| Index: net/quic/crypto/proof_source_chromium_openssl.cc
|
| diff --git a/net/quic/crypto/proof_source_chromium_openssl.cc b/net/quic/crypto/proof_source_chromium_openssl.cc
|
| deleted file mode 100644
|
| index b03c05d5c495367eb34ab72ef6069b1e2381b4fd..0000000000000000000000000000000000000000
|
| --- a/net/quic/crypto/proof_source_chromium_openssl.cc
|
| +++ /dev/null
|
| @@ -1,154 +0,0 @@
|
| -// Copyright 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/quic/crypto/proof_source_chromium.h"
|
| -
|
| -#include <openssl/digest.h>
|
| -#include <openssl/evp.h>
|
| -#include <openssl/rsa.h>
|
| -
|
| -#include "base/strings/string_number_conversions.h"
|
| -#include "crypto/openssl_util.h"
|
| -#include "net/quic/crypto/crypto_protocol.h"
|
| -#include "net/ssl/scoped_openssl_types.h"
|
| -
|
| -using std::string;
|
| -using std::vector;
|
| -
|
| -namespace net {
|
| -
|
| -ProofSourceChromium::ProofSourceChromium() {}
|
| -
|
| -ProofSourceChromium::~ProofSourceChromium() {}
|
| -
|
| -bool ProofSourceChromium::Initialize(const base::FilePath& cert_path,
|
| - const base::FilePath& key_path,
|
| - const base::FilePath& sct_path) {
|
| - crypto::EnsureOpenSSLInit();
|
| -
|
| - std::string cert_data;
|
| - if (!base::ReadFileToString(cert_path, &cert_data)) {
|
| - DLOG(FATAL) << "Unable to read certificates.";
|
| - return false;
|
| - }
|
| -
|
| - CertificateList certs_in_file =
|
| - X509Certificate::CreateCertificateListFromBytes(
|
| - cert_data.data(), cert_data.size(), X509Certificate::FORMAT_AUTO);
|
| -
|
| - if (certs_in_file.empty()) {
|
| - DLOG(FATAL) << "No certificates.";
|
| - return false;
|
| - }
|
| -
|
| - vector<string> certs;
|
| - for (const scoped_refptr<X509Certificate>& cert : certs_in_file) {
|
| - std::string der_encoded_cert;
|
| - if (!X509Certificate::GetDEREncoded(cert->os_cert_handle(),
|
| - &der_encoded_cert)) {
|
| - return false;
|
| - }
|
| - certs.push_back(der_encoded_cert);
|
| - }
|
| - chain_ = new ProofSource::Chain(certs);
|
| -
|
| - std::string key_data;
|
| - if (!base::ReadFileToString(key_path, &key_data)) {
|
| - DLOG(FATAL) << "Unable to read key.";
|
| - return false;
|
| - }
|
| -
|
| - const uint8_t* p = reinterpret_cast<const uint8_t*>(key_data.data());
|
| - std::vector<uint8_t> input(p, p + key_data.size());
|
| - private_key_.reset(crypto::RSAPrivateKey::CreateFromPrivateKeyInfo(input));
|
| - if (private_key_.get() == nullptr) {
|
| - DLOG(FATAL) << "Unable to create private key.";
|
| - return false;
|
| - }
|
| -
|
| - // Loading of the signed certificate timestamp is optional.
|
| - if (sct_path.empty())
|
| - return true;
|
| -
|
| - if (!base::ReadFileToString(sct_path, &signed_certificate_timestamp_)) {
|
| - DLOG(FATAL) << "Unable to read signed certificate timestamp.";
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -bool ProofSourceChromium::GetProof(const IPAddress& server_ip,
|
| - const string& hostname,
|
| - const string& server_config,
|
| - QuicVersion quic_version,
|
| - base::StringPiece chlo_hash,
|
| - bool ecdsa_ok,
|
| - scoped_refptr<ProofSource::Chain>* out_chain,
|
| - string* out_signature,
|
| - string* out_leaf_cert_sct) {
|
| - DCHECK(private_key_.get()) << " this: " << this;
|
| -
|
| - crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
|
| - crypto::ScopedEVP_MD_CTX sign_context(EVP_MD_CTX_create());
|
| - EVP_PKEY_CTX* pkey_ctx;
|
| -
|
| - if (quic_version > QUIC_VERSION_30) {
|
| - uint32_t len = chlo_hash.length();
|
| - if (!EVP_DigestSignInit(sign_context.get(), &pkey_ctx, EVP_sha256(),
|
| - nullptr, private_key_->key()) ||
|
| - !EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) ||
|
| - !EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, -1) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(kProofSignatureLabel),
|
| - sizeof(kProofSignatureLabel)) ||
|
| - !EVP_DigestSignUpdate(sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(&len),
|
| - sizeof(len)) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(chlo_hash.data()), len) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(server_config.data()),
|
| - server_config.size())) {
|
| - return false;
|
| - }
|
| - } else if (!EVP_DigestSignInit(sign_context.get(), &pkey_ctx, EVP_sha256(),
|
| - nullptr, private_key_->key()) ||
|
| - !EVP_PKEY_CTX_set_rsa_padding(pkey_ctx, RSA_PKCS1_PSS_PADDING) ||
|
| - !EVP_PKEY_CTX_set_rsa_pss_saltlen(pkey_ctx, -1) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(kProofSignatureLabelOld),
|
| - sizeof(kProofSignatureLabelOld)) ||
|
| - !EVP_DigestSignUpdate(
|
| - sign_context.get(),
|
| - reinterpret_cast<const uint8_t*>(server_config.data()),
|
| - server_config.size())) {
|
| - return false;
|
| - }
|
| -
|
| - // Determine the maximum length of the signature.
|
| - size_t len = 0;
|
| - if (!EVP_DigestSignFinal(sign_context.get(), nullptr, &len)) {
|
| - return false;
|
| - }
|
| - std::vector<uint8_t> signature(len);
|
| - // Sign it.
|
| - if (!EVP_DigestSignFinal(sign_context.get(), signature.data(), &len)) {
|
| - return false;
|
| - }
|
| - signature.resize(len);
|
| - out_signature->assign(reinterpret_cast<const char*>(signature.data()),
|
| - signature.size());
|
| - *out_chain = chain_;
|
| - VLOG(1) << "signature: "
|
| - << base::HexEncode(out_signature->data(), out_signature->size());
|
| - *out_leaf_cert_sct = signed_certificate_timestamp_;
|
| - return true;
|
| -}
|
| -
|
| -} // namespace net
|
|
|