Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6)

Unified Diff: net/base/keygen_handler_openssl.cc

Issue 1742873002: Switch //net to the new SPKI and PKCS#8 APIs. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@spki-crypto
Patch Set: const_cast Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/keygen_handler_openssl.cc
diff --git a/net/base/keygen_handler_openssl.cc b/net/base/keygen_handler_openssl.cc
index bc34012c1e8dd6ffe2e03f6d57278a130becbaf8..5e979e08375d7f47837cb86a3b590aa4465d5e50 100644
--- a/net/base/keygen_handler_openssl.cc
+++ b/net/base/keygen_handler_openssl.cc
@@ -4,11 +4,18 @@
#include "net/base/keygen_handler.h"
+#include <openssl/bytestring.h>
+#include <openssl/digest.h>
+#include <openssl/evp.h>
#include <openssl/mem.h>
-#include <openssl/ssl.h>
+#include <stdint.h>
+#include "base/base64.h"
+#include "base/location.h"
#include "base/logging.h"
#include "base/memory/scoped_ptr.h"
+#include "base/strings/string_piece.h"
+#include "crypto/auto_cbb.h"
#include "crypto/openssl_util.h"
#include "crypto/rsa_private_key.h"
#include "crypto/scoped_openssl_types.h"
@@ -24,21 +31,81 @@ std::string KeygenHandler::GenKeyAndSignChallenge() {
if (stores_key_)
OpenSSLPrivateKeyStore::StoreKeyPair(url_, pkey);
- crypto::ScopedOpenSSL<NETSCAPE_SPKI, NETSCAPE_SPKI_free> spki(
- NETSCAPE_SPKI_new());
- ASN1_STRING_set(spki.get()->spkac->challenge,
- challenge_.data(), challenge_.size());
- NETSCAPE_SPKI_set_pubkey(spki.get(), pkey);
- // Using MD5 as this is what is required in HTML5, even though the SPKI
- // structure does allow the use of a SHA-1 signature.
- NETSCAPE_SPKI_sign(spki.get(), pkey, EVP_md5());
- char* spkistr = NETSCAPE_SPKI_b64_encode(spki.get());
+ // Serialize the following structure, from
+ // https://developer.mozilla.org/en-US/docs/Web/HTML/Element/keygen.
+ //
+ // PublicKeyAndChallenge ::= SEQUENCE {
+ // spki SubjectPublicKeyInfo,
+ // challenge IA5STRING
+ // }
+ //
+ // SignedPublicKeyAndChallenge ::= SEQUENCE {
+ // publicKeyAndChallenge PublicKeyAndChallenge,
+ // signatureAlgorithm AlgorithmIdentifier,
+ // signature BIT STRING
+ // }
+ //
+ // The signature is over the PublicKeyAndChallenge.
- std::string result(spkistr);
- OPENSSL_free(spkistr);
+ crypto::OpenSSLErrStackTracer tracer(FROM_HERE);
+ // Serialize up to the PublicKeyAndChallenge.
+ crypto::AutoCBB cbb;
+ CBB spkac, public_key_and_challenge, challenge;
+ if (!CBB_init(cbb.get(), 0) ||
+ !CBB_add_asn1(cbb.get(), &spkac, CBS_ASN1_SEQUENCE) ||
+ !CBB_add_asn1(&spkac, &public_key_and_challenge, CBS_ASN1_SEQUENCE) ||
+ !EVP_marshal_public_key(&public_key_and_challenge, pkey) ||
+ !CBB_add_asn1(&public_key_and_challenge, &challenge,
+ CBS_ASN1_IA5STRING) ||
+ !CBB_add_bytes(&challenge,
+ reinterpret_cast<const uint8_t*>(challenge_.data()),
+ challenge_.size()) ||
Ryan Sleevi 2016/03/03 18:32:06 Is this fine if challenge_ is empty? I suspect any
davidben 2016/03/03 19:58:15 If challenge is empty, we'll emit an empty IA5STRI
Ryan Sleevi 2016/03/03 20:27:41 Specifically, by using .data() rather than .c_str(
