You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
361 lines
12 KiB
361 lines
12 KiB
//+-------------------------------------------------------------------------
|
|
// Microsoft Windows
|
|
//
|
|
// Copyright (C) Microsoft Corporation, 2001 - 2001
|
|
//
|
|
// File: verdata.cpp
|
|
//
|
|
// Contents: Minimal Cryptographic functions to verify PKCS #7 Signed Data
|
|
// message
|
|
//
|
|
//
|
|
// Functions: MinCryptVerifySignedData
|
|
//
|
|
// History: 19-Jan-01 philh created
|
|
//--------------------------------------------------------------------------
|
|
|
|
#include "global.hxx"
|
|
|
|
#define MAX_SIGNED_DATA_CERT_CNT 10
|
|
#define MAX_SIGNED_DATA_AUTH_ATTR_CNT 10
|
|
|
|
// #define szOID_RSA_signedData "1.2.840.113549.1.7.2"
|
|
const BYTE rgbOID_RSA_signedData[] =
|
|
{0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02};
|
|
|
|
// #define szOID_RSA_messageDigest "1.2.840.113549.1.9.4"
|
|
const BYTE rgbOID_RSA_messageDigest[] =
|
|
{0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x09, 0x04};
|
|
const CRYPT_DER_BLOB RSA_messageDigestEncodedOIDBlob = {
|
|
sizeof(rgbOID_RSA_messageDigest),
|
|
(BYTE *) rgbOID_RSA_messageDigest
|
|
};
|
|
|
|
PCRYPT_DER_BLOB
|
|
WINAPI
|
|
I_MinCryptFindSignerCertificateByIssuerAndSerialNumber(
|
|
IN PCRYPT_DER_BLOB pIssuerNameValueBlob,
|
|
IN PCRYPT_DER_BLOB pIssuerSerialNumberContentBlob,
|
|
IN DWORD cCert,
|
|
IN CRYPT_DER_BLOB rgrgCertBlob[][MINASN1_CERT_BLOB_CNT]
|
|
)
|
|
{
|
|
DWORD i;
|
|
const BYTE *pbName = pIssuerNameValueBlob->pbData;
|
|
DWORD cbName = pIssuerNameValueBlob->cbData;
|
|
const BYTE *pbSerial = pIssuerSerialNumberContentBlob->pbData;
|
|
DWORD cbSerial = pIssuerSerialNumberContentBlob->cbData;
|
|
|
|
if (0 == cbName || 0 == cbSerial)
|
|
return NULL;
|
|
|
|
for (i = 0; i < cCert; i++) {
|
|
PCRYPT_DER_BLOB rgCert = rgrgCertBlob[i];
|
|
|
|
if (cbName == rgCert[MINASN1_CERT_ISSUER_IDX].cbData &&
|
|
cbSerial == rgCert[MINASN1_CERT_SERIAL_NUMBER_IDX].cbData
|
|
&&
|
|
0 == memcmp(pbSerial,
|
|
rgCert[MINASN1_CERT_SERIAL_NUMBER_IDX].pbData,
|
|
cbSerial)
|
|
&&
|
|
0 == memcmp(pbName,
|
|
rgCert[MINASN1_CERT_ISSUER_IDX].pbData,
|
|
cbName))
|
|
return rgCert;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Verifies that the input hash matches the
|
|
// szOID_RSA_messageDigest ("1.2.840.113549.1.9.4") authenticated attribute.
|
|
//
|
|
// Replaces the input hash with a hash of the authenticated attributes.
