf1))) | |
325 return false; | |
326 | |
327 return ParseHashAlgorithm(params, mgf1_hash); | |
328 } | |
329 | |
330 // Consumes an optional, explicitly-tagged INTEGER from |parser|, using the | |
331 // indicated context-specific class number. Values greater than 32-bits will be | |
332 // rejected. | |
333 // | |
334 // Returns true on success and sets |*present| to true if the field was present. | |
335 WARN_UNUSED_RESULT bool ReadOptionalContextSpecificUint32(der::Parser* parser, | |
336 uint8_t class_number, | |
337 uint32_t* out, | |
338 bool* present) { | |
339 der::Input value; | |
340 bool has_value; | |
341 | |
342 // Read the context specific value. | |
343 if (!parser->ReadOptionalTag(der::ContextSpecificConstructed(class_number), | |
344 &value, &has_value)) { | |
345 return false; | |
346 } | |
347 | |
348 if (has_value) { | |
349 // Parse the integer contained in it. | |
350 der::Parser number_parser(value); | |
351 uint64_t uint64_value; | |
352 | |
353 if (!number_parser.ReadUint64(&uint64_value)) | |
354 return false; | |
355 if (number_parser.HasMore()) | |
356 return false; | |
357 | |
358 // Cast the number to a uint32_t | |
359 base::CheckedNumeric<uint32_t> casted(uint64_value); | |
360 if (!casted.IsValid()) | |
361 return false; | |
362 *out = casted.ValueOrDie(); | |
363 } | |
364 | |
365 *present = has_value; | |
366 return true; | |
367 } | |
368 | |
210 // From RFC 4055: | 369 // From RFC 4055: |
211 // RSASSA-PSS-params ::= SEQUENCE { | 370 // RSASSA-PSS-params ::= SEQUENCE { |
212 // hashAlgorithm [0] HashAlgorithm DEFAULT | 371 // hashAlgorithm [0] HashAlgorithm DEFAULT |
213 // sha1Identifier, | 372 // sha1Identifier, |
214 // maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT | 373 // maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT |
215 // mgf1SHA1Identifier, | 374 // mgf1SHA1Identifier, |
216 // saltLength [2] INTEGER DEFAULT 20, | 375 // saltLength [2] INTEGER DEFAULT 20, |
217 // trailerField [3] INTEGER DEFAULT 1 } | 376 // trailerField [3] INTEGER DEFAULT 1 } |
218 // | 377 // |
219 // HashAlgorithm ::= AlgorithmIdentifier | 378 // HashAlgorithm ::= AlgorithmIdentifier |
220 // | 379 // |
221 // MaskGenAlgorithm ::= AlgorithmIdentifier | 380 // MaskGenAlgorithm ::= AlgorithmIdentifier |
222 WARN_UNUSED_RESULT bool ParseRsaPss(const der::Input& params, | 381 WARN_UNUSED_RESULT bool ParseRsaPss(const der::Input& params, |
223 SignatureAlgorithm* out) { | 382 SignatureAlgorithm* out) { |
224 // TODO(eroman): Implement. | 383 // RFC 4055 says that the RSASSA-PSS-params must be present in signature |
225 return false; | 384 // algorithms. (However because each field is optional, the sequence could be |
385 // empty when using all the defaults). | |
386 // | |
387 // Section 3.1: | |
388 // | |
389 // When RSASSA-PSS is used in an AlgorithmIdentifier, the parameters | |
390 // MUST employ the RSASSA-PSS-params syntax. The parameters may be | |
391 // either absent or present when used as subject public key information. | |
392 // The parameters MUST be present when used in the algorithm identifier | |
393 // associated with a signature value. | |
394 der::Parser parser(params); | |
395 der::Parser params_parser; | |
396 if (!parser.ReadSequence(¶ms_parser)) | |
397 return false; | |
398 | |
399 // There shouldn't be anything after the sequence. | |
400 if (parser.HasMore()) | |
Ryan Sleevi
2015/07/08 11:30:39
This is fine
| |
401 return false; | |
402 | |
403 // Initialize parameters to their default values. | |
404 DigestAlgorithm hash = DigestAlgorithm::Sha1; | |
405 DigestAlgorithm mgf1_hash = DigestAlgorithm::Sha1; | |
406 uint32_t salt_length = 20u; | |
407 uint32_t trailer_field = 1u; | |
408 | |
409 bool has_field; | |
410 der::Input field; | |
411 | |
412 // Parse hashAlgorithm [0] | |
413 if (!params_parser.ReadOptionalTag(der::ContextSpecificConstructed(0), &field, | |
414 &has_field)) { | |
415 return false; | |
416 } | |
417 if (has_field && !ParseHashAlgorithm(field, &hash)) | |
418 return false; | |
419 | |
420 // Parse maskGenAlgorithm [1] | |
421 if (!params_parser.ReadOptionalTag(der::ContextSpecificConstructed(1), &field, | |
422 &has_field)) { | |
423 return false; | |
424 } | |
425 if (has_field && !ParseMaskGenAlgorithm(field, &mgf1_hash)) | |
426 return false; | |
427 | |
428 // Parse saltLength [2] | |
429 if (!ReadOptionalContextSpecificUint32(¶ms_parser, 2, &salt_length, | |
430 &has_field)) { | |
431 return false; | |
432 } | |
433 | |
434 // Parse trailerField [3] | |
435 if (!ReadOptionalContextSpecificUint32(¶ms_parser, 3, &trailer_field, | |
436 &has_field)) { | |
437 return false; | |
438 } | |
439 | |
440 // The trailer field MUST be 1 per RFC 4055. | |
441 if (trailer_field != 1) | |
442 return false; | |
443 | |
444 // There must not be any unconsumed data left. | |
445 if (params_parser.HasMore()) | |
Ryan Sleevi
2015/07/08 11:30:39
The related discussion (re; RFC 5912, RFC 6025, re
eroman
2015/07/14 20:50:27
I have updated comments to reference RFC 5912, and
| |
446 return false; | |
447 | |
448 out->AssignRsaPss(hash, mgf1_hash, salt_length); | |
449 return true; | |
226 } | 450 } |
227 | 451 |
228 } // namespace | 452 } // namespace |
229 | 453 |
230 RsaPssParameters::RsaPssParameters(DigestAlgorithm mgf1_hash, | 454 RsaPssParameters::RsaPssParameters(DigestAlgorithm mgf1_hash, |
231 uint32_t salt_length) | 455 uint32_t salt_length) |
232 : mgf1_hash_(mgf1_hash), salt_length_(salt_length) { | 456 : mgf1_hash_(mgf1_hash), salt_length_(salt_length) { |
233 } | 457 } |
234 | 458 |
235 bool RsaPssParameters::Equals(const SignatureAlgorithmParameters* other) const { | 459 bool RsaPssParameters::Equals(const SignatureAlgorithmParameters* other) const { |
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
345 return nullptr; | 569 return nullptr; |
346 } | 570 } |
347 | 571 |
348 void SignatureAlgorithm::AssignInvalid() { | 572 void SignatureAlgorithm::AssignInvalid() { |
349 algorithm_ = static_cast<SignatureAlgorithmId>(-1); | 573 algorithm_ = static_cast<SignatureAlgorithmId>(-1); |
350 digest_ = static_cast<DigestAlgorithm>(-1); | 574 digest_ = static_cast<DigestAlgorithm>(-1); |
351 params_.reset(); | 575 params_.reset(); |
352 } | 576 } |
353 | 577 |
354 } // namespace net | 578 } // namespace net |
OLD | NEW |