Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(8)

Side by Side Diff: crypto/rsa_private_key.h

Issue 6805019: Move crypto files out of base, to a top level directory. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Fixes comments by eroman Created 9 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « crypto/openssl_util.cc ('k') | crypto/rsa_private_key.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Property Changes:
Added: svn:eol-style
+ LF
OLDNEW
(Empty)
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef CRYPTO_RSA_PRIVATE_KEY_H_
6 #define CRYPTO_RSA_PRIVATE_KEY_H_
7 #pragma once
8
9 #include "build/build_config.h"
10
11 #if defined(USE_OPENSSL)
12 // Forward declaration for openssl/*.h
13 typedef struct evp_pkey_st EVP_PKEY;
14 #elif defined(USE_NSS)
15 // Forward declaration.
16 struct SECKEYPrivateKeyStr;
17 struct SECKEYPublicKeyStr;
18 #elif defined(OS_MACOSX)
19 #include <Security/cssm.h>
20 #endif
21
22 #include <list>
23 #include <vector>
24
25 #include "base/basictypes.h"
26
27 #if defined(OS_WIN)
28 #include "crypto/scoped_capi_types.h"
29 #endif
30 #if defined(USE_NSS)
31 #include "base/gtest_prod_util.h"
32 #endif
33
34 namespace crypto {
35
36 // Used internally by RSAPrivateKey for serializing and deserializing
37 // PKCS #8 PrivateKeyInfo and PublicKeyInfo.
38 class PrivateKeyInfoCodec {
39 public:
40
41 // ASN.1 encoding of the AlgorithmIdentifier from PKCS #8.
42 static const uint8 kRsaAlgorithmIdentifier[];
43
44 // ASN.1 tags for some types we use.
45 static const uint8 kBitStringTag = 0x03;
46 static const uint8 kIntegerTag = 0x02;
47 static const uint8 kNullTag = 0x05;
48 static const uint8 kOctetStringTag = 0x04;
49 static const uint8 kSequenceTag = 0x30;
50
51 // |big_endian| here specifies the byte-significance of the integer components
52 // that will be parsed & serialized (modulus(), etc...) during Import(),
53 // Export() and ExportPublicKeyInfo() -- not the ASN.1 DER encoding of the
54 // PrivateKeyInfo/PublicKeyInfo (which is always big-endian).
55 explicit PrivateKeyInfoCodec(bool big_endian);
56
57 ~PrivateKeyInfoCodec();
58
59 // Exports the contents of the integer components to the ASN.1 DER encoding
60 // of the PrivateKeyInfo structure to |output|.
61 bool Export(std::vector<uint8>* output);
62
63 // Exports the contents of the integer components to the ASN.1 DER encoding
64 // of the PublicKeyInfo structure to |output|.
65 bool ExportPublicKeyInfo(std::vector<uint8>* output);
66
67 // Exports the contents of the integer components to the ASN.1 DER encoding
68 // of the RSAPublicKey structure to |output|.
69 bool ExportPublicKey(std::vector<uint8>* output);
70
71 // Parses the ASN.1 DER encoding of the PrivateKeyInfo structure in |input|
72 // and populates the integer components with |big_endian_| byte-significance.
73 // IMPORTANT NOTE: This is currently *not* security-approved for importing
74 // keys from unstrusted sources.
75 bool Import(const std::vector<uint8>& input);
76
77 // Accessors to the contents of the integer components of the PrivateKeyInfo
78 // structure.
79 std::vector<uint8>* modulus() { return &modulus_; };
80 std::vector<uint8>* public_exponent() { return &public_exponent_; };
81 std::vector<uint8>* private_exponent() { return &private_exponent_; };
82 std::vector<uint8>* prime1() { return &prime1_; };
83 std::vector<uint8>* prime2() { return &prime2_; };
84 std::vector<uint8>* exponent1() { return &exponent1_; };
85 std::vector<uint8>* exponent2() { return &exponent2_; };
86 std::vector<uint8>* coefficient() { return &coefficient_; };
87
88 private:
89 // Utility wrappers for PrependIntegerImpl that use the class's |big_endian_|
90 // value.