|
|
LONG
|
|
WINAPI
|
|
I_MinCryptVerifySignerAuthenticatedAttributes(
|
|
IN ALG_ID HashAlgId,
|
|
IN OUT BYTE rgbHash[MINCRYPT_MAX_HASH_LEN],
|
|
IN OUT DWORD *pcbHash,
|
|
IN PCRYPT_DER_BLOB pAttrsValueBlob
|
|
)
|
|
{
|
|
LONG lErr;
|
|
DWORD cAttr;
|
|
CRYPT_DER_BLOB rgrgAttrBlob[MAX_SIGNED_DATA_AUTH_ATTR_CNT][MINASN1_ATTR_BLOB_CNT];
|
|
PCRYPT_DER_BLOB rgDigestAuthAttr;
|
|
|
|
const BYTE *pbDigestAuthValue;
|
|
DWORD cbDigestAuthValue;
|
|
|
|
CRYPT_DER_BLOB rgAuthHashBlob[2];
|
|
const BYTE bTagSet = MINASN1_TAG_SET;
|
|
|
|
// Parse the authenticated attributes
|
|
cAttr = MAX_SIGNED_DATA_AUTH_ATTR_CNT;
|
|
if (0 >= MinAsn1ParseAttributes(
|
|
pAttrsValueBlob,
|
|
&cAttr,
|
|
rgrgAttrBlob) || 0 == cAttr)
|
|
goto MissingAuthAttrs;
|
|
|
|
// Find the szOID_RSA_messageDigest ("1.2.840.113549.1.9.4")
|
|
// attribute value
|
|
rgDigestAuthAttr = MinAsn1FindAttribute(
|
|
(PCRYPT_DER_BLOB) &RSA_messageDigestEncodedOIDBlob,
|
|
cAttr,
|
|
rgrgAttrBlob
|
|
);
|
|
if (NULL == rgDigestAuthAttr)
|
|
goto MissingDigestAuthAttr;
|
|
|
|
// Skip past the digest's outer OCTET tag and length octets
|
|
if (0 >= MinAsn1ExtractContent(
|
|
rgDigestAuthAttr[MINASN1_ATTR_VALUE_IDX].pbData,
|
|
rgDigestAuthAttr[MINASN1_ATTR_VALUE_IDX].cbData,
|
|
&cbDigestAuthValue,
|
|
&pbDigestAuthValue
|
|
))
|
|
goto InvalidDigestAuthAttr;
|
|
|
|
// Check that the authenticated digest bytes match the input
|
|
// content hash.
|
|
if (*pcbHash != cbDigestAuthValue ||
|
|
0 != memcmp(rgbHash, pbDigestAuthValue, cbDigestAuthValue))
|
|
goto InvalidContentHash;
|
|
|
|
// Hash the authenticated attributes. This hash will be compared against
|
|
// the decrypted signature.
|
|
|
|
// Note, the authenticated attributes "[0] Implicit" tag needs to be changed
|
|
// to a "SET OF" tag before doing the hash.
|
|
rgAuthHashBlob[0].pbData = (BYTE *) &bTagSet;
|
|
rgAuthHashBlob[0].cbData = 1;
|
|
assert(0 < pAttrsValueBlob->cbData);
|
|
rgAuthHashBlob[1].pbData = pAttrsValueBlob->pbData + 1;
|
|
rgAuthHashBlob[1].cbData = pAttrsValueBlob->cbData - 1;
|
|
|
|
lErr = MinCryptHashMemory(
|
|
HashAlgId,
|
|
2, // cBlob
|
|
rgAuthHashBlob,
|
|
rgbHash,
|
|
pcbHash
|
|
);
|
|
|
|
CommonReturn:
|
|
return lErr;
|
|
|
|
MissingAuthAttrs:
|
|
MissingDigestAuthAttr:
|
|
InvalidDigestAuthAttr:
|
|
lErr = CRYPT_E_AUTH_ATTR_MISSING;
|
|
goto CommonReturn;
|
|
|
|
InvalidContentHash:
|
|
lErr = CRYPT_E_HASH_VALUE;
|
|
goto CommonReturn;
|
|
}
|
|
|
|
|
|
//+-------------------------------------------------------------------------
|
|
// Function: MinCryptVerifySignedData
|
|
//
|
|
// Verifies an ASN.1 encoded PKCS #7 Signed Data Message.
|
|
//
|
|
// Assumes the PKCS #7 message is definite length encoded.
|
|
// Assumes PKCS #7 version 1.5, ie, not the newer CMS version.
|
|
// We only look at the first signer.
|
|
//
|
|
// The Signed Data message is parsed. Its signature is verified. Its
|
|
// signer certificate chain is verified to a baked in root public key.
|
|
//
|
|
// If the Signed Data was successfully verified, ERROR_SUCCESS is returned.
|
|
// Otherwise, a nonzero error code is returned.
