Index: crypto/rsa_private_key_win.cc |
=================================================================== |
--- crypto/rsa_private_key_win.cc (revision 0) |
+++ crypto/rsa_private_key_win.cc (revision 0) |
@@ -0,0 +1,229 @@ |
+// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "crypto/rsa_private_key.h" |
+ |
+#include <list> |
+ |
+#include "base/logging.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/string_util.h" |
+ |
+namespace { |
+ // Helper for error handling during key import. |
+#define READ_ASSERT(truth) \ |
+ if (!(truth)) { \ |
+ NOTREACHED(); \ |
+ return false; \ |
+ } |
+} // namespace |
+ |
+namespace crypto { |
+ |
+// static |
+RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) { |
+ scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); |
+ if (!result->InitProvider()) |
+ return NULL; |
+ |
+ DWORD flags = CRYPT_EXPORTABLE; |
+ |
+ // The size is encoded as the upper 16 bits of the flags. :: sigh ::. |
+ flags |= (num_bits << 16); |
+ if (!CryptGenKey(result->provider_, CALG_RSA_SIGN, flags, |
+ result->key_.receive())) |
+ return NULL; |
+ |
+ return result.release(); |
+} |
+ |
+// static |
+RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) { |
+ NOTIMPLEMENTED(); |
+ return NULL; |
+} |
+ |
+// static |
+RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo( |
+ const std::vector<uint8>& input) { |
+ scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); |
+ if (!result->InitProvider()) |
+ return NULL; |
+ |
+ PrivateKeyInfoCodec pki(false); // Little-Endian |
+ pki.Import(input); |
+ |
+ int blob_size = sizeof(PUBLICKEYSTRUC) + |
+ sizeof(RSAPUBKEY) + |
+ pki.modulus()->size() + |
+ pki.prime1()->size() + |
+ pki.prime2()->size() + |
+ pki.exponent1()->size() + |
+ pki.exponent2()->size() + |
+ pki.coefficient()->size() + |
+ pki.private_exponent()->size(); |
+ scoped_array<BYTE> blob(new BYTE[blob_size]); |
+ |
+ uint8* dest = blob.get(); |
+ PUBLICKEYSTRUC* public_key_struc = reinterpret_cast<PUBLICKEYSTRUC*>(dest); |
+ public_key_struc->bType = PRIVATEKEYBLOB; |
+ public_key_struc->bVersion = 0x02; |
+ public_key_struc->reserved = 0; |
+ public_key_struc->aiKeyAlg = CALG_RSA_SIGN; |
+ dest += sizeof(PUBLICKEYSTRUC); |
+ |
+ RSAPUBKEY* rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(dest); |
+ rsa_pub_key->magic = 0x32415352; |
+ rsa_pub_key->bitlen = pki.modulus()->size() * 8; |
+ int public_exponent_int = 0; |
+ for (size_t i = pki.public_exponent()->size(); i > 0; --i) { |
+ public_exponent_int <<= 8; |
+ public_exponent_int |= (*pki.public_exponent())[i - 1]; |
+ } |
+ rsa_pub_key->pubexp = public_exponent_int; |
+ dest += sizeof(RSAPUBKEY); |
+ |
+ memcpy(dest, &pki.modulus()->front(), pki.modulus()->size()); |
+ dest += pki.modulus()->size(); |
+ memcpy(dest, &pki.prime1()->front(), pki.prime1()->size()); |
+ dest += pki.prime1()->size(); |
+ memcpy(dest, &pki.prime2()->front(), pki.prime2()->size()); |
+ dest += pki.prime2()->size(); |
+ memcpy(dest, &pki.exponent1()->front(), pki.exponent1()->size()); |
+ dest += pki.exponent1()->size(); |
+ memcpy(dest, &pki.exponent2()->front(), pki.exponent2()->size()); |
+ dest += pki.exponent2()->size(); |
+ memcpy(dest, &pki.coefficient()->front(), pki.coefficient()->size()); |
+ dest += pki.coefficient()->size(); |
+ memcpy(dest, &pki.private_exponent()->front(), |
+ pki.private_exponent()->size()); |
+ dest += pki.private_exponent()->size(); |
+ |
+ READ_ASSERT(dest == blob.get() + blob_size); |
+ if (!CryptImportKey(result->provider_, |
+ reinterpret_cast<uint8*>(public_key_struc), blob_size, 0, |
+ CRYPT_EXPORTABLE, result->key_.receive())) |
