|  | // Copyright 2013 The Chromium Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | #include "quic/core/crypto/channel_id.h" | 
|  |  | 
|  | #include <cstdint> | 
|  |  | 
|  | #include "absl/strings/string_view.h" | 
|  | #include "third_party/boringssl/src/include/openssl/bn.h" | 
|  | #include "third_party/boringssl/src/include/openssl/ec.h" | 
|  | #include "third_party/boringssl/src/include/openssl/ecdsa.h" | 
|  | #include "third_party/boringssl/src/include/openssl/nid.h" | 
|  | #include "third_party/boringssl/src/include/openssl/sha.h" | 
|  |  | 
|  | namespace quic { | 
|  |  | 
|  | // static | 
|  | const char ChannelIDVerifier::kContextStr[] = "QUIC ChannelID"; | 
|  | // static | 
|  | const char ChannelIDVerifier::kClientToServerStr[] = "client -> server"; | 
|  |  | 
|  | // static | 
|  | bool ChannelIDVerifier::Verify(absl::string_view key, | 
|  | absl::string_view signed_data, | 
|  | absl::string_view signature) { | 
|  | return VerifyRaw(key, signed_data, signature, true); | 
|  | } | 
|  |  | 
|  | // static | 
|  | bool ChannelIDVerifier::VerifyRaw(absl::string_view key, | 
|  | absl::string_view signed_data, | 
|  | absl::string_view signature, | 
|  | bool is_channel_id_signature) { | 
|  | if (key.size() != 32 * 2 || signature.size() != 32 * 2) { | 
|  | return false; | 
|  | } | 
|  |  | 
|  | bssl::UniquePtr<EC_GROUP> p256( | 
|  | EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1)); | 
|  | if (p256.get() == nullptr) { | 
|  | return false; | 
|  | } | 
|  |  | 
|  | bssl::UniquePtr<BIGNUM> x(BN_new()), y(BN_new()), r(BN_new()), s(BN_new()); | 
|  |  | 
|  | ECDSA_SIG sig; | 
|  | sig.r = r.get(); | 
|  | sig.s = s.get(); | 
|  |  | 
|  | const uint8_t* key_bytes = reinterpret_cast<const uint8_t*>(key.data()); | 
|  | const uint8_t* signature_bytes = | 
|  | reinterpret_cast<const uint8_t*>(signature.data()); | 
|  |  | 
|  | if (BN_bin2bn(key_bytes + 0, 32, x.get()) == nullptr || | 
|  | BN_bin2bn(key_bytes + 32, 32, y.get()) == nullptr || | 
|  | BN_bin2bn(signature_bytes + 0, 32, sig.r) == nullptr || | 
|  | BN_bin2bn(signature_bytes + 32, 32, sig.s) == nullptr) { | 
|  | return false; | 
|  | } | 
|  |  | 
|  | bssl::UniquePtr<EC_POINT> point(EC_POINT_new(p256.get())); | 
|  | if (point.get() == nullptr || | 
|  | !EC_POINT_set_affine_coordinates_GFp(p256.get(), point.get(), x.get(), | 
|  | y.get(), nullptr)) { | 
|  | return false; | 
|  | } | 
|  |  | 
|  | bssl::UniquePtr<EC_KEY> ecdsa_key(EC_KEY_new()); | 
|  | if (ecdsa_key.get() == nullptr || | 
|  | !EC_KEY_set_group(ecdsa_key.get(), p256.get()) || | 
|  | !EC_KEY_set_public_key(ecdsa_key.get(), point.get())) { | 
|  | return false; | 
|  | } | 
|  |  | 
|  | SHA256_CTX sha256; | 
|  | SHA256_Init(&sha256); | 
|  | if (is_channel_id_signature) { | 
|  | SHA256_Update(&sha256, kContextStr, strlen(kContextStr) + 1); | 
|  | SHA256_Update(&sha256, kClientToServerStr, strlen(kClientToServerStr) + 1); | 
|  | } | 
|  | SHA256_Update(&sha256, signed_data.data(), signed_data.size()); | 
|  |  | 
|  | unsigned char digest[SHA256_DIGEST_LENGTH]; | 
|  | SHA256_Final(digest, &sha256); | 
|  |  | 
|  | return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1; | 
|  | } | 
|  |  | 
|  | }  // namespace quic |