| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "crypto/signature_verifier.h" | |
| 6 | |
| 7 #include <cryptohi.h> | |
| 8 #include <keyhi.h> | |
| 9 #include <pk11pub.h> | |
| 10 #include <secerr.h> | |
| 11 #include <sechash.h> | |
| 12 #include <stdlib.h> | |
| 13 | |
| 14 #include "base/logging.h" | |
| 15 #include "crypto/nss_util.h" | |
| 16 #include "crypto/third_party/nss/chromium-nss.h" | |
| 17 | |
| 18 namespace crypto { | |
| 19 | |
| 20 namespace { | |
| 21 | |
| 22 HASH_HashType ToNSSHashType(SignatureVerifier::HashAlgorithm hash_alg) { | |
| 23 switch (hash_alg) { | |
| 24 case SignatureVerifier::SHA1: | |
| 25 return HASH_AlgSHA1; | |
| 26 case SignatureVerifier::SHA256: | |
| 27 return HASH_AlgSHA256; | |
| 28 } | |
| 29 return HASH_AlgNULL; | |
| 30 } | |
| 31 | |
| 32 SECStatus VerifyRSAPSS_End(SECKEYPublicKey* public_key, | |
| 33 HASHContext* hash_context, | |
| 34 HASH_HashType mask_hash_alg, | |
| 35 unsigned int salt_len, | |
| 36 const unsigned char* signature, | |
| 37 unsigned int signature_len) { | |
| 38 unsigned int hash_len = HASH_ResultLenContext(hash_context); | |
| 39 std::vector<unsigned char> hash(hash_len); | |
| 40 HASH_End(hash_context, &hash[0], &hash_len, hash.size()); | |
| 41 | |
| 42 unsigned int modulus_len = SECKEY_PublicKeyStrength(public_key); | |
| 43 if (signature_len != modulus_len) { | |
| 44 PORT_SetError(SEC_ERROR_BAD_SIGNATURE); | |
| 45 return SECFailure; | |
| 46 } | |
| 47 std::vector<unsigned char> enc(signature_len); | |
| 48 SECStatus rv = PK11_PubEncryptRaw(public_key, &enc[0], | |
| 49 const_cast<unsigned char*>(signature), | |
| 50 signature_len, NULL); | |
| 51 if (rv != SECSuccess) { | |
| 52 LOG(WARNING) << "PK11_PubEncryptRaw failed"; | |
| 53 return rv; | |
| 54 } | |
| 55 return emsa_pss_verify(&hash[0], &enc[0], enc.size(), | |
| 56 HASH_GetType(hash_context), mask_hash_alg, | |
| 57 salt_len); | |
| 58 } | |
| 59 | |
| 60 } // namespace | |
| 61 | |
| 62 SignatureVerifier::SignatureVerifier() | |
| 63 : vfy_context_(NULL), | |
| 64 hash_alg_(SHA1), | |
| 65 mask_hash_alg_(SHA1), | |
| 66 salt_len_(0), | |
| 67 public_key_(NULL), | |
| 68 hash_context_(NULL) { | |
| 69 EnsureNSSInit(); | |
| 70 } | |
| 71 | |
| 72 SignatureVerifier::~SignatureVerifier() { | |
| 73 Reset(); | |
| 74 } | |
| 75 | |
| 76 bool SignatureVerifier::VerifyInit(const uint8* signature_algorithm, | |
| 77 int signature_algorithm_len, | |
| 78 const uint8* signature, | |
| 79 int signature_len, | |
| 80 const uint8* public_key_info, | |
| 81 int public_key_info_len) { | |
| 82 if (vfy_context_ || hash_context_) | |
| 83 return false; | |
| 84 | |
| 85 signature_.assign(signature, signature + signature_len); | |
| 86 | |
| 87 SECKEYPublicKey* public_key = DecodePublicKeyInfo(public_key_info, | |
| 88 public_key_info_len); | |
| 89 if (!public_key) | |
| 90 return false; | |
| 91 | |
| 92 PLArenaPool* arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 93 if (!arena) { | |
| 94 SECKEY_DestroyPublicKey(public_key); | |
| 95 return false; | |
| 96 } | |
| 97 | |
| 98 SECItem sig_alg_der; | |
| 99 sig_alg_der.type = siBuffer; | |
| 100 sig_alg_der.data = const_cast<uint8*>(signature_algorithm); | |
| 101 sig_alg_der.len = signature_algorithm_len; | |
| 102 SECAlgorithmID sig_alg_id; | |
| 103 SECStatus rv; | |
| 104 rv = SEC_QuickDERDecodeItem(arena, &sig_alg_id, | |
| 105 SEC_ASN1_GET(SECOID_AlgorithmIDTemplate), | |
| 106 &sig_alg_der); | |
| 107 if (rv != SECSuccess) { | |
| 108 SECKEY_DestroyPublicKey(public_key); | |
| 109 PORT_FreeArena(arena, PR_TRUE); | |
| 110 return false; | |
| 111 } | |
| 112 | |
| 113 SECItem sig; | |
| 114 sig.type = siBuffer; | |
| 115 sig.data = const_cast<uint8*>(signature); | |
| 116 sig.len = signature_len; | |
