OLD | NEW |
---|---|
(Empty) | |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/cert/ct_log_verifier.h" | |
6 | |
7 #include <cryptohi.h> | |
8 #include <keyhi.h> | |
9 #include <nss.h> | |
10 #include <pk11pub.h> | |
11 #include <secitem.h> | |
12 #include <secoid.h> | |
13 | |
14 #include "base/logging.h" | |
15 #include "crypto/nss_util.h" | |
16 #include "crypto/sha2.h" | |
17 #include "net/cert/signed_certificate_timestamp.h" | |
18 | |
19 namespace net { | |
20 | |
21 namespace { | |
22 | |
23 SECOidTag GetNSSSigAlg(ct::DigitallySigned::SignatureAlgorithm alg) { | |
24 switch (alg) { | |
25 case ct::DigitallySigned::SIG_ALGO_RSA: | |
26 return SEC_OID_PKCS1_RSA_ENCRYPTION; | |
27 case ct::DigitallySigned::SIG_ALGO_DSA: | |
28 return SEC_OID_ANSIX9_DSA_SIGNATURE; | |
29 case ct::DigitallySigned::SIG_ALGO_ECDSA: | |
30 return SEC_OID_ANSIX962_EC_PUBLIC_KEY; | |
31 case ct::DigitallySigned::SIG_ALGO_ANONYMOUS: | |
32 default: | |
33 NOTREACHED(); | |
34 return SEC_OID_UNKNOWN; | |
35 } | |
36 } | |
37 | |
38 SECOidTag GetNSSHashAlg(ct::DigitallySigned::HashAlgorithm alg) { | |
39 switch (alg) { | |
40 case ct::DigitallySigned::HASH_ALGO_MD5: | |
41 return SEC_OID_MD5; | |
42 case ct::DigitallySigned::HASH_ALGO_SHA1: | |
43 return SEC_OID_SHA1; | |
44 case ct::DigitallySigned::HASH_ALGO_SHA224: | |
45 return SEC_OID_SHA224; | |
46 case ct::DigitallySigned::HASH_ALGO_SHA256: | |
47 return SEC_OID_SHA256; | |
48 case ct::DigitallySigned::HASH_ALGO_SHA384: | |
49 return SEC_OID_SHA384; | |
50 case ct::DigitallySigned::HASH_ALGO_SHA512: | |
51 return SEC_OID_SHA512; | |
52 case ct::DigitallySigned::HASH_ALGO_NONE: | |
53 default: | |
54 NOTREACHED(); | |
55 return SEC_OID_UNKNOWN; | |
56 } | |
57 } | |
58 | |
59 } // namespace | |
60 | |
61 CTLogVerifier::~CTLogVerifier() { | |
62 if (public_key_) | |
63 SECKEY_DestroyPublicKey(public_key_); | |
64 } | |
65 | |
66 CTLogVerifier::CTLogVerifier() : | |
67 hash_algorithm_(ct::DigitallySigned::HASH_ALGO_NONE), | |
68 signature_algorithm_(ct::DigitallySigned::SIG_ALGO_ANONYMOUS), | |
69 public_key_(NULL) {} | |
wtc
2013/11/14 18:46:30
Please see the Style Guide's recommendation on how
| |
70 | |
71 bool CTLogVerifier::Init(const base::StringPiece& public_key, | |
72 const base::StringPiece& description) { | |
73 SECItem key_data; | |
74 | |
75 crypto::EnsureNSSInit(); | |
76 | |
77 key_data.data = reinterpret_cast<unsigned char*>( | |
78 const_cast<char*>(public_key.data())); | |
79 key_data.len = public_key.size(); | |
80 | |
81 CERTSubjectPublicKeyInfo* public_key_info = | |
82 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_data); | |
83 if (!public_key_info) { | |
84 DVLOG(1) << "Failed decoding public key."; | |
85 return false; | |
86 } | |
87 | |
88 public_key_ = SECKEY_ExtractPublicKey(public_key_info); | |
89 SECKEY_DestroySubjectPublicKeyInfo(public_key_info); | |
90 | |
91 if (!public_key_) { | |
92 DVLOG(1) << "Failed extracting public key."; | |
93 return false; | |
94 } | |
95 | |
96 key_id_ = crypto::SHA256HashString(public_key); | |
97 description_ = description.as_string(); | |
98 | |
99 // Right now, only RSASSA-PKCS1v15 with SHA-256 and ECDSA with SHA-256 are | |
100 // supported. | |
101 switch (SECKEY_GetPublicKeyType(public_key_)) { | |
102 case rsaKey: | |
103 hash_algorithm_ = ct::DigitallySigned::HASH_ALGO_SHA256; | |
104 signature_algorithm_ = ct::DigitallySigned::SIG_ALGO_RSA; | |
105 break; | |
106 case ecKey: | |
107 hash_algorithm_ = ct::DigitallySigned::HASH_ALGO_SHA256; | |
108 signature_algorithm_ = ct::DigitallySigned::SIG_ALGO_ECDSA; | |
109 break; | |
110 default: | |
111 DVLOG(1) << "Unsupported key type: " << | |
112 SECKEY_GetPublicKeyType(public_key_); | |
wtc
2013/11/14 18:46:30
Nit: this should be formatted as follows:
DVLOG
| |
113 return false; | |
114 } | |
115 | |
116 // Extra sanity check: Require RSA keys of at least 2048 bits. | |
117 if (signature_algorithm_ == ct::DigitallySigned::SIG_ALGO_RSA && | |
118 SECKEY_PublicKeyStrengthInBits(public_key_) < 2048) { | |
119 DVLOG(1) << "Too small a public key."; | |
120 return false; | |
121 } | |
122 | |
123 return true; | |
124 } | |
125 | |
126 bool CTLogVerifier::VerifySignature(const base::StringPiece& data_to_sign, | |
127 const base::StringPiece& signature) { | |
128 SECItem sig_data; | |
129 sig_data.data = reinterpret_cast<unsigned char*>(const_cast<char*>( | |
130 signature.data())); | |
131 sig_data.len = signature.size(); | |
132 | |
133 SECStatus rv = VFY_VerifyDataDirect( | |
134 reinterpret_cast<const unsigned char*>(data_to_sign.data()), | |
135 data_to_sign.size(), public_key_, &sig_data, | |
136 GetNSSSigAlg(signature_algorithm_), GetNSSHashAlg(hash_algorithm_), | |
137 NULL, NULL); | |
138 DVLOG(1) << "Signature verification result: " << (rv == SECSuccess); | |
139 return rv == SECSuccess; | |
140 } | |
141 | |
142 } // namespace net | |
OLD | NEW |