|
|
//
|
|
// Here are some interesting errors that can be returned:
|
|
// CRYPT_E_BAD_MSG - unable to ASN1 parse as a signed data message
|
|
// ERROR_NO_DATA - the content is empty
|
|
// CRYPT_E_NO_SIGNER - not signed or unable to find signer cert
|
|
// CRYPT_E_UNKNOWN_ALGO- unknown MD5 or SHA1 ASN.1 algorithm identifier
|
|
// CERT_E_UNTRUSTEDROOT- the signer chain's root wasn't baked in
|
|
// CERT_E_CHAINING - unable to build signer chain to a root
|
|
// CRYPT_E_AUTH_ATTR_MISSING - missing digest authenticated attribute
|
|
// CRYPT_E_HASH_VALUE - content hash != authenticated digest attribute
|
|
// NTE_BAD_ALGID - unsupported hash or public key algorithm
|
|
// NTE_BAD_PUBLIC_KEY - not a valid RSA public key
|
|
// NTE_BAD_SIGNATURE - bad PKCS #7 or signer chain signature
|
|
//
|
|
// The rgVerSignedDataBlob[] is updated with pointer to and length of the
|
|
// following fields in the encoded PKCS #7 message.
|
|
//--------------------------------------------------------------------------
|
|
LONG
|
|
WINAPI
|
|
MinCryptVerifySignedData(
|
|
IN const BYTE *pbEncoded,
|
|
IN DWORD cbEncoded,
|
|
OUT CRYPT_DER_BLOB rgVerSignedDataBlob[MINCRYPT_VER_SIGNED_DATA_BLOB_CNT]
|
|
)
|
|
{
|
|
LONG lErr;
|
|
CRYPT_DER_BLOB rgParseSignedDataBlob[MINASN1_SIGNED_DATA_BLOB_CNT];
|
|
DWORD cCert;
|
|
CRYPT_DER_BLOB rgrgCertBlob[MAX_SIGNED_DATA_CERT_CNT][MINASN1_CERT_BLOB_CNT];
|
|
PCRYPT_DER_BLOB rgSignerCert;
|
|
ALG_ID HashAlgId;
|
|
BYTE rgbHash[MINCRYPT_MAX_HASH_LEN];
|
|
DWORD cbHash;
|
|
CRYPT_DER_BLOB ContentBlob;
|
|
|
|
memset(rgVerSignedDataBlob, 0,
|
|
sizeof(CRYPT_DER_BLOB) * MINCRYPT_VER_SIGNED_DATA_BLOB_CNT);
|
|
|
|
// Parse the message and verify that it's ASN.1 PKCS #7 SignedData
|
|
if (0 >= MinAsn1ParseSignedData(
|
|
pbEncoded,
|
|
cbEncoded,
|
|
rgParseSignedDataBlob
|
|
))
|
|
goto ParseSignedDataError;
|
|
|
|
// Only support szOID_RSA_signedData - "1.2.840.113549.1.7.2"
|
|
if (sizeof(rgbOID_RSA_signedData) !=
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_OUTER_OID_IDX].cbData
|
|
||
|
|
0 != memcmp(rgbOID_RSA_signedData,
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_OUTER_OID_IDX].pbData,
|
|
sizeof(rgbOID_RSA_signedData)))
|
|
goto NotSignedDataOID;
|
|
|
|
// Verify this isn't an empty SignedData message
|
|
if (0 == rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CONTENT_OID_IDX].cbData
|
|
||
|
|
0 == rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CONTENT_DATA_IDX].cbData)
|
|
goto NoContent;
|
|
|
|
rgVerSignedDataBlob[MINCRYPT_VER_SIGNED_DATA_CONTENT_OID_IDX] =
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CONTENT_OID_IDX];
|
|
rgVerSignedDataBlob[MINCRYPT_VER_SIGNED_DATA_CONTENT_DATA_IDX] =
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CONTENT_DATA_IDX];
|
|
|
|
// Check that the message has a signer
|
|
if (0 == rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_ENCODED_IDX].cbData)
|
|
goto NoSigner;
|
|
|
|
// Get the message's bag of certs
|
|
cCert = MAX_SIGNED_DATA_CERT_CNT;
|
|
if (0 >= MinAsn1ParseSignedDataCertificates(
|
|
&rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CERTS_IDX],
|
|
&cCert,
|
|
rgrgCertBlob
|
|
) || 0 == cCert)
|
|
