| Index: net/cert/sha256_legacy_support_win.cc | 
| diff --git a/net/cert/sha256_legacy_support_win.cc b/net/cert/sha256_legacy_support_win.cc | 
| new file mode 100644 | 
| index 0000000000000000000000000000000000000000..656edd73ad419214a34881acb10d4020c93c07bb | 
| --- /dev/null | 
| +++ b/net/cert/sha256_legacy_support_win.cc | 
| @@ -0,0 +1,195 @@ | 
| +// Copyright 2014 The Chromium Authors. All rights reserved. | 
| +// Use of this source code is governed by a BSD-style license that can be | 
| +// found in the LICENSE file. | 
| + | 
| +#include "net/cert/sha256_legacy_support_win.h" | 
| + | 
| +#include <windows.h> | 
| +#include <wincrypt.h> | 
| + | 
| +#include <cert.h> | 
| +#include <keyhi.h> | 
| +#include <secoid.h> | 
| + | 
| +#include "base/lazy_instance.h" | 
| +#include "base/logging.h" | 
| +#include "base/strings/string_piece.h" | 
| +#include "base/win/windows_version.h" | 
| +#include "crypto/scoped_nss_types.h" | 
| + | 
| +namespace net { | 
| + | 
| +namespace sha256_interception { | 
| + | 
| +namespace { | 
| + | 
| +bool IsSupportedSubjectType(DWORD subject_type) { | 
| +  switch (subject_type) { | 
| +    case CRYPT_VERIFY_CERT_SIGN_SUBJECT_BLOB: | 
| +    case CRYPT_VERIFY_CERT_SIGN_SUBJECT_CERT: | 
| +    case CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL: | 
| +      return true; | 
| +  } | 
| +  return false; | 
| +} | 
| + | 
| +bool IsSupportedIssuerType(DWORD issuer_type) { | 
| +  switch (issuer_type) { | 
| +    case CRYPT_VERIFY_CERT_SIGN_ISSUER_PUBKEY: | 
| +    case CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT: | 
| +    case CRYPT_VERIFY_CERT_SIGN_ISSUER_CHAIN: | 
| +      return true; | 
| +  } | 
| +  return false; | 
| +} | 
| + | 
| +base::StringPiece GetSubjectSignature(DWORD subject_type, | 
| +                                      void* subject_data) { | 
| +  switch (subject_type) { | 
| +    case CRYPT_VERIFY_CERT_SIGN_SUBJECT_BLOB: { | 
| +      CRYPT_DATA_BLOB* data_blob = | 
| +          reinterpret_cast<CRYPT_DATA_BLOB*>(subject_data); | 
| +      return base::StringPiece(reinterpret_cast<char*>(data_blob->pbData), | 
| +                               data_blob->cbData); | 
| +    } | 
| +    case CRYPT_VERIFY_CERT_SIGN_SUBJECT_CERT: { | 
| +      PCCERT_CONTEXT subject_cert = | 
| +          reinterpret_cast<PCCERT_CONTEXT>(subject_data); | 
| +      return base::StringPiece( | 
| +          reinterpret_cast<char*>(subject_cert->pbCertEncoded), | 
| +          subject_cert->cbCertEncoded); | 
| +    } | 
| +    case CRYPT_VERIFY_CERT_SIGN_SUBJECT_CRL: { | 
| +      PCCRL_CONTEXT subject_crl = | 
| +          reinterpret_cast<PCCRL_CONTEXT>(subject_data); | 
| +      return base::StringPiece( | 
| +          reinterpret_cast<char*>(subject_crl->pbCrlEncoded), | 
| +          subject_crl->cbCrlEncoded); | 
| +    } | 
| +  } | 
| +  return base::StringPiece(); | 
| +} | 
| + | 
| +PCERT_PUBLIC_KEY_INFO GetIssuerPublicKey(DWORD issuer_type, | 
| +                                         void* issuer_data) { | 
| +  switch (issuer_type) { | 
| +    case CRYPT_VERIFY_CERT_SIGN_ISSUER_PUBKEY: | 
| +      return reinterpret_cast<PCERT_PUBLIC_KEY_INFO>(issuer_data); | 
| +    case CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT: { | 
| +      PCCERT_CONTEXT cert = reinterpret_cast<PCCERT_CONTEXT>(issuer_data); | 
| +      return &cert->pCertInfo->SubjectPublicKeyInfo; | 
| +    } | 
| +    case CRYPT_VERIFY_CERT_SIGN_ISSUER_CHAIN: { | 
| +      PCCERT_CHAIN_CONTEXT chain = | 
| +          reinterpret_cast<PCCERT_CHAIN_CONTEXT>(issuer_data); | 
| +      PCCERT_CONTEXT cert = chain->rgpChain[0]->rgpElement[0]->pCertContext; | 
| +      return &cert->pCertInfo->SubjectPublicKeyInfo; | 
| +    } | 
| +  } | 
| +  return NULL; | 
| +} | 
| + | 
| +}  // namespace | 
| + | 
| +BOOL CryptVerifyCertificateSignatureExHook( | 
| +    CryptVerifyCertificateSignatureExFunc original_func, | 
| +    HCRYPTPROV_LEGACY provider, | 
| +    DWORD encoding_type, | 
| +    DWORD subject_type, | 
| +    void* subject_data, | 
| +    DWORD issuer_type, | 
| +    void* issuer_data, | 
| +    DWORD flags, | 
| +    void* extra) { | 
| +  CHECK(original_func); | 
