| Index: net/quic/crypto/channel_id.cc
|
| diff --git a/net/quic/crypto/channel_id.cc b/net/quic/crypto/channel_id.cc
|
| index e707bf01cb3e983d8ba7cf6d75cd78273e31acc3..3d93be0ab875f17df144b36739d6b28b6f8a4418 100644
|
| --- a/net/quic/crypto/channel_id.cc
|
| +++ b/net/quic/crypto/channel_id.cc
|
| @@ -4,6 +4,17 @@
|
|
|
| #include "net/quic/crypto/channel_id.h"
|
|
|
| +#include <openssl/bn.h>
|
| +#include <openssl/ec.h>
|
| +#include <openssl/ecdsa.h>
|
| +#include <openssl/obj_mac.h>
|
| +#include <openssl/sha.h>
|
| +
|
| +#include "crypto/openssl_util.h"
|
| +#include "crypto/scoped_openssl_types.h"
|
| +
|
| +using base::StringPiece;
|
| +
|
| namespace net {
|
|
|
| // static
|
| @@ -11,4 +22,70 @@ const char ChannelIDVerifier::kContextStr[] = "QUIC ChannelID";
|
| // static
|
| const char ChannelIDVerifier::kClientToServerStr[] = "client -> server";
|
|
|
| +// static
|
| +bool ChannelIDVerifier::Verify(StringPiece key,
|
| + StringPiece signed_data,
|
| + StringPiece signature) {
|
| + return VerifyRaw(key, signed_data, signature, true);
|
| +}
|
| +
|
| +// static
|
| +bool ChannelIDVerifier::VerifyRaw(StringPiece key,
|
| + StringPiece signed_data,
|
| + StringPiece signature,
|
| + bool is_channel_id_signature) {
|
| + if (key.size() != 32 * 2 || signature.size() != 32 * 2) {
|
| + return false;
|
| + }
|
| +
|
| + crypto::ScopedEC_GROUP p256(EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1));
|
| + if (!p256) {
|
| + return false;
|
| + }
|
| +
|
| + crypto::ScopedBIGNUM x(BN_new()), y(BN_new()), r(BN_new()), s(BN_new());
|
| +
|
| + ECDSA_SIG sig;
|
| + sig.r = r.get();
|
| + sig.s = s.get();
|
| +
|
| + const uint8_t* key_bytes = reinterpret_cast<const uint8_t*>(key.data());
|
| + const uint8_t* signature_bytes =
|
| + reinterpret_cast<const uint8_t*>(signature.data());
|
| +
|
| + if (BN_bin2bn(key_bytes + 0, 32, x.get()) == nullptr ||
|
| + BN_bin2bn(key_bytes + 32, 32, y.get()) == nullptr ||
|
| + BN_bin2bn(signature_bytes + 0, 32, sig.r) == nullptr ||
|
| + BN_bin2bn(signature_bytes + 32, 32, sig.s) == nullptr) {
|
| + return false;
|
| + }
|
| +
|
| + crypto::ScopedEC_POINT point(EC_POINT_new(p256.get()));
|
| + if (!point ||
|
| + !EC_POINT_set_affine_coordinates_GFp(p256.get(), point.get(), x.get(),
|
| + y.get(), nullptr)) {
|
| + return false;
|
| + }
|
| +
|
| + crypto::ScopedEC_KEY ecdsa_key(EC_KEY_new());
|
| + if (ecdsa_key.get() == nullptr ||
|
| + !EC_KEY_set_group(ecdsa_key.get(), p256.get()) ||
|
| + !EC_KEY_set_public_key(ecdsa_key.get(), point.get())) {
|
| + return false;
|
| + }
|
| +
|
| + SHA256_CTX sha256;
|
| + SHA256_Init(&sha256);
|
| + if (is_channel_id_signature) {
|
| + SHA256_Update(&sha256, kContextStr, strlen(kContextStr) + 1);
|
| + SHA256_Update(&sha256, kClientToServerStr, strlen(kClientToServerStr) + 1);
|
| + }
|
| + SHA256_Update(&sha256, signed_data.data(), signed_data.size());
|
| +
|
| + unsigned char digest[SHA256_DIGEST_LENGTH];
|
| + SHA256_Final(digest, &sha256);
|
| +
|
| + return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1;
|
| +}
|
| +
|
| } // namespace net
|
|
|