goto NoCerts;
|
|
|
|
// Get the signer certificate
|
|
rgSignerCert = I_MinCryptFindSignerCertificateByIssuerAndSerialNumber(
|
|
&rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_ISSUER_IDX],
|
|
&rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_SERIAL_NUMBER_IDX],
|
|
cCert,
|
|
rgrgCertBlob
|
|
);
|
|
if (NULL == rgSignerCert)
|
|
goto NoSignerCert;
|
|
|
|
rgVerSignedDataBlob[MINCRYPT_VER_SIGNED_DATA_SIGNER_CERT_IDX] =
|
|
rgSignerCert[MINASN1_CERT_ENCODED_IDX];
|
|
rgVerSignedDataBlob[MINCRYPT_VER_SIGNED_DATA_AUTH_ATTRS_IDX] =
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_AUTH_ATTRS_IDX];
|
|
rgVerSignedDataBlob[MINCRYPT_VER_SIGNED_DATA_UNAUTH_ATTRS_IDX] =
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_UNAUTH_ATTRS_IDX];
|
|
|
|
|
|
// Verify the signer certificate up to a baked in, trusted root
|
|
lErr = MinCryptVerifyCertificate(
|
|
rgSignerCert,
|
|
cCert,
|
|
rgrgCertBlob
|
|
);
|
|
if (ERROR_SUCCESS != lErr)
|
|
goto ErrorReturn;
|
|
|
|
|
|
// Hash the message's content octets according to the signer's hash
|
|
// algorithm
|
|
HashAlgId = MinCryptDecodeHashAlgorithmIdentifier(
|
|
&rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_DIGEST_ALGID_IDX]
|
|
);
|
|
if (0 == HashAlgId)
|
|
goto UnknownHashAlgId;
|
|
|
|
// Note, the content's tag and length octets aren't included in the hash
|
|
if (0 >= MinAsn1ExtractContent(
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CONTENT_DATA_IDX].pbData,
|
|
rgParseSignedDataBlob[MINASN1_SIGNED_DATA_CONTENT_DATA_IDX].cbData,
|
|
&ContentBlob.cbData,
|
|
(const BYTE **) &ContentBlob.pbData
|
|
))
|
|
goto InvalidContent;
|
|
|
|
lErr = MinCryptHashMemory(
|
|
HashAlgId,
|
|
1, // cBlob
|
|
&ContentBlob,
|
|
rgbHash,
|
|
&cbHash
|
|
);
|
|
if (ERROR_SUCCESS != lErr)
|
|
goto ErrorReturn;
|
|
|
|
// If we have authenticated attributes, then, need to compare the
|
|
// above hash with the szOID_RSA_messageDigest ("1.2.840.113549.1.9.4")
|
|
// attribute value. After a successful comparison, the above hash
|
|
// is replaced with a hash of the authenticated attributes.
|
|
if (0 != rgParseSignedDataBlob[
|
|
MINASN1_SIGNED_DATA_SIGNER_INFO_AUTH_ATTRS_IDX].cbData) {
|
|
lErr = I_MinCryptVerifySignerAuthenticatedAttributes(
|
|
HashAlgId,
|
|
rgbHash,
|
|
&cbHash,
|
|
&rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_AUTH_ATTRS_IDX]
|
|
);
|
|
if (ERROR_SUCCESS != lErr)
|
|
goto ErrorReturn;
|
|
}
|
|
|
|
// Verify the signature using either the authenticated attributes hash
|
|
// or the content hash
|
|
lErr = MinCryptVerifySignedHash(
|
|
HashAlgId,
|
|
rgbHash,
|
|
cbHash,
|
|
&rgParseSignedDataBlob[MINASN1_SIGNED_DATA_SIGNER_INFO_ENCYRPT_DIGEST_IDX],
|
|
&rgSignerCert[MINASN1_CERT_PUBKEY_INFO_IDX]
|
|
);
|
|
|
|
|
|
ErrorReturn:
|
|
CommonReturn:
|
|
return lErr;
|
|
|
|
ParseSignedDataError:
|
|
NotSignedDataOID:
|
|
InvalidContent:
|
|
lErr = CRYPT_E_BAD_MSG;
|
|
goto CommonReturn;
|
|
|
|
NoContent:
|
|
lErr = ERROR_NO_DATA;
|
|
goto CommonReturn;
|
|
|
|
NoSigner:
|
|
NoCerts:
|
|
NoSignerCert:
|
|
lErr = CRYPT_E_NO_SIGNER;
|
|
goto CommonReturn;
|
|
|
|
UnknownHashAlgId:
|
|
lErr = CRYPT_E_UNKNOWN_ALGO;
|
|
goto CommonReturn;
|
|
}
|
|
|