| + | 
| +  // Only intercept if the arguments are supported. | 
| +  if (provider != NULL || (encoding_type != X509_ASN_ENCODING) || | 
| +      !IsSupportedSubjectType(subject_type) || subject_data == NULL || | 
| +      !IsSupportedIssuerType(issuer_type) || issuer_data == NULL) { | 
| +    return original_func(provider, encoding_type, subject_type, subject_data, | 
| +                         issuer_type, issuer_data, flags, extra); | 
| +  } | 
| + | 
| +  base::StringPiece subject_signature = | 
| +      GetSubjectSignature(subject_type, subject_data); | 
| +  bool should_intercept = false; | 
| + | 
| +  crypto::ScopedPLArenaPool arena(PORT_NewArena(DER_DEFAULT_CHUNKSIZE)); | 
| +  CERTSignedData signed_data; | 
| +  memset(&signed_data, 0, sizeof(signed_data)); | 
| + | 
| +  // Attempt to decode the subject using the generic "Signed Data" template, | 
| +  // which all of the supported subject types match. If the signature | 
| +  // algorithm is RSA with one of the SHA-2 algorithms supported by NSS | 
| +  // (excluding SHA-224, which is pointless), then defer to the NSS | 
| +  // implementation. Otherwise, fall back and let the OS handle it (e.g. | 
| +  // in case there are any algorithm policies in effect). | 
| +  if (!subject_signature.empty()) { | 
| +    SECItem subject_sig_item; | 
| +    subject_sig_item.data = const_cast<unsigned char*>( | 
| +        reinterpret_cast<const unsigned char*>(subject_signature.data())); | 
| +    subject_sig_item.len = subject_signature.size(); | 
| +    SECStatus rv = SEC_QuickDERDecodeItem( | 
| +        arena.get(), &signed_data, SEC_ASN1_GET(CERT_SignedDataTemplate), | 
| +        &subject_sig_item); | 
| +    if (rv == SECSuccess) { | 
| +      SECOidTag signature_alg = | 
| +          SECOID_GetAlgorithmTag(&signed_data.signatureAlgorithm); | 
| +      if (signature_alg == SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION || | 
| +          signature_alg == SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION || | 
| +          signature_alg == SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION) { | 
| +        should_intercept = true; | 
| +      } | 
| +    } | 
| +  } | 
| + | 
| +  if (!should_intercept) { | 
| +    return original_func(provider, encoding_type, subject_type, subject_data, | 
| +                         issuer_type, issuer_data, flags, extra); | 
| +  } | 
| + | 
| +  // Rather than attempting to synthesize a CERTSubjectPublicKeyInfo by hand, | 
| +  // just force the OS to do an ASN.1 encoding and then decode it back into | 
| +  // NSS. This is silly for performance, but safest for consistency. | 
| +  PCERT_PUBLIC_KEY_INFO issuer_public_key = | 
| +      GetIssuerPublicKey(issuer_type, issuer_data); | 
| +  if (!issuer_public_key) { | 
| +    SetLastError(static_cast<DWORD>(NTE_BAD_ALGID)); | 
| +    return FALSE; | 
| +  } | 
| + | 
| +  unsigned char* issuer_spki_data = NULL; | 
| +  DWORD issuer_spki_len = 0; | 
| +  if (!CryptEncodeObjectEx(X509_ASN_ENCODING, X509_PUBLIC_KEY_INFO, | 
| +                           issuer_public_key, CRYPT_ENCODE_ALLOC_FLAG, NULL, | 
| +                           &issuer_spki_data, &issuer_spki_len)) { | 
| +    return FALSE; | 
| +  } | 
| + | 
| +  SECItem nss_issuer_spki; | 
| +  nss_issuer_spki.data = issuer_spki_data; | 
| +  nss_issuer_spki.len = issuer_spki_len; | 
| +  CERTSubjectPublicKeyInfo* spki = | 
| +      SECKEY_DecodeDERSubjectPublicKeyInfo(&nss_issuer_spki); | 
| +  ::LocalFree(issuer_spki_data); | 
| +  if (!spki) { | 
| +    SetLastError(static_cast<DWORD>(NTE_BAD_ALGID)); | 
| +    return FALSE; | 
| +  } | 
| + | 
| +  // Attempt to actually verify the signed data. If it fails, synthesize the | 
| +  // failure as a generic "bad signature" and let CryptoAPI handle the rest. | 
| +  SECStatus rv = CERT_VerifySignedDataWithPublicKeyInfo( | 
| +      &signed_data, spki, NULL); | 
| +  SECKEY_DestroySubjectPublicKeyInfo(spki); | 
| +  if (rv != SECSuccess) { | 
| +    SetLastError(static_cast<DWORD>(NTE_BAD_SIGNATURE)); | 
| +    return FALSE; | 
| +  } | 
| +  return TRUE; | 
| +} | 
| + | 
| +}  // namespace sha256_interception | 
| + | 
| +}  // namespace net | 
|  |