OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/crypto/rsa_private_key.h" | |
6 | |
7 #include <list> | |
8 | |
9 #include "base/logging.h" | |
10 #include "base/memory/scoped_ptr.h" | |
11 #include "base/string_util.h" | |
12 | |
13 namespace { | |
14 // Helper for error handling during key import. | |
15 #define READ_ASSERT(truth) \ | |
16 if (!(truth)) { \ | |
17 NOTREACHED(); \ | |
18 return false; \ | |
19 } | |
20 } // namespace | |
21 | |
22 namespace base { | |
23 | |
24 // static | |
25 RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) { | |
26 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); | |
27 if (!result->InitProvider()) | |
28 return NULL; | |
29 | |
30 DWORD flags = CRYPT_EXPORTABLE; | |
31 | |
32 // The size is encoded as the upper 16 bits of the flags. :: sigh ::. | |
33 flags |= (num_bits << 16); | |
34 if (!CryptGenKey(result->provider_, CALG_RSA_SIGN, flags, | |
35 result->key_.receive())) | |
36 return NULL; | |
37 | |
38 return result.release(); | |
39 } | |
40 | |
41 // static | |
42 RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) { | |
43 NOTIMPLEMENTED(); | |
44 return NULL; | |
45 } | |
46 | |
47 // static | |
48 RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo( | |
49 const std::vector<uint8>& input) { | |
50 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); | |
51 if (!result->InitProvider()) | |
52 return NULL; | |
53 | |
54 PrivateKeyInfoCodec pki(false); // Little-Endian | |
55 pki.Import(input); | |
56 | |
57 int blob_size = sizeof(PUBLICKEYSTRUC) + | |
58 sizeof(RSAPUBKEY) + | |
59 pki.modulus()->size() + | |
60 pki.prime1()->size() + | |
61 pki.prime2()->size() + | |
62 pki.exponent1()->size() + | |
63 pki.exponent2()->size() + | |
64 pki.coefficient()->size() + | |
65 pki.private_exponent()->size(); | |
66 scoped_array<BYTE> blob(new BYTE[blob_size]); | |
67 | |
68 uint8* dest = blob.get(); | |
69 PUBLICKEYSTRUC* public_key_struc = reinterpret_cast<PUBLICKEYSTRUC*>(dest); | |
70 public_key_struc->bType = PRIVATEKEYBLOB; | |
71 public_key_struc->bVersion = 0x02; | |
72 public_key_struc->reserved = 0; | |
73 public_key_struc->aiKeyAlg = CALG_RSA_SIGN; | |
74 dest += sizeof(PUBLICKEYSTRUC); | |
75 | |
76 RSAPUBKEY* rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(dest); | |
77 rsa_pub_key->magic = 0x32415352; | |
78 rsa_pub_key->bitlen = pki.modulus()->size() * 8; | |
79 int public_exponent_int = 0; | |
80 for (size_t i = pki.public_exponent()->size(); i > 0; --i) { | |
81 public_exponent_int <<= 8; | |
82 public_exponent_int |= (*pki.public_exponent())[i - 1]; | |
83 } | |
84 rsa_pub_key->pubexp = public_exponent_int; | |
85 dest += sizeof(RSAPUBKEY); | |
86 | |
87 memcpy(dest, &pki.modulus()->front(), pki.modulus()->size()); | |
88 dest += pki.modulus()->size(); | |
89 memcpy(dest, &pki.prime1()->front(), pki.prime1()->size()); | |
90 dest += pki.prime1()->size(); | |
91 memcpy(dest, &pki.prime2()->front(), pki.prime2()->size()); | |
92 dest += pki.prime2()->size(); | |
93 memcpy(dest, &pki.exponent1()->front(), pki.exponent1()->size()); | |
94 dest += pki.exponent1()->size(); | |
95 memcpy(dest, &pki.exponent2()->front(), pki.exponent2()->size()); | |
96 dest += pki.exponent2()->size(); | |
97 memcpy(dest, &pki.coefficient()->front(), pki.coefficient()->size()); | |
98 dest += pki.coefficient()->size(); | |
99 memcpy(dest, &pki.private_exponent()->front(), | |
100 pki.private_exponent()->size()); | |
101 dest += pki.private_exponent()->size(); | |
102 | |
103 READ_ASSERT(dest == blob.get() + blob_size); | |
104 if (!CryptImportKey(result->provider_, | |
105 reinterpret_cast<uint8*>(public_key_struc), blob_size, 0, | |
106 CRYPT_EXPORTABLE, result->key_.receive())) | |
107 return NULL; | |
108 | |
109 return result.release(); | |
110 } | |
111 | |
112 // static | |
113 RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo( | |
