Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(803)

Unified Diff: net/quic/crypto/proof_source_chromium_openssl.cc

Issue 1309813003: Implement an openssl version of a QUIC ProofSource. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: add proof_source_chromium_openssl.cc Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/quic/crypto/proof_source_chromium_nss.cc ('k') | net/quic/quic_crypto_server_stream_test.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/quic/crypto/proof_source_chromium_openssl.cc
diff --git a/net/quic/crypto/proof_source_chromium_openssl.cc b/net/quic/crypto/proof_source_chromium_openssl.cc
new file mode 100644
index 0000000000000000000000000000000000000000..7ecd484f4acf7268fd45041076399c29eed5e913
--- /dev/null
+++ b/net/quic/crypto/proof_source_chromium_openssl.cc
@@ -0,0 +1,124 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/quic/crypto/proof_source_chromium.h"
+
+#include "base/strings/string_number_conversions.h"
+#include "crypto/openssl_util.h"
+#include "net/quic/crypto/crypto_protocol.h"
+#include "net/ssl/scoped_openssl_types.h"
+
+using std::string;
+using std::vector;
+
+namespace net {
+
+ProofSourceChromium::ProofSourceChromium() {}
+
+ProofSourceChromium::~ProofSourceChromium() {}
+
+bool ProofSourceChromium::Initialize(const base::FilePath& cert_path,
+ const base::FilePath& key_path) {
+ crypto::EnsureOpenSSLInit();
+
+ std::string cert_data;
+ if (!base::ReadFileToString(cert_path, &cert_data)) {
+ DLOG(FATAL) << "Unable to read certificates";
+ return false;
+ }
+
+ CertificateList certs_in_file =
+ X509Certificate::CreateCertificateListFromBytes(
+ cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO);
+
+ if (certs_in_file.empty()) {
+ DLOG(FATAL) << "No certificates";
+ return false;
+ }
+
+ for (const scoped_refptr<X509Certificate>& cert : certs_in_file) {
+ std::string der_encoded_cert;
+ X509Certificate::GetDEREncoded(cert->os_cert_handle(), &der_encoded_cert);
ramant (doing other things) 2015/08/24 22:31:30 overly nit: should we consider checking the return
Ryan Hamilton 2015/08/24 23:29:55 Done.
+ certificates_.push_back(der_encoded_cert);
+ }
+
+ std::string key_data;
+ if (!base::ReadFileToString(key_path, &key_data)) {
+ DLOG(FATAL) << "Unable to read key";
+ return false;
+ }
+
+ const uint8_t* p = reinterpret_cast<const uint8_t*>(key_data.data());
+ std::vector<uint8_t> input(p, p + key_data.size());
+ private_key_.reset(crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input));
ramant (doing other things) 2015/08/24 22:31:30 overly nit: Consider adding after DCHECK (ala gige
Ryan Hamilton 2015/08/24 23:29:55 Done.
+ DCHECK(private_key_.get()) << " this: " << this;
+ return true;
+}
+
+bool ProofSourceChromium::GetProof(const IPAddressNumber& server_ip,
+ const string& hostname,
+ const string& server_config,
+ bool ecdsa_ok,
+ const vector<string>** out_certs,
+ string* out_signature) {
+ DCHECK(private_key_.get()) << " this: " << this;
+
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
+ const EVP_MD* const digest = EVP_sha256();
+ DCHECK(digest);
+ if (!digest) {
davidben 2015/08/24 22:50:24 Doesn't happen.
Ryan Hamilton 2015/08/24 23:29:55 Done.
+ return false;
+ }
+ crypto::ScopedEVP_MD_CTX sign_context(EVP_MD_CTX_create());
+ EVP_PKEY_CTX* pkey_ctx;
+ if (!EVP_DigestSignInit(sign_context.get(), &pkey_ctx, digest, NULL,
+ private_key_->key())) {
davidben 2015/08/24 22:50:24 If I were you, I'd just chain all these with ||s.
Ryan Hamilton 2015/08/24 23:29:55 Ah, great, thanks! I think I did what you proposed
+ return false;
+ }
+ if (!EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING)) {
ramant (doing other things) 2015/08/24 22:31:30 overly nit: 1 != EVP_PKEY_CTX_set_rsa_padding ala
davidben 2015/08/24 22:50:24 It's an OpenSSL vs BoringSSL thing. If this code w
Ryan Hamilton 2015/08/24 23:29:55 Ah, actually davidben said that boringssl has fixe
+ LOG(FATAL) << "EVP_PKEY_CTX_set_rsa_padding";
+ return false;
+ }
+ // -1 sets the salt length to the digest length.
+ if (1 != EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, -1)) {
davidben 2015/08/24 22:50:24 This can be ! as well.
Ryan Hamilton 2015/08/24 23:29:55 Whoops, done!
+ LOG(FATAL) << "EVP_PKEY_CTX_set_rsa_pss_saltlen";
+ return false;
+ }
+
+ if (!EVP_DigestSignUpdate(sign_context.get(), reinterpret_cast<const uint8*>(
+ kProofSignatureLabel),
+ sizeof(kProofSignatureLabel))) {
+ DLOG(ERROR) << "Unable to sign lable.";
ramant (doing other things) 2015/08/24 22:31:30 overly nit: lable -> label?
Ryan Hamilton 2015/08/24 23:29:55 Done.
+ return false;
+ }
+
+ if (!EVP_DigestSignUpdate(sign_context.get(), reinterpret_cast<const uint8*>(
+ server_config.data()),
+ server_config.size())) {
+ DLOG(ERROR) << "Unable to sign server config.";
+ return false;
+ }
+
+ // Determine the maximum length of the signature.
+ size_t len = 0;
+ if (!EVP_DigestSignFinal(sign_context.get(), NULL, &len)) {
+ DLOG(ERROR) << "Unable to finalize signature.";
+ return false;
+ }
+ std::vector<uint8> signature(len);
davidben 2015/08/24 22:50:24 Nit: uint8_t
Ryan Hamilton 2015/08/24 23:29:55 Done.
+ // Sign it.
+ if (!EVP_DigestSignFinal(sign_context.get(), vector_as_array(&signature),
+ &len)) {
+ return false;
+ }
davidben 2015/08/24 22:50:24 This should have a: signature.resize(len); EVP_
Ryan Hamilton 2015/08/24 23:29:55 Done.
+
+ out_signature->assign(reinterpret_cast<const char*>(&signature[0]),
+ signature.size());
+ *out_certs = &certificates_;
+ VLOG(1) << "signature: "
+ << base::HexEncode(out_signature->data(), out_signature->size());
+ return true;
+}
+
+} // namespace net
« no previous file with comments | « net/quic/crypto/proof_source_chromium_nss.cc ('k') | net/quic/quic_crypto_server_stream_test.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698