Index: crypto/rsa_private_key_win.cc |
diff --git a/crypto/rsa_private_key_win.cc b/crypto/rsa_private_key_win.cc |
deleted file mode 100644 |
index 29ee663eed3c9fa376b4d7a06593f46b5ebfe095..0000000000000000000000000000000000000000 |
--- a/crypto/rsa_private_key_win.cc |
+++ /dev/null |
@@ -1,238 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "crypto/rsa_private_key.h" |
- |
-#include <list> |
- |
-#include "base/logging.h" |
-#include "base/memory/scoped_ptr.h" |
-#include "base/strings/string_util.h" |
- |
-#pragma comment(lib, "crypt32.lib") |
- |
-namespace crypto { |
- |
-// static |
-RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) { |
- scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); |
- if (!result->InitProvider()) |
- return NULL; |
- |
- DWORD flags = CRYPT_EXPORTABLE; |
- |
- // The size is encoded as the upper 16 bits of the flags. :: sigh ::. |
- flags |= (num_bits << 16); |
- if (!CryptGenKey(result->provider_, CALG_RSA_SIGN, flags, |
- result->key_.receive())) |
- return NULL; |
- |
- return result.release(); |
-} |
- |
-// static |
-RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) { |
- NOTIMPLEMENTED(); |
- return NULL; |
-} |
- |
-// static |
-RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo( |
- const std::vector<uint8>& input) { |
- scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey); |
- if (!result->InitProvider()) |
- return NULL; |
- |
- PrivateKeyInfoCodec pki(false); // Little-Endian |
- if (!pki.Import(input)) |
- return NULL; |
- |
- size_t blob_size = sizeof(PUBLICKEYSTRUC) + |
- sizeof(RSAPUBKEY) + |
- pki.modulus()->size() + |
- pki.prime1()->size() + |
- pki.prime2()->size() + |
- pki.exponent1()->size() + |
- pki.exponent2()->size() + |
- pki.coefficient()->size() + |
- pki.private_exponent()->size(); |
- scoped_ptr<BYTE[]> blob(new BYTE[blob_size]); |
- |
- uint8* dest = blob.get(); |
- PUBLICKEYSTRUC* public_key_struc = reinterpret_cast<PUBLICKEYSTRUC*>(dest); |
- public_key_struc->bType = PRIVATEKEYBLOB; |
- public_key_struc->bVersion = 0x02; |
- public_key_struc->reserved = 0; |
- public_key_struc->aiKeyAlg = CALG_RSA_SIGN; |
- dest += sizeof(PUBLICKEYSTRUC); |
- |
- RSAPUBKEY* rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(dest); |
- rsa_pub_key->magic = 0x32415352; |
- rsa_pub_key->bitlen = pki.modulus()->size() * 8; |
- int public_exponent_int = 0; |
- for (size_t i = pki.public_exponent()->size(); i > 0; --i) { |
- public_exponent_int <<= 8; |
- public_exponent_int |= (*pki.public_exponent())[i - 1]; |
- } |
- rsa_pub_key->pubexp = public_exponent_int; |
- dest += sizeof(RSAPUBKEY); |
- |
- memcpy(dest, &pki.modulus()->front(), pki.modulus()->size()); |
- dest += pki.modulus()->size(); |
- memcpy(dest, &pki.prime1()->front(), pki.prime1()->size()); |
- dest += pki.prime1()->size(); |
- memcpy(dest, &pki.prime2()->front(), pki.prime2()->size()); |
- dest += pki.prime2()->size(); |
- memcpy(dest, &pki.exponent1()->front(), pki.exponent1()->size()); |
- dest += pki.exponent1()->size(); |
- memcpy(dest, &pki.exponent2()->front(), pki.exponent2()->size()); |
- dest += pki.exponent2()->size(); |
- memcpy(dest, &pki.coefficient()->front(), pki.coefficient()->size()); |
- dest += pki.coefficient()->size(); |
- memcpy(dest, &pki.private_exponent()->front(), |
- pki.private_exponent()->size()); |
- dest += pki.private_exponent()->size(); |
- |
- if (dest != blob.get() + blob_size) { |
- NOTREACHED(); |
- return NULL; |
- } |
- if (!CryptImportKey(result->provider_, |
- reinterpret_cast<uint8*>(public_key_struc), |
- static_cast<DWORD>(blob_size), 0, CRYPT_EXPORTABLE, |
- result->key_.receive())) { |
- return NULL; |
- } |
- |
- return result.release(); |
-} |
- |
-// static |
-RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo( |
- const std::vector<uint8>& input) { |
- NOTIMPLEMENTED(); |
- return NULL; |
-} |
- |
-// static |
-RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo( |
- const std::vector<uint8>& input) { |
- NOTIMPLEMENTED(); |
- return NULL; |
-} |
- |
-RSAPrivateKey::RSAPrivateKey() : provider_(NULL), key_(NULL) {} |
- |
-RSAPrivateKey::~RSAPrivateKey() {} |
- |
-bool RSAPrivateKey::InitProvider() { |
- return FALSE != CryptAcquireContext(provider_.receive(), NULL, NULL, |
- PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); |
-} |
- |
-RSAPrivateKey* RSAPrivateKey::Copy() const { |
- scoped_ptr<RSAPrivateKey> copy(new RSAPrivateKey()); |
- if (!CryptContextAddRef(provider_, NULL, 0)) { |
- NOTREACHED(); |
- return NULL; |
- } |
- copy->provider_.reset(provider_.get()); |
- if (!CryptDuplicateKey(key_.get(), NULL, 0, copy->key_.receive())) |
- return NULL; |
- return copy.release(); |
-} |
- |
-bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) const { |
- // Export the key |
- DWORD blob_length = 0; |
- if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, NULL, &blob_length)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- scoped_ptr<uint8[]> blob(new uint8[blob_length]); |
- if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, blob.get(), &blob_length)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- uint8* pos = blob.get(); |
- PUBLICKEYSTRUC *publickey_struct = reinterpret_cast<PUBLICKEYSTRUC*>(pos); |
- pos += sizeof(PUBLICKEYSTRUC); |
- |
- RSAPUBKEY *rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(pos); |
- pos += sizeof(RSAPUBKEY); |
- |
- int mod_size = rsa_pub_key->bitlen / 8; |
- int primes_size = rsa_pub_key->bitlen / 16; |
- |
- PrivateKeyInfoCodec pki(false); // Little-Endian |
- |
- pki.modulus()->assign(pos, pos + mod_size); |
- pos += mod_size; |
- |
- pki.prime1()->assign(pos, pos + primes_size); |
- pos += primes_size; |
- pki.prime2()->assign(pos, pos + primes_size); |
- pos += primes_size; |
- |
- pki.exponent1()->assign(pos, pos + primes_size); |
- pos += primes_size; |
- pki.exponent2()->assign(pos, pos + primes_size); |
- pos += primes_size; |
- |
- pki.coefficient()->assign(pos, pos + primes_size); |
- pos += primes_size; |
- |
- pki.private_exponent()->assign(pos, pos + mod_size); |
- pos += mod_size; |
- |
- pki.public_exponent()->assign(reinterpret_cast<uint8*>(&rsa_pub_key->pubexp), |
- reinterpret_cast<uint8*>(&rsa_pub_key->pubexp) + 4); |
- |
- CHECK_EQ(pos - blob_length, reinterpret_cast<BYTE*>(publickey_struct)); |
- |
- return pki.Export(output); |
-} |
- |
-bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) const { |
- DWORD key_info_len; |
- if (!CryptExportPublicKeyInfo( |
- provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, |
- NULL, &key_info_len)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- scoped_ptr<uint8[]> key_info(new uint8[key_info_len]); |
- if (!CryptExportPublicKeyInfo( |
- provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, |
- reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- DWORD encoded_length; |
- if (!CryptEncodeObject( |
- X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO, |
- reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL, |
- &encoded_length)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- scoped_ptr<BYTE[]> encoded(new BYTE[encoded_length]); |
- if (!CryptEncodeObject( |
- X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO, |
- reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(), |
- &encoded_length)) { |
- NOTREACHED(); |
- return false; |
- } |
- |
- output->assign(encoded.get(), encoded.get() + encoded_length); |
- return true; |
-} |
- |
-} // namespace crypto |