114 const std::vector<uint8>& input) { | |
115 NOTIMPLEMENTED(); | |
116 return NULL; | |
117 } | |
118 | |
119 // static | |
120 RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo( | |
121 const std::vector<uint8>& input) { | |
122 NOTIMPLEMENTED(); | |
123 return NULL; | |
124 } | |
125 | |
126 RSAPrivateKey::RSAPrivateKey() : provider_(NULL), key_(NULL) {} | |
127 | |
128 RSAPrivateKey::~RSAPrivateKey() {} | |
129 | |
130 bool RSAPrivateKey::InitProvider() { | |
131 return FALSE != CryptAcquireContext(provider_.receive(), NULL, NULL, | |
132 PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); | |
133 } | |
134 | |
135 bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) { | |
136 // Export the key | |
137 DWORD blob_length = 0; | |
138 if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, NULL, &blob_length)) { | |
139 NOTREACHED(); | |
140 return false; | |
141 } | |
142 | |
143 scoped_array<uint8> blob(new uint8[blob_length]); | |
144 if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, blob.get(), &blob_length)) { | |
145 NOTREACHED(); | |
146 return false; | |
147 } | |
148 | |
149 uint8* pos = blob.get(); | |
150 PUBLICKEYSTRUC *publickey_struct = reinterpret_cast<PUBLICKEYSTRUC*>(pos); | |
151 pos += sizeof(PUBLICKEYSTRUC); | |
152 | |
153 RSAPUBKEY *rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(pos); | |
154 pos += sizeof(RSAPUBKEY); | |
155 | |
156 int mod_size = rsa_pub_key->bitlen / 8; | |
157 int primes_size = rsa_pub_key->bitlen / 16; | |
158 | |
159 PrivateKeyInfoCodec pki(false); // Little-Endian | |
160 | |
161 pki.modulus()->assign(pos, pos + mod_size); | |
162 pos += mod_size; | |
163 | |
164 pki.prime1()->assign(pos, pos + primes_size); | |
165 pos += primes_size; | |
166 pki.prime2()->assign(pos, pos + primes_size); | |
167 pos += primes_size; | |
168 | |
169 pki.exponent1()->assign(pos, pos + primes_size); | |
170 pos += primes_size; | |
171 pki.exponent2()->assign(pos, pos + primes_size); | |
172 pos += primes_size; | |
173 | |
174 pki.coefficient()->assign(pos, pos + primes_size); | |
175 pos += primes_size; | |
176 | |
177 pki.private_exponent()->assign(pos, pos + mod_size); | |
178 pos += mod_size; | |
179 | |
180 pki.public_exponent()->assign(reinterpret_cast<uint8*>(&rsa_pub_key->pubexp), | |
181 reinterpret_cast<uint8*>(&rsa_pub_key->pubexp) + 4); | |
182 | |
183 CHECK_EQ(pos - blob_length, reinterpret_cast<BYTE*>(publickey_struct)); | |
184 | |
185 return pki.Export(output); | |
186 } | |
187 | |
188 bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) { | |
189 DWORD key_info_len; | |
190 if (!CryptExportPublicKeyInfo( | |
191 provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, | |
192 NULL, &key_info_len)) { | |
193 NOTREACHED(); | |
194 return false; | |
195 } | |
196 | |
197 scoped_array<uint8> key_info(new uint8[key_info_len]); | |
198 if (!CryptExportPublicKeyInfo( | |
199 provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, | |
200 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) { | |
201 NOTREACHED(); | |
202 return false; | |
203 } | |
204 | |
205 DWORD encoded_length; | |
206 if (!CryptEncodeObject( | |
207 X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO, | |
208 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL, | |
209 &encoded_length)) { | |
210 NOTREACHED(); | |
211 return false; | |
212 } | |
213 | |
214 scoped_array<BYTE> encoded(new BYTE[encoded_length]); | |
215 if (!CryptEncodeObject( | |
216 X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO, | |
217 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(), | |
218 &encoded_length)) { | |
219 NOTREACHED(); | |
220 return false; | |
221 } | |
222 | |
223 for (size_t i = 0; i < encoded_length; ++i) | |
224 output->push_back(encoded[i]); | |
225 | |
226 return true; | |
227 } | |
228 | |
229 } // namespace base | |
OLD | NEW |