Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef EXTENSIONS_BROWSER_API_CAST_CHANNEL_CAST_AUTH_UTIL_H_ | 5 #ifndef EXTENSIONS_BROWSER_API_CAST_CHANNEL_CAST_AUTH_UTIL_H_ |
| 6 #define EXTENSIONS_BROWSER_API_CAST_CHANNEL_CAST_AUTH_UTIL_H_ | 6 #define EXTENSIONS_BROWSER_API_CAST_CHANNEL_CAST_AUTH_UTIL_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
| (...skipping 28 matching lines...) Expand all Loading... | |
| 39 ERROR_FINGERPRINT_NOT_FOUND, | 39 ERROR_FINGERPRINT_NOT_FOUND, |
| 40 ERROR_CERT_PARSING_FAILED, | 40 ERROR_CERT_PARSING_FAILED, |
| 41 ERROR_CERT_NOT_SIGNED_BY_TRUSTED_CA, | 41 ERROR_CERT_NOT_SIGNED_BY_TRUSTED_CA, |
| 42 ERROR_CANNOT_EXTRACT_PUBLIC_KEY, | 42 ERROR_CANNOT_EXTRACT_PUBLIC_KEY, |
| 43 ERROR_SIGNED_BLOBS_MISMATCH, | 43 ERROR_SIGNED_BLOBS_MISMATCH, |
| 44 ERROR_TLS_CERT_VALIDITY_PERIOD_TOO_LONG, | 44 ERROR_TLS_CERT_VALIDITY_PERIOD_TOO_LONG, |
| 45 ERROR_TLS_CERT_VALID_START_DATE_IN_FUTURE, | 45 ERROR_TLS_CERT_VALID_START_DATE_IN_FUTURE, |
| 46 ERROR_TLS_CERT_EXPIRED, | 46 ERROR_TLS_CERT_EXPIRED, |
| 47 ERROR_CRL_INVALID, | 47 ERROR_CRL_INVALID, |
| 48 ERROR_CERT_REVOKED, | 48 ERROR_CERT_REVOKED, |
| 49 ERROR_SENDER_NONCE_MISMATCH, | |
| 49 }; | 50 }; |
| 50 | 51 |
| 51 enum PolicyType { POLICY_NONE = 0, POLICY_AUDIO_ONLY = 1 << 0 }; | 52 enum PolicyType { POLICY_NONE = 0, POLICY_AUDIO_ONLY = 1 << 0 }; |
| 52 | 53 |
| 53 // Constructs a AuthResult that corresponds to success. | 54 // Constructs a AuthResult that corresponds to success. |
| 54 AuthResult(); | 55 AuthResult(); |
| 55 | 56 |
| 56 AuthResult(const std::string& error_message, ErrorType error_type); | 57 AuthResult(const std::string& error_message, ErrorType error_type); |
| 57 | 58 |
| 58 ~AuthResult(); | 59 ~AuthResult(); |
| 59 | 60 |
| 60 static AuthResult CreateWithParseError(const std::string& error_message, | 61 static AuthResult CreateWithParseError(const std::string& error_message, |
| 61 ErrorType error_type); | 62 ErrorType error_type); |
| 62 | 63 |
| 63 bool success() const { return error_type == ERROR_NONE; } | 64 bool success() const { return error_type == ERROR_NONE; } |
| 64 | 65 |
| 65 std::string error_message; | 66 std::string error_message; |
| 66 ErrorType error_type; | 67 ErrorType error_type; |
| 67 unsigned int channel_policies; | 68 unsigned int channel_policies; |
| 68 }; | 69 }; |
| 69 | 70 |
| 71 class AuthContext { | |
| 72 public: | |
| 73 explicit AuthContext(const std::string& nonce); | |
|
mark a. foltz
2017/03/17 17:15:39
Nit: Make this private, it looks like all code and
ryanchung
2017/03/17 17:34:07
Done.
