Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2077)

Unified Diff: content/child/webcrypto/openssl/rsa_oaep_openssl.cc

Issue 419673006: [webcrypto] Implement RSA-OAEP using BoringSSL. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: fix typo Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | content/child/webcrypto/openssl/util_openssl.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/child/webcrypto/openssl/rsa_oaep_openssl.cc
diff --git a/content/child/webcrypto/openssl/rsa_oaep_openssl.cc b/content/child/webcrypto/openssl/rsa_oaep_openssl.cc
new file mode 100644
index 0000000000000000000000000000000000000000..dc12490dd49f8655910b62dc30d1ea9c14fe9a36
--- /dev/null
+++ b/content/child/webcrypto/openssl/rsa_oaep_openssl.cc
@@ -0,0 +1,153 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <openssl/evp.h>
+
+#include "base/stl_util.h"
+#include "content/child/webcrypto/crypto_data.h"
+#include "content/child/webcrypto/openssl/key_openssl.h"
+#include "content/child/webcrypto/openssl/rsa_key_openssl.h"
+#include "content/child/webcrypto/openssl/util_openssl.h"
+#include "content/child/webcrypto/status.h"
+#include "crypto/openssl_util.h"
+#include "crypto/scoped_openssl_types.h"
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
+#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h"
+
+namespace content {
+
+namespace webcrypto {
+
+namespace {
+
+typedef int (*InitFunc)(EVP_PKEY_CTX* ctx);
+typedef int (*EncryptDecryptFunc)(EVP_PKEY_CTX* ctx,
+ unsigned char* out,
+ size_t* outlen,
+ const unsigned char* in,
+ size_t inlen);
+
+// Helper for doing either RSA-OAEP encryption or decryption.
+//
+// To encrypt call with:
+// init_func=EVP_PKEY_encrypt_init, encrypt_decrypt_func=EVP_PKEY_encrypt
+//
+// To decrypt call with:
+// init_func=EVP_PKEY_decrypt_init, encrypt_decrypt_func=EVP_PKEY_decrypt
+Status CommonEncryptDecrypt(InitFunc init_func,
+ EncryptDecryptFunc encrypt_decrypt_func,
+ const blink::WebCryptoAlgorithm& algorithm,
+ const blink::WebCryptoKey& key,
+ const CryptoData& data,
+ std::vector<uint8_t>* buffer) {
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
+
+ EVP_PKEY* pkey = AsymKeyOpenSsl::Cast(key)->key();
+ const EVP_MD* digest =
+ GetDigest(key.algorithm().rsaHashedParams()->hash().id());
+ if (!digest)
+ return Status::ErrorUnsupported();
+
+ crypto::ScopedEVP_PKEY_CTX ctx(EVP_PKEY_CTX_new(pkey, NULL));
+
+ if (1 != init_func(ctx.get()) ||
+ 1 != EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_OAEP_PADDING) ||
+ 1 != EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), digest) ||
+ 1 != EVP_PKEY_CTX_set_rsa_mgf1_md(ctx.get(), digest)) {
+ return Status::OperationError();
+ }
+
+ const blink::WebVector<uint8_t>& label =
+ algorithm.rsaOaepParams()->optionalLabel();
+
+ if (label.size()) {
+ // Make a copy of the label, since the ctx takes ownership of it when
+ // calling set0_rsa_oaep_label().
+ crypto::ScopedOpenSSLBytes label_copy;
+ label_copy.reset(static_cast<uint8_t*>(OPENSSL_malloc(label.size())));
+ memcpy(label_copy.get(), label.data(), label.size());
+
+ if (1 != EVP_PKEY_CTX_set0_rsa_oaep_label(
+ ctx.get(), label_copy.release(), label.size())) {
+ return Status::OperationError();
+ }
+ }
+
+ // Determine the maximum length of the output.
+ size_t outlen = 0;
+ if (1 != encrypt_decrypt_func(
+ ctx.get(), NULL, &outlen, data.bytes(), data.byte_length())) {
+ return Status::OperationError();
+ }
+ buffer->resize(outlen);
+
+ // Do the actual encryption/decryption.
+ if (1 != encrypt_decrypt_func(ctx.get(),
+ vector_as_array(buffer),
+ &outlen,
+ data.bytes(),
+ data.byte_length())) {
+ return Status::OperationError();
+ }
+ buffer->resize(outlen);
+
+ return Status::Success();
+}
+
+class RsaOaepImplementation : public RsaHashedAlgorithm {
+ public:
+ RsaOaepImplementation()
+ : RsaHashedAlgorithm(
+ blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageWrapKey,
+ blink::WebCryptoKeyUsageDecrypt |
+ blink::WebCryptoKeyUsageUnwrapKey) {}
+
+ virtual const char* GetJwkAlgorithm(
+ const blink::WebCryptoAlgorithmId hash) const OVERRIDE {
+ switch (hash) {
+ case blink::WebCryptoAlgorithmIdSha1:
+ return "RSA-OAEP";
+ case blink::WebCryptoAlgorithmIdSha256:
+ return "RSA-OAEP-256";
+ case blink::WebCryptoAlgorithmIdSha384:
+ return "RSA-OAEP-384";
+ case blink::WebCryptoAlgorithmIdSha512:
+ return "RSA-OAEP-512";
+ default:
+ return NULL;
+ }
+ }
+
+ virtual Status Encrypt(const blink::WebCryptoAlgorithm& algorithm,
+ const blink::WebCryptoKey& key,
+ const CryptoData& data,
+ std::vector<uint8_t>* buffer) const OVERRIDE {
+ if (key.type() != blink::WebCryptoKeyTypePublic)
+ return Status::ErrorUnexpectedKeyType();
+
+ return CommonEncryptDecrypt(
+ EVP_PKEY_encrypt_init, EVP_PKEY_encrypt, algorithm, key, data, buffer);
+ }
+
+ virtual Status Decrypt(const blink::WebCryptoAlgorithm& algorithm,
+ const blink::WebCryptoKey& key,
+ const CryptoData& data,
+ std::vector<uint8_t>* buffer) const OVERRIDE {
+ if (key.type() != blink::WebCryptoKeyTypePrivate)
+ return Status::ErrorUnexpectedKeyType();
+
+ return CommonEncryptDecrypt(
+ EVP_PKEY_decrypt_init, EVP_PKEY_decrypt, algorithm, key, data, buffer);
+ }
+};
+
+} // namespace
+
+AlgorithmImplementation* CreatePlatformRsaOaepImplementation() {
+ return new RsaOaepImplementation;
+}
+
+} // namespace webcrypto
+
+} // namespace content
« no previous file with comments | « no previous file | content/child/webcrypto/openssl/util_openssl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698