91 void PrependInteger(const std::vector<uint8>& in, std::list<uint8>* out);
92 void PrependInteger(uint8* val, int num_bytes, std::list<uint8>* data);
93
94 // Prepends the integer stored in |val| - |val + num_bytes| with |big_endian|
95 // byte-significance into |data| as an ASN.1 integer.
96 void PrependIntegerImpl(uint8* val,
97 int num_bytes,
98 std::list<uint8>* data,
99 bool big_endian);
100
101 // Utility wrappers for ReadIntegerImpl that use the class's |big_endian_|
102 // value.
103 bool ReadInteger(uint8** pos, uint8* end, std::vector<uint8>* out);
104 bool ReadIntegerWithExpectedSize(uint8** pos,
105 uint8* end,
106 size_t expected_size,
107 std::vector<uint8>* out);
108
109 // Reads an ASN.1 integer from |pos|, and stores the result into |out| with
110 // |big_endian| byte-significance.
111 bool ReadIntegerImpl(uint8** pos,
112 uint8* end,
113 std::vector<uint8>* out,
114 bool big_endian);
115
116 // Prepends the integer stored in |val|, starting a index |start|, for
117 // |num_bytes| bytes onto |data|.
118 void PrependBytes(uint8* val,
119 int start,
120 int num_bytes,
121 std::list<uint8>* data);
122
123 // Helper to prepend an ASN.1 length field.
124 void PrependLength(size_t size, std::list<uint8>* data);
125
126 // Helper to prepend an ASN.1 type header.
127 void PrependTypeHeaderAndLength(uint8 type,
128 uint32 length,
129 std::list<uint8>* output);
130
131 // Helper to prepend an ASN.1 bit string
132 void PrependBitString(uint8* val, int num_bytes, std::list<uint8>* output);
133
134 // Read an ASN.1 length field. This also checks that the length does not
135 // extend beyond |end|.
136 bool ReadLength(uint8** pos, uint8* end, uint32* result);
137
138 // Read an ASN.1 type header and its length.
139 bool ReadTypeHeaderAndLength(uint8** pos,
140 uint8* end,
141 uint8 expected_tag,
142 uint32* length);
143
144 // Read an ASN.1 sequence declaration. This consumes the type header and
145 // length field, but not the contents of the sequence.
146 bool ReadSequence(uint8** pos, uint8* end);
147
148 // Read the RSA AlgorithmIdentifier.
149 bool ReadAlgorithmIdentifier(uint8** pos, uint8* end);
150
151 // Read one of the two version fields in PrivateKeyInfo.
152 bool ReadVersion(uint8** pos, uint8* end);
153
154 // The byte-significance of the stored components (modulus, etc..).
155 bool big_endian_;
156
157 // Component integers of the PrivateKeyInfo
158 std::vector<uint8> modulus_;
159 std::vector<uint8> public_exponent_;
160 std::vector<uint8> private_exponent_;
161 std::vector<uint8> prime1_;
162 std::vector<uint8> prime2_;
163 std::vector<uint8> exponent1_;
164 std::vector<uint8> exponent2_;
165 std::vector<uint8> coefficient_;
166
167 DISALLOW_COPY_AND_ASSIGN(PrivateKeyInfoCodec);
168 };
169
170 // Encapsulates an RSA private key. Can be used to generate new keys, export
171 // keys to other formats, or to extract a public key.
172 // TODO(hclam): This class should be ref-counted so it can be reused easily.
173 class RSAPrivateKey {
174 public:
175 ~RSAPrivateKey();
176
177 // Create a new random instance. Can return NULL if initialization fails.
178 static RSAPrivateKey* Create(uint16 num_bits);
179
180 // Create a new random instance. Can return NULL if initialization fails.
181 // The created key is permanent and is not exportable in plaintext form.
182 //
183 // NOTE: Currently only available if USE_NSS is defined.