| |
| 74 ~AuthContext(); | |
| 75 | |
| 76 // Get an auth challenge context. | |
| 77 // The same context must be used in the challenge and reply. | |
| 78 static AuthContext Create(); | |
| 79 | |
| 80 // Verifies the nonce received in the response is equivalent to the one sent. | |
| 81 // Returns success if |nonce_response| matches nonce_ | |
| 82 AuthResult VerifySenderNonce(const std::string& nonce_response) const; | |
| 83 | |
| 84 // The nonce challenge. | |
| 85 const std::string& nonce() const { return nonce_; } | |
| 86 | |
| 87 private: | |
| 88 const std::string nonce_; | |
| 89 }; | |
| 90 | |
| 70 // Authenticates the given |challenge_reply|: | 91 // Authenticates the given |challenge_reply|: |
| 71 // 1. Signature contained in the reply is valid. | 92 // 1. Signature contained in the reply is valid. |
| 72 // 2. Certficate used to sign is rooted to a trusted CA. | 93 // 2. Certficate used to sign is rooted to a trusted CA. |
| 73 AuthResult AuthenticateChallengeReply(const CastMessage& challenge_reply, | 94 AuthResult AuthenticateChallengeReply(const CastMessage& challenge_reply, |
| 74 const net::X509Certificate& peer_cert); | 95 const net::X509Certificate& peer_cert, |
| 96 const AuthContext& auth_context); | |
| 97 | |
| 98 // Performs a quick check of the TLS certificate for time validity requirements. | |
| 99 AuthResult VerifyTLSCertificate(const net::X509Certificate& peer_cert, | |
| 100 std::string* peer_cert_der, | |
| 101 const base::Time& verification_time); | |
| 75 | 102 |
| 76 // Auth-library specific implementation of cryptographic signature | 103 // Auth-library specific implementation of cryptographic signature |
| 77 // verification routines. Verifies that |response| contains a | 104 // verification routines. Verifies that |response| contains a |
| 78 // valid signature of |signature_input|. | 105 // valid signature of |signature_input|. |
| 79 AuthResult VerifyCredentials(const AuthResponse& response, | 106 AuthResult VerifyCredentials(const AuthResponse& response, |
| 80 const std::string& signature_input); | 107 const std::string& signature_input); |
| 81 | 108 |
| 82 // Exposed for testing only. | 109 // Exposed for testing only. |
| 83 // | 110 // |
| 84 // Overloaded version of VerifyCredentials that allows modifying | 111 // Overloaded version of VerifyCredentials that allows modifying |
| 85 // the crl policy, trust stores, and verification times. | 112 // the crl policy, trust stores, and verification times. |
| 86 AuthResult VerifyCredentialsForTest( | 113 AuthResult VerifyCredentialsForTest( |
| 87 const AuthResponse& response, | 114 const AuthResponse& response, |
| 88 const std::string& signature_input, | 115 const std::string& signature_input, |
| 89 const cast_certificate::CRLPolicy& crl_policy, | 116 const cast_certificate::CRLPolicy& crl_policy, |
| 90 net::TrustStore* cast_trust_store, | 117 net::TrustStore* cast_trust_store, |
| 91 net::TrustStore* crl_trust_store, | 118 net::TrustStore* crl_trust_store, |
| 92 const base::Time& verification_time); | 119 const base::Time& verification_time); |
| 93 | 120 |
| 94 } // namespace cast_channel | 121 } // namespace cast_channel |
| 95 } // namespace api | 122 } // namespace api |
| 96 } // namespace extensions | 123 } // namespace extensions |
| 97 | 124 |
| 98 #endif // EXTENSIONS_BROWSER_API_CAST_CHANNEL_CAST_AUTH_UTIL_H_ | 125 #endif // EXTENSIONS_BROWSER_API_CAST_CHANNEL_CAST_AUTH_UTIL_H_ |
| OLD | NEW |