+ return NULL; |
+ |
+ return result.release(); |
+} |
+ |
+// static |
+RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo( |
+ const std::vector<uint8>& input) { |
+ NOTIMPLEMENTED(); |
+ return NULL; |
+} |
+ |
+// static |
+RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo( |
+ const std::vector<uint8>& input) { |
+ NOTIMPLEMENTED(); |
+ return NULL; |
+} |
+ |
+RSAPrivateKey::RSAPrivateKey() : provider_(NULL), key_(NULL) {} |
+ |
+RSAPrivateKey::~RSAPrivateKey() {} |
+ |
+bool RSAPrivateKey::InitProvider() { |
+ return FALSE != CryptAcquireContext(provider_.receive(), NULL, NULL, |
+ PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); |
+} |
+ |
+bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) { |
+ // Export the key |
+ DWORD blob_length = 0; |
+ if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, NULL, &blob_length)) { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ scoped_array<uint8> blob(new uint8[blob_length]); |
+ if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, blob.get(), &blob_length)) { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ uint8* pos = blob.get(); |
+ PUBLICKEYSTRUC *publickey_struct = reinterpret_cast<PUBLICKEYSTRUC*>(pos); |
+ pos += sizeof(PUBLICKEYSTRUC); |
+ |
+ RSAPUBKEY *rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(pos); |
+ pos += sizeof(RSAPUBKEY); |
+ |
+ int mod_size = rsa_pub_key->bitlen / 8; |
+ int primes_size = rsa_pub_key->bitlen / 16; |
+ |
+ PrivateKeyInfoCodec pki(false); // Little-Endian |
+ |
+ pki.modulus()->assign(pos, pos + mod_size); |
+ pos += mod_size; |
+ |
+ pki.prime1()->assign(pos, pos + primes_size); |
+ pos += primes_size; |
+ pki.prime2()->assign(pos, pos + primes_size); |
+ pos += primes_size; |
+ |
+ pki.exponent1()->assign(pos, pos + primes_size); |
+ pos += primes_size; |
+ pki.exponent2()->assign(pos, pos + primes_size); |
+ pos += primes_size; |
+ |
+ pki.coefficient()->assign(pos, pos + primes_size); |
+ pos += primes_size; |
+ |
+ pki.private_exponent()->assign(pos, pos + mod_size); |
+ pos += mod_size; |
+ |
+ pki.public_exponent()->assign(reinterpret_cast<uint8*>(&rsa_pub_key->pubexp), |
+ reinterpret_cast<uint8*>(&rsa_pub_key->pubexp) + 4); |
+ |
+ CHECK_EQ(pos - blob_length, reinterpret_cast<BYTE*>(publickey_struct)); |
+ |
+ return pki.Export(output); |
+} |
+ |
+bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) { |
+ DWORD key_info_len; |
+ if (!CryptExportPublicKeyInfo( |
+ provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, |
+ NULL, &key_info_len)) { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ scoped_array<uint8> key_info(new uint8[key_info_len]); |
+ if (!CryptExportPublicKeyInfo( |
+ provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, |
+ reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ DWORD encoded_length; |
+ if (!CryptEncodeObject( |
+ X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO, |
+ reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL, |
+ &encoded_length)) { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ scoped_array<BYTE> encoded(new BYTE[encoded_length]); |
+ if (!CryptEncodeObject( |
+ X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO, |
+ reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(), |
+ &encoded_length)) { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ for (size_t i = 0; i < encoded_length; ++i) |
+ output->push_back(encoded[i]); |
+ |
+ return true; |
+} |
+ |
+} // namespace crypto |
Property changes on: crypto\rsa_private_key_win.cc |
___________________________________________________________________ |
Added: svn:eol-style |
+ LF |