Index: content/child/webcrypto/openssl/rsa_oaep_openssl.cc |
diff --git a/content/child/webcrypto/openssl/rsa_oaep_openssl.cc b/content/child/webcrypto/openssl/rsa_oaep_openssl.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..dc12490dd49f8655910b62dc30d1ea9c14fe9a36 |
--- /dev/null |
+++ b/content/child/webcrypto/openssl/rsa_oaep_openssl.cc |
@@ -0,0 +1,153 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include <openssl/evp.h> |
+ |
+#include "base/stl_util.h" |
+#include "content/child/webcrypto/crypto_data.h" |
+#include "content/child/webcrypto/openssl/key_openssl.h" |
+#include "content/child/webcrypto/openssl/rsa_key_openssl.h" |
+#include "content/child/webcrypto/openssl/util_openssl.h" |
+#include "content/child/webcrypto/status.h" |
+#include "crypto/openssl_util.h" |
+#include "crypto/scoped_openssl_types.h" |
+#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" |
+#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
+ |
+namespace content { |
+ |
+namespace webcrypto { |
+ |
+namespace { |
+ |
+typedef int (*InitFunc)(EVP_PKEY_CTX* ctx); |
+typedef int (*EncryptDecryptFunc)(EVP_PKEY_CTX* ctx, |
+ unsigned char* out, |
+ size_t* outlen, |
+ const unsigned char* in, |
+ size_t inlen); |
+ |
+// Helper for doing either RSA-OAEP encryption or decryption. |
+// |
+// To encrypt call with: |
+// init_func=EVP_PKEY_encrypt_init, encrypt_decrypt_func=EVP_PKEY_encrypt |
+// |
+// To decrypt call with: |
+// init_func=EVP_PKEY_decrypt_init, encrypt_decrypt_func=EVP_PKEY_decrypt |
+Status CommonEncryptDecrypt(InitFunc init_func, |
+ EncryptDecryptFunc encrypt_decrypt_func, |
+ const blink::WebCryptoAlgorithm& algorithm, |
+ const blink::WebCryptoKey& key, |
+ const CryptoData& data, |
+ std::vector<uint8_t>* buffer) { |
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
+ |
+ EVP_PKEY* pkey = AsymKeyOpenSsl::Cast(key)->key(); |
+ const EVP_MD* digest = |
+ GetDigest(key.algorithm().rsaHashedParams()->hash().id()); |
+ if (!digest) |
+ return Status::ErrorUnsupported(); |
+ |
+ crypto::ScopedEVP_PKEY_CTX ctx(EVP_PKEY_CTX_new(pkey, NULL)); |
+ |
+ if (1 != init_func(ctx.get()) || |
+ 1 != EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_OAEP_PADDING) || |
+ 1 != EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), digest) || |
+ 1 != EVP_PKEY_CTX_set_rsa_mgf1_md(ctx.get(), digest)) { |
+ return Status::OperationError(); |
+ } |
+ |
+ const blink::WebVector<uint8_t>& label = |
+ algorithm.rsaOaepParams()->optionalLabel(); |
+ |
+ if (label.size()) { |
+ // Make a copy of the label, since the ctx takes ownership of it when |
+ // calling set0_rsa_oaep_label(). |
+ crypto::ScopedOpenSSLBytes label_copy; |
+ label_copy.reset(static_cast<uint8_t*>(OPENSSL_malloc(label.size()))); |
+ memcpy(label_copy.get(), label.data(), label.size()); |
+ |
+ if (1 != EVP_PKEY_CTX_set0_rsa_oaep_label( |
+ ctx.get(), label_copy.release(), label.size())) { |
+ return Status::OperationError(); |
+ } |
+ } |
+ |
+ // Determine the maximum length of the output. |
+ size_t outlen = 0; |
+ if (1 != encrypt_decrypt_func( |
+ ctx.get(), NULL, &outlen, data.bytes(), data.byte_length())) { |
+ return Status::OperationError(); |
+ } |
+ buffer->resize(outlen); |
+ |
+ // Do the actual encryption/decryption. |
+ if (1 != encrypt_decrypt_func(ctx.get(), |
+ vector_as_array(buffer), |
+ &outlen, |
+ data.bytes(), |
+ data.byte_length())) { |
+ return Status::OperationError(); |
+ } |
+ buffer->resize(outlen); |
+ |
+ return Status::Success(); |
+} |
+ |
+class RsaOaepImplementation : public RsaHashedAlgorithm { |
+ public: |
+ RsaOaepImplementation() |
+ : RsaHashedAlgorithm( |
+ blink::WebCryptoKeyUsageEncrypt | blink::WebCryptoKeyUsageWrapKey, |
+ blink::WebCryptoKeyUsageDecrypt | |
+ blink::WebCryptoKeyUsageUnwrapKey) {} |
+ |
+ virtual const char* GetJwkAlgorithm( |
+ const blink::WebCryptoAlgorithmId hash) const OVERRIDE { |
+ switch (hash) { |
+ case blink::WebCryptoAlgorithmIdSha1: |
+ return "RSA-OAEP"; |
+ case blink::WebCryptoAlgorithmIdSha256: |
+ return "RSA-OAEP-256"; |
+ case blink::WebCryptoAlgorithmIdSha384: |
+ return "RSA-OAEP-384"; |
+ case blink::WebCryptoAlgorithmIdSha512: |
+ return "RSA-OAEP-512"; |
+ default: |
+ return NULL; |
+ } |
+ } |
+ |
+ virtual Status Encrypt(const blink::WebCryptoAlgorithm& algorithm, |
+ const blink::WebCryptoKey& key, |
+ const CryptoData& data, |
+ std::vector<uint8_t>* buffer) const OVERRIDE { |
+ if (key.type() != blink::WebCryptoKeyTypePublic) |
+ return Status::ErrorUnexpectedKeyType(); |
+ |
+ return CommonEncryptDecrypt( |
+ EVP_PKEY_encrypt_init, EVP_PKEY_encrypt, algorithm, key, data, buffer); |
+ } |
+ |
+ virtual Status Decrypt(const blink::WebCryptoAlgorithm& algorithm, |
+ const blink::WebCryptoKey& key, |
+ const CryptoData& data, |
+ std::vector<uint8_t>* buffer) const OVERRIDE { |
+ if (key.type() != blink::WebCryptoKeyTypePrivate) |
+ return Status::ErrorUnexpectedKeyType(); |
+ |
+ return CommonEncryptDecrypt( |
+ EVP_PKEY_decrypt_init, EVP_PKEY_decrypt, algorithm, key, data, buffer); |
+ } |
+}; |
+ |
+} // namespace |
+ |
+AlgorithmImplementation* CreatePlatformRsaOaepImplementation() { |
+ return new RsaOaepImplementation; |
+} |
+ |
+} // namespace webcrypto |
+ |
+} // namespace content |