// Copyright 2015 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/ssl/token_binding.h" #include "base/stl_util.h" #include "crypto/ec_private_key.h" #include "net/base/net_errors.h" #include "net/ssl/ssl_config.h" #include "third_party/boringssl/src/include/openssl/bn.h" #include "third_party/boringssl/src/include/openssl/bytestring.h" #include "third_party/boringssl/src/include/openssl/ec.h" #include "third_party/boringssl/src/include/openssl/ec_key.h" #include "third_party/boringssl/src/include/openssl/ecdsa.h" #include "third_party/boringssl/src/include/openssl/evp.h" #include "third_party/boringssl/src/include/openssl/mem.h" namespace net { namespace { const size_t kUncompressedPointLen = 65; bool BuildTokenBindingID(crypto::ECPrivateKey* key, CBB* out) { EC_KEY* ec_key = EVP_PKEY_get0_EC_KEY(key->key()); DCHECK(ec_key); uint8_t point_buf[kUncompressedPointLen]; if (EC_POINT_point2oct( EC_KEY_get0_group(ec_key), EC_KEY_get0_public_key(ec_key), POINT_CONVERSION_UNCOMPRESSED, point_buf, kUncompressedPointLen, NULL) != kUncompressedPointLen) { return false; } CBB public_key, ec_point; return CBB_add_u8(out, TB_PARAM_ECDSAP256) && CBB_add_u16_length_prefixed(out, &public_key) && CBB_add_u8_length_prefixed(&public_key, &ec_point) && CBB_add_bytes(&ec_point, point_buf + 1, kUncompressedPointLen - 1) && CBB_flush(out); } bool ECDSA_SIGToRaw(ECDSA_SIG* ec_sig, EC_KEY* ec, std::vector* out) { const EC_GROUP* group = EC_KEY_get0_group(ec); const BIGNUM* order = EC_GROUP_get0_order(group); size_t len = BN_num_bytes(order); out->resize(2 * len); if (!BN_bn2bin_padded(out->data(), len, ec_sig->r) || !BN_bn2bin_padded(out->data() + len, len, ec_sig->s)) { return false; } return true; } ECDSA_SIG* RawToECDSA_SIG(EC_KEY* ec, base::StringPiece sig) { bssl::UniquePtr raw_sig(ECDSA_SIG_new()); const EC_GROUP* group = EC_KEY_get0_group(ec); const BIGNUM* order = EC_GROUP_get0_order(group); size_t group_size = BN_num_bytes(order); if (sig.size() != group_size * 2) return nullptr; const uint8_t* sigp = reinterpret_cast(sig.data()); if (!BN_bin2bn(sigp, group_size, raw_sig->r) || !BN_bin2bn(sigp + group_size, group_size, raw_sig->s)) { return nullptr; } return raw_sig.release(); } } // namespace bool CreateTokenBindingSignature(base::StringPiece ekm, TokenBindingType type, crypto::ECPrivateKey* key, std::vector* out) { bssl::ScopedEVP_MD_CTX digest_ctx; uint8_t tb_type = static_cast(type); uint8_t key_type = static_cast(TB_PARAM_ECDSAP256); uint8_t digest[EVP_MAX_MD_SIZE]; unsigned int digest_len; if (!EVP_DigestInit(digest_ctx.get(), EVP_sha256()) || !EVP_DigestUpdate(digest_ctx.get(), &tb_type, 1) || !EVP_DigestUpdate(digest_ctx.get(), &key_type, 1) || !EVP_DigestUpdate(digest_ctx.get(), ekm.data(), ekm.size()) || !EVP_DigestFinal_ex(digest_ctx.get(), digest, &digest_len)) { return false; } EC_KEY* ec_key = EVP_PKEY_get0_EC_KEY(key->key()); if (!ec_key) return false; bssl::UniquePtr sig(ECDSA_do_sign(digest, digest_len, ec_key)); if (!sig) return false; return ECDSA_SIGToRaw(sig.get(), ec_key, out); } Error BuildTokenBindingMessageFromTokenBindings( const std::vector& token_bindings, std::string* out) { CBB tb_message, child; if (!CBB_init(&tb_message, 0) || !CBB_add_u16_length_prefixed(&tb_message, &child)) { CBB_cleanup(&tb_message); return ERR_FAILED; } for (const base::StringPiece& token_binding : token_bindings) { if (!CBB_add_bytes(&child, reinterpret_cast(token_binding.data()), token_binding.size())) { CBB_cleanup(&tb_message); return