Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(230)

Side by Side Diff: net/cert/sha256_legacy_support_nss_win.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/cert/sct_status_flags.h ('k') | net/cert/sha256_legacy_support_openssl_win.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include <cert.h>
6 #include <keyhi.h>
7 #include <secoid.h>
8
9 #include "base/logging.h"
10 #include "crypto/scoped_nss_types.h"
11 #include "net/cert/sha256_legacy_support_win.h"
12
13 namespace net {
14
15 namespace sha256_interception {
16
17 BOOL CryptVerifyCertificateSignatureExHook(
18 CryptVerifyCertificateSignatureExFunc original_func,
19 HCRYPTPROV_LEGACY provider,
20 DWORD encoding_type,
21 DWORD subject_type,
22 void* subject_data,
23 DWORD issuer_type,
24 void* issuer_data,
25 DWORD flags,
26 void* extra) {
27 CHECK(original_func);
28
29 // Only intercept if the arguments are supported.
30 if (provider != NULL || (encoding_type != X509_ASN_ENCODING) ||
31 !IsSupportedSubjectType(subject_type) || subject_data == NULL ||
32 !IsSupportedIssuerType(issuer_type) || issuer_data == NULL) {
33 return original_func(provider, encoding_type, subject_type, subject_data,
34 issuer_type, issuer_data, flags, extra);
35 }
36
37 base::StringPiece subject_signature =
38 GetSubjectSignature(subject_type, subject_data);
39 bool should_intercept = false;
40
41 crypto::ScopedPLArenaPool arena(PORT_NewArena(DER_DEFAULT_CHUNKSIZE));
42 CERTSignedData signed_data;
43 memset(&signed_data, 0, sizeof(signed_data));
44
45 // Attempt to decode the subject using the generic "Signed Data" template,
46 // which all of the supported subject types match. If the signature
47 // algorithm is RSA with one of the SHA-2 algorithms supported by NSS
48 // (excluding SHA-224, which is pointless), then defer to the NSS
49 // implementation. Otherwise, fall back and let the OS handle it (e.g.
50 // in case there are any algorithm policies in effect).
51 if (!subject_signature.empty()) {
52 SECItem subject_sig_item;
53 subject_sig_item.data = const_cast<unsigned char*>(
54 reinterpret_cast<const unsigned char*>(subject_signature.data()));
55 subject_sig_item.len = subject_signature.size();
56 SECStatus rv = SEC_QuickDERDecodeItem(
57 arena.get(), &signed_data, SEC_ASN1_GET(CERT_SignedDataTemplate),
58 &subject_sig_item);
59 if (rv == SECSuccess) {
60 SECOidTag signature_alg =
61 SECOID_GetAlgorithmTag(&signed_data.signatureAlgorithm);
62 if (signature_alg == SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION ||
63 signature_alg == SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION ||
64 signature_alg == SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION) {
65 should_intercept = true;
66 }
67 }
68 }
69
70 if (!should_intercept) {
71 return original_func(provider, encoding_type, subject_type, subject_data,
72 issuer_type, issuer_data, flags, extra);
73 }
74
75 // Rather than attempting to synthesize a CERTSubjectPublicKeyInfo by hand,
76 // just force the OS to do an ASN.1 encoding and then decode it back into
77 // NSS. This is silly for performance, but safest for consistency.
78 PCERT_PUBLIC_KEY_INFO issuer_public_key =
79 GetIssuerPublicKey(issuer_type, issuer_data);
80 if (!issuer_public_key) {
81 SetLastError(static_cast<DWORD>(NTE_BAD_ALGID));
82 return FALSE;
83 }
84
85 unsigned char* issuer_spki_data = NULL;
86 DWORD issuer_spki_len = 0;
87 if (!CryptEncodeObjectEx(X509_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
88 issuer_public_key, CRYPT_ENCODE_ALLOC_FLAG, NULL,
89 &issuer_spki_data, &issuer_spki_len)) {
90 return FALSE;
91 }
92
93 SECItem nss_issuer_spki;
94 nss_issuer_spki.data = issuer_spki_data;
95 nss_issuer_spki.len = issuer_spki_len;
96 CERTSubjectPublicKeyInfo* spki =
97 SECKEY_DecodeDERSubjectPublicKeyInfo(&nss_issuer_spki);
98 ::LocalFree(issuer_spki_data);
99 if (!spki) {
100 SetLastError(static_cast<DWORD>(NTE_BAD_ALGID));
101 return FALSE;
102 }
103
104 // Attempt to actually verify the signed data. If it fails, synthesize the
105 // failure as a generic "bad signature" and let CryptoAPI handle the rest.
106 SECStatus rv = CERT_VerifySignedDataWithPublicKeyInfo(
107 &signed_data, spki, NULL);
108 SECKEY_DestroySubjectPublicKeyInfo(spki);
109 if (rv != SECSuccess) {
110 SetLastError(static_cast<DWORD>(NTE_BAD_SIGNATURE));
111 return FALSE;
112 }
113 return TRUE;
114 }
115
116 } // namespace sha256_interception
117
118 } // namespace net
OLDNEW
« no previous file with comments | « net/cert/sct_status_flags.h ('k') | net/cert/sha256_legacy_support_openssl_win.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698