| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "extensions/browser/api/cast_channel/cast_auth_util.h" | |
| 6 | |
| 7 #include <cert.h> | |
| 8 #include <cryptohi.h> | |
| 9 #include <pk11pub.h> | |
| 10 #include <seccomon.h> | |
| 11 #include <string> | |
| 12 | |
| 13 #include "base/logging.h" | |
| 14 #include "base/strings/string_piece.h" | |
| 15 #include "crypto/nss_util.h" | |
| 16 #include "crypto/scoped_nss_types.h" | |
| 17 #include "extensions/browser/api/cast_channel/cast_auth_ica.h" | |
| 18 #include "extensions/browser/api/cast_channel/cast_message_util.h" | |
| 19 #include "extensions/common/api/cast_channel/cast_channel.pb.h" | |
| 20 #include "net/base/hash_value.h" | |
| 21 #include "net/cert/x509_certificate.h" | |
| 22 | |
| 23 namespace extensions { | |
| 24 namespace core_api { | |
| 25 namespace cast_channel { | |
| 26 namespace { | |
| 27 | |
| 28 typedef scoped_ptr< | |
| 29 CERTCertificate, | |
| 30 crypto::NSSDestroyer<CERTCertificate, CERT_DestroyCertificate> > | |
| 31 ScopedCERTCertificate; | |
| 32 | |
| 33 } // namespace | |
| 34 | |
| 35 // Authenticates the given credentials: | |
| 36 // 1. |signature| verification of |peer_cert| using |certificate|. | |
| 37 // 2. |certificate| is signed by a trusted CA. | |
| 38 AuthResult VerifyCredentials(const AuthResponse& response, | |
| 39 const std::string& peer_cert) { | |
| 40 const std::string kErrorPrefix("Failed to verify credentials: "); | |
| 41 const std::string& certificate = response.client_auth_certificate(); | |
| 42 const std::string& signature = response.signature(); | |
| 43 | |
| 44 // If the list of intermediates is empty then use kPublicKeyICA1 as | |
| 45 // the trusted CA (legacy case). | |
| 46 // Otherwise, use the first intermediate in the list as long as it | |
| 47 // is in the allowed list of intermediates. | |
| 48 int num_intermediates = response.intermediate_certificate_size(); | |
| 49 | |
| 50 VLOG(1) << "Response has " << num_intermediates << " intermediates"; | |
| 51 | |
| 52 base::StringPiece ica; | |
| 53 if (num_intermediates <= 0) { | |
| 54 ica = GetDefaultTrustedICAPublicKey(); | |
| 55 } else { | |
| 56 ica = GetTrustedICAPublicKey(response.intermediate_certificate(0)); | |
| 57 } | |
| 58 if (ica.empty()) { | |
| 59 return AuthResult::CreateWithParseError( | |
| 60 "Disallowed intermediate cert", | |
| 61 AuthResult::ERROR_FINGERPRINT_NOT_FOUND); | |
| 62 } | |
| 63 | |
| 64 SECItem trusted_ca_key_der; | |
| 65 trusted_ca_key_der.type = SECItemType::siDERCertBuffer; | |
| 66 trusted_ca_key_der.data = | |
| 67 const_cast<uint8_t*>(reinterpret_cast<const uint8_t*>(ica.data())); | |
| 68 trusted_ca_key_der.len = ica.size(); | |
| 69 | |
| 70 crypto::EnsureNSSInit(); | |
| 71 SECItem der_cert; | |
| 72 der_cert.type = siDERCertBuffer; | |
| 73 // Make a copy of certificate string so it is safe to type cast. | |
| 74 der_cert.data = reinterpret_cast<unsigned char*>(const_cast<char*>( | |
| 75 certificate.data())); | |
| 76 der_cert.len = certificate.length(); | |
| 77 | |
| 78 // Parse into a certificate structure. | |
| 79 ScopedCERTCertificate cert(CERT_NewTempCertificate( | |
| 80 CERT_GetDefaultCertDB(), &der_cert, NULL, PR_FALSE, PR_TRUE)); | |
| 81 if (!cert.get()) { | |
| 82 return AuthResult::CreateWithNSSError( | |
| 83 "Failed to parse certificate.", | |
| 84 AuthResult::ERROR_CERT_PARSING_FAILED, PORT_GetError()); | |
| 85 } | |
| 86 | |
| 87 // Check that the certificate is signed by trusted CA. | |
| 88 // NOTE: We const_cast trusted_ca_key_der since on some platforms | |
| 89 // SECKEY_ImportDERPublicKey API takes in SECItem* and not const | |
| 90 // SECItem*. | |
| 91 crypto::ScopedSECKEYPublicKey ca_public_key( | |
| 92 SECKEY_ImportDERPublicKey(&trusted_ca_key_der, CKK_RSA)); | |
| 93 if (!ca_public_key) { | |
| 94 return AuthResult::CreateWithNSSError( | |
| 95 "Failed to import public key from CA certificate.", | |
| 96 AuthResult::ERROR_CERT_PARSING_FAILED, PORT_GetError()); | |
| 97 } | |
| 98 SECStatus verified = CERT_VerifySignedDataWithPublicKey( | |
| 99 &cert->signatureWrap, ca_public_key.get(), NULL); | |
| 100 if (verified != SECSuccess) { | |
| 101 return AuthResult::CreateWithNSSError( | |
| 102 "Cert not signed by trusted CA", | |
| 103 AuthResult::ERROR_CERT_NOT_SIGNED_BY_TRUSTED_CA, PORT_GetError()); | |
| 104 } | |
| 105 | |
| 106 VLOG(1) << "Cert signed by trusted CA"; | |
| 107 | |
| 108 // Verify that the |signature| matches |peer_cert|. | |
| 109 crypto::ScopedSECKEYPublicKey public_key(CERT_ExtractPublicKey(cert.get())); | |
| 110 if (!public_key.get()) { | |
| 111 return AuthResult::CreateWithNSSError( | |
| 112 "Unable to extract public key from certificate", | |
| 113 AuthResult::ERROR_CANNOT_EXTRACT_PUBLIC_KEY, PORT_GetError()); | |
| 114 } | |
| 115 SECItem signature_item; | |
| 116 signature_item.type = siBuffer; | |
| 117 signature_item.data = reinterpret_cast<unsigned char*>( | |
| 118 const_cast<char*>(signature.data())); | |
| 119 signature_item.len = signature.length(); | |
| 120 verified = VFY_VerifyDataDirect( | |
| 121 reinterpret_cast<unsigned char*>(const_cast<char*>(peer_cert.data())), | |
| 122 peer_cert.size(), | |
| 123 public_key.get(), | |
| 124 &signature_item, | |
| 125 SEC_OID_PKCS1_RSA_ENCRYPTION, | |
| 126 SEC_OID_SHA1, NULL, NULL); | |
| 127 | |
| 128 if (verified != SECSuccess) { | |
| 129 return AuthResult::CreateWithNSSError( | |
| 130 "Signed blobs did not match", | |
| 131 AuthResult::ERROR_SIGNED_BLOBS_MISMATCH, | |
| 132 PORT_GetError()); | |
| 133 } | |
| 134 | |
| 135 VLOG(1) << "Signature verification succeeded"; | |
| 136 | |
| 137 return AuthResult(); | |
| 138 } | |
| 139 | |
| 140 } // namespace cast_channel | |
| 141 } // namespace core_api | |
| 142 } // namespace extensions | |
| OLD | NEW |