| 117 SECOidTag hash_alg_tag; | |
| 118 vfy_context_ = VFY_CreateContextWithAlgorithmID(public_key, &sig, | |
| 119 &sig_alg_id, &hash_alg_tag, | |
| 120 NULL); | |
| 121 SECKEY_DestroyPublicKey(public_key); // Done with public_key. | |
| 122 PORT_FreeArena(arena, PR_TRUE); // Done with sig_alg_id. | |
| 123 if (!vfy_context_) { | |
| 124 // A corrupted RSA signature could be detected without the data, so | |
| 125 // VFY_CreateContextWithAlgorithmID may fail with SEC_ERROR_BAD_SIGNATURE | |
| 126 // (-8182). | |
| 127 return false; | |
| 128 } | |
| 129 | |
| 130 rv = VFY_Begin(vfy_context_); | |
| 131 if (rv != SECSuccess) { | |
| 132 NOTREACHED(); | |
| 133 return false; | |
| 134 } | |
| 135 return true; | |
| 136 } | |
| 137 | |
| 138 bool SignatureVerifier::VerifyInitRSAPSS(HashAlgorithm hash_alg, | |
| 139 HashAlgorithm mask_hash_alg, | |
| 140 int salt_len, | |
| 141 const uint8* signature, | |
| 142 int signature_len, | |
| 143 const uint8* public_key_info, | |
| 144 int public_key_info_len) { | |
| 145 if (vfy_context_ || hash_context_) | |
| 146 return false; | |
| 147 | |
| 148 signature_.assign(signature, signature + signature_len); | |
| 149 | |
| 150 SECKEYPublicKey* public_key = DecodePublicKeyInfo(public_key_info, | |
| 151 public_key_info_len); | |
| 152 if (!public_key) | |
| 153 return false; | |
| 154 | |
| 155 public_key_ = public_key; | |
| 156 hash_alg_ = hash_alg; | |
| 157 mask_hash_alg_ = mask_hash_alg; | |
| 158 salt_len_ = salt_len; | |
| 159 hash_context_ = HASH_Create(ToNSSHashType(hash_alg_)); | |
| 160 if (!hash_context_) | |
| 161 return false; | |
| 162 HASH_Begin(hash_context_); | |
| 163 return true; | |
| 164 } | |
| 165 | |
| 166 void SignatureVerifier::VerifyUpdate(const uint8* data_part, | |
| 167 int data_part_len) { | |
| 168 if (vfy_context_) { | |
| 169 SECStatus rv = VFY_Update(vfy_context_, data_part, data_part_len); | |
| 170 DCHECK_EQ(SECSuccess, rv); | |
| 171 } else { | |
| 172 HASH_Update(hash_context_, data_part, data_part_len); | |
| 173 } | |
| 174 } | |
| 175 | |
| 176 bool SignatureVerifier::VerifyFinal() { | |
| 177 SECStatus rv; | |
| 178 if (vfy_context_) { | |
| 179 rv = VFY_End(vfy_context_); | |
| 180 } else { | |
| 181 rv = VerifyRSAPSS_End(public_key_, hash_context_, | |
| 182 ToNSSHashType(mask_hash_alg_), salt_len_, | |
| 183 signature_.data(), | |
| 184 signature_.size()); | |
| 185 } | |
| 186 Reset(); | |
| 187 | |
| 188 // If signature verification fails, the error code is | |
| 189 // SEC_ERROR_BAD_SIGNATURE (-8182). | |
| 190 return (rv == SECSuccess); | |
| 191 } | |
| 192 | |
| 193 // static | |
| 194 SECKEYPublicKey* SignatureVerifier::DecodePublicKeyInfo( | |
| 195 const uint8* public_key_info, | |
| 196 int public_key_info_len) { | |
| 197 CERTSubjectPublicKeyInfo* spki = NULL; | |
| 198 SECItem spki_der; | |
| 199 spki_der.type = siBuffer; | |
| 200 spki_der.data = const_cast<uint8*>(public_key_info); | |
| 201 spki_der.len = public_key_info_len; | |
| 202 spki = SECKEY_DecodeDERSubjectPublicKeyInfo(&spki_der); | |
| 203 if (!spki) | |
| 204 return NULL; | |
| 205 SECKEYPublicKey* public_key = SECKEY_ExtractPublicKey(spki); | |
| 206 SECKEY_DestroySubjectPublicKeyInfo(spki); // Done with spki. | |
| 207 return public_key; | |
| 208 } | |
| 209 | |
| 210 void SignatureVerifier::Reset() { | |
| 211 if (vfy_context_) { | |
| 212 VFY_DestroyContext(vfy_context_, PR_TRUE); | |
| 213 vfy_context_ = NULL; | |
| 214 } | |
| 215 if (hash_context_) { | |
| 216 HASH_Destroy(hash_context_); | |
| 217 hash_context_ = NULL; | |
| 218 } | |
| 219 if (public_key_) { | |
| 220 SECKEY_DestroyPublicKey(public_key_); | |
| 221 public_key_ = NULL; | |
| 222 } | |
| 223 signature_.clear(); | |
| 224 } | |
| 225 | |
| 226 } // namespace crypto | |
| OLD | NEW |