davidben 2016/03/03 21:59:36 If you pass CBB_add_bytes a length of zero, it's n
+ !CBB_flush(&spkac)) {
+ return std::string();
+ }
+
+ // Hash what's been written so far.
+ crypto::ScopedEVP_MD_CTX ctx(EVP_MD_CTX_create());
+ if (!EVP_DigestSignInit(ctx.get(), nullptr, EVP_md5(), nullptr, pkey) ||
+ !EVP_DigestSignUpdate(ctx.get(), CBB_data(&spkac), CBB_len(&spkac))) {
+ return std::string();
+ }
+
+ // The DER encoding of the AlgorithmIdentifier for MD5 with RSA.
+ static const uint8_t kMd5WithRsaEncryption[] = {
+ 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86,
+ 0xf7, 0x0d, 0x01, 0x01, 0x04, 0x05, 0x00,
+ };
Ryan Sleevi 2016/03/03 18:32:06 Surely there's a less-gross way than hardcoding -
davidben 2016/03/03 19:58:15 There's OBJ_nid2cbb that would work. I didn't use
Ryan Sleevi 2016/03/03 20:27:41 I do not think that would be a good state - it wou
davidben 2016/03/03 21:59:36 The string wouldn't be duplicated. That's largely
Ryan Sleevi 2016/03/03 22:08:43 I think we're in agreement here. Specifically, my
davidben 2016/03/03 22:25:40 Yup. I haven't done that here since signature_algo
+
+ // Write the algorithm identifier and then the signature.
+ CBB sig_bitstring;
+ uint8_t* sig;
+ size_t sig_len;
+ if (!CBB_add_bytes(&spkac, kMd5WithRsaEncryption,
+ sizeof(kMd5WithRsaEncryption)) ||
+ !CBB_add_asn1(&spkac, &sig_bitstring, CBS_ASN1_BITSTRING) ||
+ !CBB_add_u8(&sig_bitstring, 0 /* padding */) ||
Ryan Sleevi 2016/03/03 18:32:06 ? Why is this necessary? Because the assumption is
davidben 2016/03/03 19:58:15 I think we've had this conversation before. :-) It
Ryan Sleevi 2016/03/03 20:27:41 That was much more than needed, but still doesn't
davidben 2016/03/03 21:59:36 Yes, this is that byte. I tend to call it the "pha
Ryan Sleevi 2016/03/03 22:08:43 Yup. That's all I was trying to understand - to ma
davidben 2016/03/03 22:25:40 Done.
+ // Determine the maximum length of the signature.
+ !EVP_DigestSignFinal(ctx.get(), nullptr, &sig_len) ||
+ // Reserve |sig_len| bytes and write the signature to |spkac|.
+ !CBB_reserve(&sig_bitstring, &sig, sig_len) ||
+ !EVP_DigestSignFinal(ctx.get(), sig, &sig_len) ||
+ !CBB_did_write(&sig_bitstring, sig_len)) {
Ryan Sleevi 2016/03/03 18:32:06 This feels like such a gross way to do it. Is this
davidben 2016/03/03 19:58:15 Which piece of boilerplate in particular? If you
Ryan Sleevi 2016/03/03 20:27:41 Specifically, that the act of transcribing a Signa
davidben 2016/03/03 21:59:36 I don't believe I've ever had to write this before
Ryan Sleevi 2016/03/03 22:08:43 Oh, I thought you were saying you had a second cop
davidben 2016/03/03 22:25:40 Oh! No, I mean, the Mac code has an existing separ
+ return std::string();
+ }
+
+ // Finally, the structure is base64-encoded.
+ uint8_t* der;
+ size_t der_len;
+ if (!CBB_finish(cbb.get(), &der, &der_len)) {
+ return std::string();
+ }
+ std::string result;
+ base::Base64Encode(
+ base::StringPiece(reinterpret_cast<const char*>(der), der_len), &result);
+ OPENSSL_free(der);
return result;
}
} // namespace net
-

Powered by Google App Engine
This is Rietveld 408576698