| 1 | // Copyright (c) 2018, Yubico AB | |
| 2 | // All rights reserved. | |
| 3 | // | |
| 4 | // Redistribution and use in source and binary forms, with or without | |
| 5 | // modification, are permitted provided that the following conditions are met: | |
| 6 | // | |
| 7 | // 1. Redistributions of source code must retain the above copyright notice, this | |
| 8 | // list of conditions and the following disclaimer. | |
| 9 | // | |
| 10 | // 2. Redistributions in binary form must reproduce the above copyright notice, | |
| 11 | // this list of conditions and the following disclaimer in the documentation | |
| 12 | // and/or other materials provided with the distribution. | |
| 13 | // | |
| 14 | // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | |
| 15 | // AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 16 | // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |
| 17 | // DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE | |
| 18 | // FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
| 19 | // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR | |
| 20 | // SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER | |
| 21 | // CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | |
| 22 | // OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | |
| 23 | // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
| 24 | ||
| 25 | package com.yubico.webauthn; | |
| 26 | ||
| 27 | import com.yubico.internal.util.ExceptionUtil; | |
| 28 | import com.yubico.webauthn.data.AttestationObject; | |
| 29 | import com.yubico.webauthn.data.AttestationType; | |
| 30 | import com.yubico.webauthn.data.ByteArray; | |
| 31 | import java.security.PublicKey; | |
| 32 | import java.security.cert.CertificateException; | |
| 33 | import java.security.cert.X509Certificate; | |
| 34 | import java.util.Optional; | |
| 35 | import lombok.extern.slf4j.Slf4j; | |
| 36 | ||
| 37 | @Slf4j | |
| 38 | final class AppleAttestationStatementVerifier | |
| 39 | implements AttestationStatementVerifier, X5cAttestationStatementVerifier { | |
| 40 | ||
| 41 | private static final String NONCE_EXTENSION_OID = "1.2.840.113635.100.8.2"; | |
| 42 | ||
| 43 | @Override | |
| 44 | public AttestationType getAttestationType(AttestationObject attestation) { | |
| 45 |
1
1. getAttestationType : replaced return value with null for com/yubico/webauthn/AppleAttestationStatementVerifier::getAttestationType → KILLED |
return AttestationType.ANONYMIZATION_CA; |
| 46 | } | |
| 47 | ||
| 48 | @Override | |
| 49 | public boolean verifyAttestationSignature( | |
| 50 | AttestationObject attestationObject, ByteArray clientDataJsonHash) { | |
| 51 | final Optional<X509Certificate> attestationCert; | |
| 52 | try { | |
| 53 | attestationCert = getX5cAttestationCertificate(attestationObject); | |
| 54 | } catch (CertificateException e) { | |
| 55 | throw ExceptionUtil.wrapAndLog( | |
| 56 | log, | |
| 57 | String.format( | |
| 58 | "Failed to parse X.509 certificate from attestation object: %s", attestationObject), | |
| 59 | e); | |
| 60 | } | |
| 61 | ||
| 62 |
2
1. verifyAttestationSignature : replaced boolean return with true for com/yubico/webauthn/AppleAttestationStatementVerifier::verifyAttestationSignature → SURVIVED 2. verifyAttestationSignature : replaced boolean return with false for com/yubico/webauthn/AppleAttestationStatementVerifier::verifyAttestationSignature → KILLED |
return attestationCert |
| 63 | .map( | |
| 64 | attestationCertificate -> { | |
| 65 | final ByteArray nonceToHash = | |
| 66 | attestationObject.getAuthenticatorData().getBytes().concat(clientDataJsonHash); | |
| 67 | ||
| 68 | final ByteArray nonce = Crypto.sha256(nonceToHash); | |
| 69 | ||
| 70 | byte[] nonceExtension = attestationCertificate.getExtensionValue(NONCE_EXTENSION_OID); | |
| 71 |
1
1. lambda$verifyAttestationSignature$0 : negated conditional → KILLED |
if (nonceExtension == null) { |
| 72 | throw new IllegalArgumentException( | |
| 73 | "Apple anonymous attestation certificate must contain extension OID: " | |
| 74 | + NONCE_EXTENSION_OID); | |
| 75 | } | |
| 76 | ||
| 77 | // X.509 extension values is a DER octet string: 0x0426 | |
| 78 | // Then the extension contains a 1-element sequence: 0x3024 | |
| 79 | // The element has context-specific tag "[1]": 0xa122 | |
| 80 | // Then the sequence contains a 32-byte octet string: 0x0420 | |
| 81 | final ByteArray expectedExtensionValue = | |
| 82 | new ByteArray( | |
| 83 | new byte[] { | |
| 84 | 0x04, 0x26, 0x30, 0x24, (-128) + (0xa1 - 128), 0x22, 0x04, 0x20 | |
| 85 | }) | |
| 86 | .concat(nonce); | |
| 87 | ||
| 88 |
1
1. lambda$verifyAttestationSignature$0 : negated conditional → KILLED |
if (!expectedExtensionValue.equals(new ByteArray(nonceExtension))) { |
| 89 | throw new IllegalArgumentException( | |
| 90 | String.format( | |
| 91 | "Apple anonymous attestation certificate extension %s must equal nonceToHash. Expected: %s, was: %s", | |
| 92 | NONCE_EXTENSION_OID, | |
| 93 | expectedExtensionValue, | |
| 94 | new ByteArray(nonceExtension))); | |
| 95 | } | |
| 96 | ||
| 97 | final PublicKey credentialPublicKey; | |
| 98 | try { | |
| 99 | credentialPublicKey = | |
| 100 | WebAuthnCodecs.importCosePublicKey( | |
| 101 | attestationObject | |
| 102 | .getAuthenticatorData() | |
| 103 | .getAttestedCredentialData() | |
| 104 | .get() | |
| 105 | .getCredentialPublicKey()); | |
| 106 | } catch (Exception e) { | |
| 107 | throw ExceptionUtil.wrapAndLog(log, "Failed to import credential public key", e); | |
| 108 | } | |
| 109 | ||
| 110 | final PublicKey certPublicKey = attestationCertificate.getPublicKey(); | |
| 111 | ||
| 112 |
1
1. lambda$verifyAttestationSignature$0 : negated conditional → KILLED |
if (!credentialPublicKey.equals(certPublicKey)) { |
| 113 | throw new IllegalArgumentException( | |
| 114 | String.format( | |
| 115 | "Apple anonymous attestation certificate subject public key must equal credential public key. Expected: %s, was: %s", | |
| 116 | credentialPublicKey, certPublicKey)); | |
| 117 | } | |
| 118 | ||
| 119 |
1
1. lambda$verifyAttestationSignature$0 : replaced Boolean return with False for com/yubico/webauthn/AppleAttestationStatementVerifier::lambda$verifyAttestationSignature$0 → KILLED |
return true; |
| 120 | }) | |
| 121 | .orElseThrow( | |
| 122 | () -> | |
| 123 |
1
1. lambda$verifyAttestationSignature$1 : replaced return value with null for com/yubico/webauthn/AppleAttestationStatementVerifier::lambda$verifyAttestationSignature$1 → NO_COVERAGE |
new IllegalArgumentException( |
| 124 | "Failed to parse attestation certificate from \"apple\" attestation statement.")); | |
| 125 | } | |
| 126 | } | |
Mutations | ||
| 45 |
1.1 |
|
| 62 |
1.1 2.2 |
|
| 71 |
1.1 |
|
| 88 |
1.1 |
|
| 112 |
1.1 |
|
| 119 |
1.1 |
|
| 123 |
1.1 |