| Index: content/child/webcrypto/openssl/hkdf_openssl.cc
|
| diff --git a/content/child/webcrypto/openssl/hkdf_openssl.cc b/content/child/webcrypto/openssl/hkdf_openssl.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..7a33b96e892accc351a501e165b9c1b4100ce544
|
| --- /dev/null
|
| +++ b/content/child/webcrypto/openssl/hkdf_openssl.cc
|
| @@ -0,0 +1,127 @@
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include <openssl/err.h>
|
| +#include <openssl/hkdf.h>
|
| +
|
| +#include "base/logging.h"
|
| +#include "base/stl_util.h"
|
| +#include "content/child/webcrypto/algorithm_implementation.h"
|
| +#include "content/child/webcrypto/crypto_data.h"
|
| +#include "content/child/webcrypto/openssl/key_openssl.h"
|
| +#include "content/child/webcrypto/openssl/util_openssl.h"
|
| +#include "content/child/webcrypto/status.h"
|
| +#include "content/child/webcrypto/webcrypto_util.h"
|
| +#include "crypto/openssl_util.h"
|
| +#include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
|
| +#include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h"
|
| +
|
| +namespace content {
|
| +
|
| +namespace webcrypto {
|
| +
|
| +namespace {
|
| +
|
| +const blink::WebCryptoKeyUsageMask kValidUsages =
|
| + blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits;
|
| +
|
| +class HkdfImplementation : public AlgorithmImplementation {
|
| + public:
|
| + HkdfImplementation() {}
|
| +
|
| + Status VerifyKeyUsagesBeforeImportKey(
|
| + blink::WebCryptoKeyFormat format,
|
| + blink::WebCryptoKeyUsageMask usages) const override {
|
| + if (format != blink::WebCryptoKeyFormatRaw)
|
| + return Status::ErrorUnsupportedImportKeyFormat();
|
| + return CheckKeyCreationUsages(kValidUsages, usages, false);
|
| + }
|
| +
|
| + Status ImportKeyRaw(const CryptoData& key_data,
|
| + const blink::WebCryptoAlgorithm& algorithm,
|
| + bool extractable,
|
| + blink::WebCryptoKeyUsageMask usages,
|
| + blink::WebCryptoKey* key) const override {
|
| + return CreateWebCryptoSecretKey(
|
| + key_data, blink::WebCryptoKeyAlgorithm::createWithoutParams(
|
| + blink::WebCryptoAlgorithmIdHkdf),
|
| + extractable, usages, key);
|
| + }
|
| +
|
| + Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm,
|
| + const blink::WebCryptoKey& base_key,
|
| + bool has_optional_length_bits,
|
| + unsigned int optional_length_bits,
|
| + std::vector<uint8_t>* derived_bytes) const override {
|
| + crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
|
| + if (!has_optional_length_bits)
|
| + return Status::ErrorHkdfDeriveBitsLengthNotSpecified();
|
| +
|
| + const blink::WebCryptoHkdfParams* params = algorithm.hkdfParams();
|
| +
|
| + const EVP_MD* digest_algorithm = GetDigest(params->hash().id());
|
| + if (!digest_algorithm)
|
| + return Status::ErrorUnsupported();
|
| +
|
| + // Size output to fit length
|
| + unsigned int derived_bytes_len = NumBitsToBytes(optional_length_bits);
|
| + derived_bytes->resize(derived_bytes_len);
|
| +
|
| + // Algorithm dispatch checks that the algorithm in |base_key| matches
|
| + // |algorithm|.
|
| + const std::vector<uint8_t>& raw_key =
|
| + SymKeyOpenSsl::Cast(base_key)->raw_key_data();
|
| + const uint8_t* raw_key_ptr = raw_key.empty() ? NULL : &raw_key.front();
|
| + uint8_t* derived_bytes_ptr =
|
| + derived_bytes->empty() ? NULL : &derived_bytes->front();
|
| + if (!HKDF(derived_bytes_ptr, derived_bytes_len, digest_algorithm,
|
| + raw_key_ptr, raw_key.size(), params->salt().data(),
|
| + params->salt().size(), params->info().data(),
|
| + params->info().size())) {
|
| + uint32_t error = ERR_get_error();
|
| + if (ERR_GET_LIB(error) == ERR_LIB_HKDF &&
|
| + ERR_GET_REASON(error) == HKDF_R_OUTPUT_TOO_LARGE) {
|
| + return Status::ErrorHkdfLengthTooLong();
|
| + }
|
| + return Status::OperationError();
|
| + }
|
| +
|
| + TruncateToBitLength(optional_length_bits, derived_bytes);
|
| + return Status::Success();
|
| + }
|
| +
|
| + Status SerializeKeyForClone(
|
| + const blink::WebCryptoKey& key,
|
| + blink::WebVector<uint8_t>* key_data) const override {
|
| + key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data());
|
| + return Status::Success();
|
| + }
|
| +
|
| + Status DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm,
|
| + blink::WebCryptoKeyType type,
|
| + bool extractable,
|
| + blink::WebCryptoKeyUsageMask usages,
|
| + const CryptoData& key_data,
|
| + blink::WebCryptoKey* key) const override {
|
| + return CreateWebCryptoSecretKey(key_data, algorithm, extractable, usages,
|
| + key);
|
| + }
|
| +
|
| + Status GetKeyLength(const blink::WebCryptoAlgorithm& key_length_algorithm,
|
| + bool* has_length_bits,
|
| + unsigned int* length_bits) const override {
|
| + *has_length_bits = false;
|
| + return Status::Success();
|
| + }
|
| +};
|
| +
|
| +} // namespace
|
| +
|
| +AlgorithmImplementation* CreatePlatformHkdfImplementation() {
|
| + return new HkdfImplementation;
|
| +}
|
| +
|
| +} // namespace webcrypto
|
| +
|
| +} // namespace content
|
|
|