Index: base/crypto/rsa_private_key_nss.cc |
diff --git a/base/crypto/rsa_private_key_nss.cc b/base/crypto/rsa_private_key_nss.cc |
index f9f9a73d382a5e69869a51f450e41aa6492c4372..7e10b364d0a75a9b80d84643600e73c9209568d8 100644 |
--- a/base/crypto/rsa_private_key_nss.cc |
+++ b/base/crypto/rsa_private_key_nss.cc |
@@ -20,76 +20,9 @@ |
// rsa_private_key_win.cc or using NSS's ASN.1 encoder. |
namespace { |
-// ASN.1 encoding of the AlgorithmIdentifier from PKCS #8. |
-const uint8 kRsaAlgorithmIdentifier[] = { |
- 0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, |
- 0x05, 0x00 |
-}; |
- |
-// ASN.1 tags for some types we use. |
-const uint8 kSequenceTag = 0x30; |
-const uint8 kIntegerTag = 0x02; |
-const uint8 kNullTag = 0x05; |
-const uint8 kOctetStringTag = 0x04; |
- |
-static void PrependBytesInOrder(uint8* val, int start, int num_bytes, |
- std::list<uint8>* data) { |
- while(num_bytes > start) { |
- --num_bytes; |
- data->push_front(val[num_bytes]); |
- } |
-} |
- |
-// Helper to prepend an ASN.1 length field. |
-static void PrependLength(size_t size, std::list<uint8>* data) { |
- // The high bit is used to indicate whether additional octets are needed to |
- // represent the length. |
- if (size < 0x80) { |
- data->push_front(static_cast<uint8>(size)); |
- } else { |
- uint8 num_bytes = 0; |
- while (size > 0) { |
- data->push_front(static_cast<uint8>(size & 0xFF)); |
- size >>= 8; |
- num_bytes++; |
- } |
- CHECK(num_bytes <= 4); |
- data->push_front(0x80 | num_bytes); |
- } |
-} |
- |
-// Helper to prepend an ASN.1 type header. |
-static void PrependTypeHeaderAndLength(uint8 type, uint32 length, |
- std::list<uint8>* output) { |
- PrependLength(length, output); |
- output->push_front(type); |
-} |
- |
-// Helper to prepend an ASN.1 integer. |
-static void PrependInteger(uint8* val, int num_bytes, std::list<uint8>* data) { |
- // ASN.1 integers are unpadded byte arrays, so skip any null padding bytes |
- // from the most-significant end of the integer. |
- int start = 0; |
- while (start < (num_bytes - 1) && val[start] == 0x00) |
- start++; |
- |
- PrependBytesInOrder(val, start, num_bytes, data); |
- |
- // ASN.1 integers are signed. To encode a positive integer whose sign bit |
- // (the most significant bit) would otherwise be set and make the number |
- // negative, ASN.1 requires a leading null byte to force the integer to be |
- // positive. |
- if ((val[start] & 0x80) != 0) { |
- data->push_front(0x00); |
- num_bytes++; |
- } |
- |
- PrependTypeHeaderAndLength(kIntegerTag, num_bytes, data); |
-} |
- |
-static bool ReadAttributeAndPrependInteger(SECKEYPrivateKey* key, |
- CK_ATTRIBUTE_TYPE type, |
- std::list<uint8>* output) { |
+static bool ReadAttribute(SECKEYPrivateKey* key, |
+ CK_ATTRIBUTE_TYPE type, |
+ std::vector<uint8>* output) { |
SECItem item; |
SECStatus rv; |
rv = PK11_ReadRawAttribute(PK11_TypePrivKey, key, type, &item); |
@@ -98,14 +31,13 @@ static bool ReadAttributeAndPrependInteger(SECKEYPrivateKey* key, |
return false; |
} |
- PrependInteger(item.data, item.len, output); |
+ output->assign(item.data, item.data + item.len); |
SECITEM_FreeItem(&item, PR_FALSE); |
return true; |
} |
} // namespace |
- |
namespace base { |
// static |
@@ -170,42 +102,25 @@ RSAPrivateKey::~RSAPrivateKey() { |
} |
bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) { |
- std::list<uint8> content; |
- |
- // Version (always zero) |
- uint8 version = 0; |
- |
- // Manually read the component attributes of the private key and build up the |
- // output in reverse order to prevent having to do copies to figure out the |
- // length. |
- if (!ReadAttributeAndPrependInteger(key_, CKA_COEFFICIENT, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_EXPONENT_2, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_EXPONENT_1, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_PRIME_2, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_PRIME_1, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_PRIVATE_EXPONENT, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_PUBLIC_EXPONENT, &content) || |
- !ReadAttributeAndPrependInteger(key_, CKA_MODULUS, &content)) { |
+ PrivateKeyInfoCodec private_key_info(true); |
+ |
+ // Manually read the component attributes of the private key and build up |
+ // the PrivateKeyInfo. |
+ if (!ReadAttribute(key_, CKA_MODULUS, private_key_info.modulus()) || |
+ !ReadAttribute(key_, CKA_PUBLIC_EXPONENT, |
+ private_key_info.public_exponent()) || |
+ !ReadAttribute(key_, CKA_PRIVATE_EXPONENT, |
+ private_key_info.private_exponent()) || |
+ !ReadAttribute(key_, CKA_PRIME_1, private_key_info.prime1()) || |
+ !ReadAttribute(key_, CKA_PRIME_2, private_key_info.prime2()) || |
+ !ReadAttribute(key_, CKA_EXPONENT_1, private_key_info.exponent1()) || |
+ !ReadAttribute(key_, CKA_EXPONENT_2, private_key_info.exponent2()) || |
+ !ReadAttribute(key_, CKA_COEFFICIENT, private_key_info.coefficient())) { |
NOTREACHED(); |
return false; |
} |
- PrependInteger(&version, 1, &content); |
- PrependTypeHeaderAndLength(kSequenceTag, content.size(), &content); |
- PrependTypeHeaderAndLength(kOctetStringTag, content.size(), &content); |
- // RSA algorithm OID |
- for (size_t i = sizeof(kRsaAlgorithmIdentifier); i > 0; --i) |
- content.push_front(kRsaAlgorithmIdentifier[i - 1]); |
- |
- PrependInteger(&version, 1, &content); |
- PrependTypeHeaderAndLength(kSequenceTag, content.size(), &content); |
- |
- // Copy everying into the output. |
- output->reserve(content.size()); |
- for (std::list<uint8>::iterator i = content.begin(); i != content.end(); ++i) |
- output->push_back(*i); |
- |
- return true; |
+ return private_key_info.Export(output); |
} |
bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) { |