Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "crypto/rsa_private_key.h" | 5 #include "crypto/rsa_private_key.h" |
| 6 | 6 |
| 7 #include <cryptohi.h> | 7 #include <cryptohi.h> |
| 8 #include <keyhi.h> | 8 #include <keyhi.h> |
| 9 #include <pk11pub.h> | 9 #include <pk11pub.h> |
| 10 | 10 |
| (...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 84 EnsureNSSInit(); | 84 EnsureNSSInit(); |
| 85 | 85 |
| 86 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); | 86 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); |
| 87 | 87 |
| 88 // First, decode and save the public key. | 88 // First, decode and save the public key. |
| 89 SECItem key_der; | 89 SECItem key_der; |
| 90 key_der.type = siBuffer; | 90 key_der.type = siBuffer; |
| 91 key_der.data = const_cast<unsigned char*>(&input[0]); | 91 key_der.data = const_cast<unsigned char*>(&input[0]); |
| 92 key_der.len = input.size(); | 92 key_der.len = input.size(); |
| 93 | 93 |
| 94 CERTSubjectPublicKeyInfo *spki = | 94 CERTSubjectPublicKeyInfo *spki = |
|
Ryan Sleevi
2011/05/25 05:58:25
nit: CERTSubjectPublicKeyInfo *spki -> CERTSubject
Greg Spencer (Chromium)
2011/05/25 17:12:07
Done.
| |
| 95 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_der); | 95 SECKEY_DecodeDERSubjectPublicKeyInfo(&key_der); |
| 96 if (!spki) { | 96 if (!spki) { |
| 97 NOTREACHED(); | 97 NOTREACHED(); |
| 98 return NULL; | 98 return NULL; |
| 99 } | 99 } |
| 100 | 100 |
| 101 result->public_key_ = SECKEY_ExtractPublicKey(spki); | 101 result->public_key_ = SECKEY_ExtractPublicKey(spki); |
| 102 SECKEY_DestroySubjectPublicKeyInfo(spki); | 102 SECKEY_DestroySubjectPublicKeyInfo(spki); |
| 103 if (!result->public_key_) { | 103 if (!result->public_key_) { |
| 104 NOTREACHED(); | 104 NOTREACHED(); |
| 105 return NULL; | 105 return NULL; |
| 106 } | 106 } |
| 107 | 107 |
| 108 // Now, look for the associated private key in the user's | |
| 109 // hardware-backed NSS DB. If it's not there, consider that an | |
| 110 // error. | |
| 111 PK11SlotInfo *slot = GetPrivateNSSKeySlot(); | |
| 112 if (!slot) { | |
| 113 NOTREACHED(); | |
| 114 return NULL; | |
| 115 } | |
| 116 | |
| 117 // Make sure the key is an RSA key. If not, that's an error | 108 // Make sure the key is an RSA key. If not, that's an error |
| 118 if (result->public_key_->keyType != rsaKey) { | 109 if (result->public_key_->keyType != rsaKey) { |
| 119 PK11_FreeSlot(slot); | |
| 120 NOTREACHED(); | 110 NOTREACHED(); |
| 121 return NULL; | 111 return NULL; |
| 122 } | 112 } |
| 123 | 113 |
| 124 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus)); | 114 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus)); |
|
Ryan Sleevi
2011/05/25 05:58:25
You can make this a ScopedSECItem (see src/crypto/
Greg Spencer (Chromium)
2011/05/25 17:12:07
Good point. I forgot about the scoped nss types.
| |
| 125 if (!ck_id) { | 115 if (!ck_id) { |
| 126 PK11_FreeSlot(slot); | |
| 127 NOTREACHED(); | 116 NOTREACHED(); |
| 128 return NULL; | 117 return NULL; |
| 129 } | 118 } |
| 130 | 119 |
| 120 PK11SlotInfo* slot = GetPrivateNSSKeySlot(); | |
| 121 if (!slot) { | |
| 122 NOTREACHED(); | |
| 123 SECITEM_FreeItem(ck_id, PR_TRUE); | |
| 124 return NULL; | |
| 125 } | |
| 126 | |
| 131 // Finally...Look for the key! | 127 // Finally...Look for the key! |
| 132 result->key_ = PK11_FindKeyByKeyID(slot, ck_id, NULL); | 128 result->key_ = PK11_FindKeyByKeyID(slot, ck_id, NULL); |
| 133 | 129 |
| 130 // If we don't find the matching key in the private slot, then we | |
| 131 // look in the public slot. | |
| 132 if (!result->key_) { | |
| 133 PK11_FreeSlot(slot); | |
| 134 slot = GetPublicNSSKeySlot(); | |
|
Ryan Sleevi
2011/05/25 05:58:25
According to the header comments for GetPublicNSSK
Greg Spencer (Chromium)
2011/05/25 17:12:07
Yes, I wrote those comments.
The general policy f
| |
| 135 if (!slot) { | |
| 136 NOTREACHED(); | |
| 137 SECITEM_FreeItem(ck_id, PR_TRUE); | |
| 138 return NULL; | |
| 139 } | |
| 140 result->key_ = PK11_FindKeyByKeyID(slot, ck_id, NULL); | |
| 141 } | |
| 142 | |
| 134 // Cleanup... | 143 // Cleanup... |
| 135 PK11_FreeSlot(slot); | 144 PK11_FreeSlot(slot); |
| 136 SECITEM_FreeItem(ck_id, PR_TRUE); | 145 SECITEM_FreeItem(ck_id, PR_TRUE); |
| 137 | 146 |
| 138 // If we didn't find it, that's ok. | 147 // If we didn't find it, that's ok. |
| 139 if (!result->key_) | 148 if (!result->key_) |
| 140 return NULL; | 149 return NULL; |
| 141 | 150 |
| 142 return result.release(); | 151 return result.release(); |
| 143 } | 152 } |
| (...skipping 96 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 240 result->public_key_ = SECKEY_ConvertToPublicKey(result->key_); | 249 result->public_key_ = SECKEY_ConvertToPublicKey(result->key_); |
| 241 if (!result->public_key_) { | 250 if (!result->public_key_) { |
| 242 NOTREACHED(); | 251 NOTREACHED(); |
| 243 return NULL; | 252 return NULL; |
| 244 } | 253 } |
| 245 | 254 |
| 246 return result.release(); | 255 return result.release(); |
| 247 } | 256 } |
| 248 | 257 |
| 249 } // namespace crypto | 258 } // namespace crypto |
| OLD | NEW |