Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(71)

Unified Diff: net/cert/ct_log_verifier_nss.cc

Issue 1882433002: Removing NSS files and USE_OPENSSL flag (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebase. Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cert/ct_log_verifier.h ('k') | net/cert/ct_objects_extractor_nss.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/ct_log_verifier_nss.cc
diff --git a/net/cert/ct_log_verifier_nss.cc b/net/cert/ct_log_verifier_nss.cc
deleted file mode 100644
index fec7dc832daefcadbb404a6ffbcd8aa789e517a3..0000000000000000000000000000000000000000
--- a/net/cert/ct_log_verifier_nss.cc
+++ /dev/null
@@ -1,135 +0,0 @@
-// Copyright 2013 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/cert/ct_log_verifier.h"
-
-#include <cryptohi.h>
-#include <keyhi.h>
-#include <nss.h>
-#include <pk11pub.h>
-#include <secitem.h>
-#include <secoid.h>
-
-#include "base/logging.h"
-#include "crypto/nss_util.h"
-#include "crypto/sha2.h"
-#include "net/cert/signed_tree_head.h"
-
-namespace net {
-
-namespace {
-
-SECOidTag GetNSSSigAlg(ct::DigitallySigned::SignatureAlgorithm alg) {
- switch (alg) {
- case ct::DigitallySigned::SIG_ALGO_RSA:
- return SEC_OID_PKCS1_RSA_ENCRYPTION;
- case ct::DigitallySigned::SIG_ALGO_DSA:
- return SEC_OID_ANSIX9_DSA_SIGNATURE;
- case ct::DigitallySigned::SIG_ALGO_ECDSA:
- return SEC_OID_ANSIX962_EC_PUBLIC_KEY;
- case ct::DigitallySigned::SIG_ALGO_ANONYMOUS:
- default:
- NOTREACHED();
- return SEC_OID_UNKNOWN;
- }
-}
-
-SECOidTag GetNSSHashAlg(ct::DigitallySigned::HashAlgorithm alg) {
- switch (alg) {
- case ct::DigitallySigned::HASH_ALGO_MD5:
- return SEC_OID_MD5;
- case ct::DigitallySigned::HASH_ALGO_SHA1:
- return SEC_OID_SHA1;
- case ct::DigitallySigned::HASH_ALGO_SHA224:
- return SEC_OID_SHA224;
- case ct::DigitallySigned::HASH_ALGO_SHA256:
- return SEC_OID_SHA256;
- case ct::DigitallySigned::HASH_ALGO_SHA384:
- return SEC_OID_SHA384;
- case ct::DigitallySigned::HASH_ALGO_SHA512:
- return SEC_OID_SHA512;
- case ct::DigitallySigned::HASH_ALGO_NONE:
- default:
- NOTREACHED();
- return SEC_OID_UNKNOWN;
- }
-}
-
-} // namespace
-
-CTLogVerifier::~CTLogVerifier() {
- if (public_key_)
- SECKEY_DestroyPublicKey(public_key_);
-}
-
-bool CTLogVerifier::Init(const base::StringPiece& public_key) {
- SECItem key_data;
-
- crypto::EnsureNSSInit();
-
- key_data.data = reinterpret_cast<unsigned char*>(
- const_cast<char*>(public_key.data()));
- key_data.len = public_key.size();
-
- CERTSubjectPublicKeyInfo* public_key_info =
- SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data);
- if (!public_key_info) {
- DVLOG(1) << "Failed decoding public key.";
- return false;
- }
-
- public_key_ = SECKEY_ExtractPublicKey(public_key_info);
- SECKEY_DestroySubjectPublicKeyInfo(public_key_info);
-
- if (!public_key_) {
- DVLOG(1) << "Failed extracting public key.";
- return false;
- }
-
- key_id_ = crypto::SHA256HashString(public_key);
-
- // Right now, only RSASSA-PKCS1v15 with SHA-256 and ECDSA with SHA-256 are
- // supported.
- switch (SECKEY_GetPublicKeyType(public_key_)) {
- case rsaKey:
- hash_algorithm_ = ct::DigitallySigned::HASH_ALGO_SHA256;
- signature_algorithm_ = ct::DigitallySigned::SIG_ALGO_RSA;
- break;
- case ecKey:
- hash_algorithm_ = ct::DigitallySigned::HASH_ALGO_SHA256;
- signature_algorithm_ = ct::DigitallySigned::SIG_ALGO_ECDSA;
- break;
- default:
- DVLOG(1) << "Unsupported key type: "
- << SECKEY_GetPublicKeyType(public_key_);
- return false;
- }
-
- // Extra sanity check: Require RSA keys of at least 2048 bits.
- if (signature_algorithm_ == ct::DigitallySigned::SIG_ALGO_RSA &&
- SECKEY_PublicKeyStrengthInBits(public_key_) < 2048) {
- DVLOG(1) << "Too small a public key.";
- return false;
- }
-
- return true;
-}
-
-bool CTLogVerifier::VerifySignature(const base::StringPiece& data_to_sign,
- const base::StringPiece& signature) const {
- SECItem sig_data;
- sig_data.data = reinterpret_cast<unsigned char*>(const_cast<char*>(
- signature.data()));
- sig_data.len = signature.size();
-
- SECStatus rv = VFY_VerifyDataDirect(
- reinterpret_cast<const unsigned char*>(data_to_sign.data()),
- data_to_sign.size(), public_key_, &sig_data,
- GetNSSSigAlg(signature_algorithm_), GetNSSHashAlg(hash_algorithm_),
- NULL, NULL);
- DVLOG(1) << "Signature verification result: " << (rv == SECSuccess);
- return rv == SECSuccess;
-}
-
-} // namespace net
« no previous file with comments | « net/cert/ct_log_verifier.h ('k') | net/cert/ct_objects_extractor_nss.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698