184 static RSAPrivateKey* CreateSensitive(uint16 num_bits);
185
186 // Create a new instance by importing an existing private key. The format is
187 // an ASN.1-encoded PrivateKeyInfo block from PKCS #8. This can return NULL if
188 // initialization fails.
189 static RSAPrivateKey* CreateFromPrivateKeyInfo(
190 const std::vector<uint8>& input);
191
192 // Create a new instance by importing an existing private key. The format is
193 // an ASN.1-encoded PrivateKeyInfo block from PKCS #8. This can return NULL if
194 // initialization fails.
195 // The created key is permanent and is not exportable in plaintext form.
196 //
197 // NOTE: Currently only available if USE_NSS is defined.
198 static RSAPrivateKey* CreateSensitiveFromPrivateKeyInfo(
199 const std::vector<uint8>& input);
200
201 // Import an existing public key, and then search for the private
202 // half in the key database. The format of the public key blob is is
203 // an X509 SubjectPublicKeyInfo block. This can return NULL if
204 // initialization fails or the private key cannot be found. The
205 // caller takes ownership of the returned object, but nothing new is
206 // created in the key database.
207 //
208 // NOTE: Currently only available if USE_NSS is defined.
209 static RSAPrivateKey* FindFromPublicKeyInfo(
210 const std::vector<uint8>& input);
211
212 #if defined(USE_OPENSSL)
213 EVP_PKEY* key() { return key_; }
214 #elif defined(USE_NSS)
215 SECKEYPrivateKeyStr* key() { return key_; }
216 SECKEYPublicKeyStr* public_key() { return public_key_; }
217 #elif defined(OS_WIN)
218 HCRYPTPROV provider() { return provider_; }
219 HCRYPTKEY key() { return key_; }
220 #elif defined(OS_MACOSX)
221 CSSM_KEY_PTR key() { return &key_; }
222 CSSM_KEY_PTR public_key() { return &public_key_; }
223 #endif
224
225 // Exports the private key to a PKCS #1 PrivateKey block.
226 bool ExportPrivateKey(std::vector<uint8>* output);
227
228 // Exports the public key to an X509 SubjectPublicKeyInfo block.
229 bool ExportPublicKey(std::vector<uint8>* output);
230
231 private:
232 #if defined(USE_NSS)
233 FRIEND_TEST_ALL_PREFIXES(RSAPrivateKeyNSSTest, FindFromPublicKey);
234 FRIEND_TEST_ALL_PREFIXES(RSAPrivateKeyNSSTest, FailedFindFromPublicKey);
235 #endif
236
237 // Constructor is private. Use one of the Create*() or Find*()
238 // methods above instead.
239 RSAPrivateKey();
240
241 // Shared helper for Create() and CreateSensitive().
242 // TODO(cmasone): consider replacing |permanent| and |sensitive| with a
243 // flags arg created by ORing together some enumerated values.
244 static RSAPrivateKey* CreateWithParams(uint16 num_bits,
245 bool permanent,
246 bool sensitive);
247
248 // Shared helper for CreateFromPrivateKeyInfo() and
249 // CreateSensitiveFromPrivateKeyInfo().
250 static RSAPrivateKey* CreateFromPrivateKeyInfoWithParams(
251 const std::vector<uint8>& input, bool permanent, bool sensitive);
252
253 #if defined(USE_OPENSSL)
254 EVP_PKEY* key_;
255 #elif defined(USE_NSS)
256 SECKEYPrivateKeyStr* key_;
257 SECKEYPublicKeyStr* public_key_;
258 #elif defined(OS_WIN)
259 bool InitProvider();
260
261 ScopedHCRYPTPROV provider_;
262 ScopedHCRYPTKEY key_;
263 #elif defined(OS_MACOSX)
264 CSSM_KEY key_;
265 CSSM_KEY public_key_;
266 #endif
267
268 DISALLOW_COPY_AND_ASSIGN(RSAPrivateKey);
269 };
270
271 } // namespace crypto
272
273 #endif // CRYPTO_RSA_PRIVATE_KEY_H_
OLDNEW
« no previous file with comments | « crypto/openssl_util.cc ('k') | crypto/rsa_private_key.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698