ERR_FAILED; } } uint8_t* out_data; size_t out_len; if (!CBB_finish(&tb_message, &out_data, &out_len)) { CBB_cleanup(&tb_message); return ERR_FAILED; } out->assign(reinterpret_cast(out_data), out_len); OPENSSL_free(out_data); return OK; } Error BuildTokenBinding(TokenBindingType type, crypto::ECPrivateKey* key, const std::vector& signed_ekm, std::string* out) { uint8_t* out_data; size_t out_len; CBB token_binding; if (!CBB_init(&token_binding, 0) || !CBB_add_u8(&token_binding, static_cast(type)) || !BuildTokenBindingID(key, &token_binding) || !CBB_add_u16(&token_binding, signed_ekm.size()) || !CBB_add_bytes(&token_binding, signed_ekm.data(), signed_ekm.size()) || // 0-length extensions !CBB_add_u16(&token_binding, 0) || !CBB_finish(&token_binding, &out_data, &out_len)) { CBB_cleanup(&token_binding); return ERR_FAILED; } out->assign(reinterpret_cast(out_data), out_len); OPENSSL_free(out_data); return OK; } TokenBinding::TokenBinding() {} bool ParseTokenBindingMessage(base::StringPiece token_binding_message, std::vector* token_bindings) { CBS tb_message, tb, public_key, ec_point, signature, extensions; uint8_t tb_type, tb_param; CBS_init(&tb_message, reinterpret_cast(token_binding_message.data()), token_binding_message.size()); if (!CBS_get_u16_length_prefixed(&tb_message, &tb)) return false; while (CBS_len(&tb)) { if (!CBS_get_u8(&tb, &tb_type) || !CBS_get_u8(&tb, &tb_param) || !CBS_get_u16_length_prefixed(&tb, &public_key) || !CBS_get_u8_length_prefixed(&public_key, &ec_point) || CBS_len(&public_key) != 0 || !CBS_get_u16_length_prefixed(&tb, &signature) || !CBS_get_u16_length_prefixed(&tb, &extensions) || tb_param != TB_PARAM_ECDSAP256 || (TokenBindingType(tb_type) != TokenBindingType::PROVIDED && TokenBindingType(tb_type) != TokenBindingType::REFERRED)) { return false; } TokenBinding token_binding; token_binding.type = TokenBindingType(tb_type); token_binding.ec_point = std::string( reinterpret_cast(CBS_data(&ec_point)), CBS_len(&ec_point)); token_binding.signature = std::string(reinterpret_cast(CBS_data(&signature)), CBS_len(&signature)); token_bindings->push_back(token_binding); } return true; } bool VerifyTokenBindingSignature(base::StringPiece ec_point, base::StringPiece signature, TokenBindingType type, base::StringPiece ekm) { if (ec_point.size() != kUncompressedPointLen - 1) return false; uint8_t x9_62_ec_point[kUncompressedPointLen]; x9_62_ec_point[0] = 4; memcpy(x9_62_ec_point + 1, ec_point.data(), kUncompressedPointLen - 1); bssl::UniquePtr key(EC_KEY_new_by_curve_name(NID_X9_62_prime256v1)); EC_KEY* keyp = key.get(); bssl::UniquePtr pub_key(EC_POINT_new(EC_KEY_get0_group(keyp))); if (!EC_POINT_oct2point(EC_KEY_get0_group(keyp), pub_key.get(), x9_62_ec_point, kUncompressedPointLen, nullptr) || !EC_KEY_set_public_key(keyp, pub_key.get())) { return false; } bssl::ScopedEVP_MD_CTX digest_ctx; uint8_t tb_type = static_cast(type); uint8_t key_type = static_cast(TB_PARAM_ECDSAP256); uint8_t digest[EVP_MAX_MD_SIZE]; unsigned int digest_len; if (!EVP_DigestInit(digest_ctx.get(), EVP_sha256()) || !EVP_DigestUpdate(digest_ctx.get(), &tb_type, 1) || !EVP_DigestUpdate(digest_ctx.get(), &key_type, 1) || !EVP_DigestUpdate(digest_ctx.get(), ekm.data(), ekm.size()) || !EVP_DigestFinal_ex(digest_ctx.get(), digest, &digest_len)) { return false; } bssl::UniquePtr sig(RawToECDSA_SIG(keyp, signature)); if (!sig) return false; return !!ECDSA_do_verify(digest, digest_len, sig.get(), keyp); } } // namespace net