• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "crypto/rsa_private_key.h"
6 
7 #include <list>
8 
9 #include "base/logging.h"
10 #include "base/memory/scoped_ptr.h"
11 #include "base/string_util.h"
12 
13 namespace {
14   // Helper for error handling during key import.
15 #define READ_ASSERT(truth) \
16   if (!(truth)) { \
17   NOTREACHED(); \
18   return false; \
19   }
20 }  // namespace
21 
22 namespace crypto {
23 
24 // static
Create(uint16 num_bits)25 RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) {
26   scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
27   if (!result->InitProvider())
28     return NULL;
29 
30   DWORD flags = CRYPT_EXPORTABLE;
31 
32   // The size is encoded as the upper 16 bits of the flags. :: sigh ::.
33   flags |= (num_bits << 16);
34   if (!CryptGenKey(result->provider_, CALG_RSA_SIGN, flags,
35                    result->key_.receive()))
36     return NULL;
37 
38   return result.release();
39 }
40 
41 // static
CreateSensitive(uint16 num_bits)42 RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) {
43   NOTIMPLEMENTED();
44   return NULL;
45 }
46 
47 // static
CreateFromPrivateKeyInfo(const std::vector<uint8> & input)48 RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo(
49     const std::vector<uint8>& input) {
50   scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
51   if (!result->InitProvider())
52     return NULL;
53 
54   PrivateKeyInfoCodec pki(false);  // Little-Endian
55   pki.Import(input);
56 
57   int blob_size = sizeof(PUBLICKEYSTRUC) +
58                   sizeof(RSAPUBKEY) +
59                   pki.modulus()->size() +
60                   pki.prime1()->size() +
61                   pki.prime2()->size() +
62                   pki.exponent1()->size() +
63                   pki.exponent2()->size() +
64                   pki.coefficient()->size() +
65                   pki.private_exponent()->size();
66   scoped_array<BYTE> blob(new BYTE[blob_size]);
67 
68   uint8* dest = blob.get();
69   PUBLICKEYSTRUC* public_key_struc = reinterpret_cast<PUBLICKEYSTRUC*>(dest);
70   public_key_struc->bType = PRIVATEKEYBLOB;
71   public_key_struc->bVersion = 0x02;
72   public_key_struc->reserved = 0;
73   public_key_struc->aiKeyAlg = CALG_RSA_SIGN;
74   dest += sizeof(PUBLICKEYSTRUC);
75 
76   RSAPUBKEY* rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(dest);
77   rsa_pub_key->magic = 0x32415352;
78   rsa_pub_key->bitlen = pki.modulus()->size() * 8;
79   int public_exponent_int = 0;
80   for (size_t i = pki.public_exponent()->size(); i > 0; --i) {
81     public_exponent_int <<= 8;
82     public_exponent_int |= (*pki.public_exponent())[i - 1];
83   }
84   rsa_pub_key->pubexp = public_exponent_int;
85   dest += sizeof(RSAPUBKEY);
86 
87   memcpy(dest, &pki.modulus()->front(), pki.modulus()->size());
88   dest += pki.modulus()->size();
89   memcpy(dest, &pki.prime1()->front(), pki.prime1()->size());
90   dest += pki.prime1()->size();
91   memcpy(dest, &pki.prime2()->front(), pki.prime2()->size());
92   dest += pki.prime2()->size();
93   memcpy(dest, &pki.exponent1()->front(), pki.exponent1()->size());
94   dest += pki.exponent1()->size();
95   memcpy(dest, &pki.exponent2()->front(), pki.exponent2()->size());
96   dest += pki.exponent2()->size();
97   memcpy(dest, &pki.coefficient()->front(), pki.coefficient()->size());
98   dest += pki.coefficient()->size();
99   memcpy(dest, &pki.private_exponent()->front(),
100          pki.private_exponent()->size());
101   dest += pki.private_exponent()->size();
102 
103   READ_ASSERT(dest == blob.get() + blob_size);
104   if (!CryptImportKey(result->provider_,
105                       reinterpret_cast<uint8*>(public_key_struc), blob_size, 0,
106                       CRYPT_EXPORTABLE, result->key_.receive()))
107     return NULL;
108 
109   return result.release();
110 }
111 
112 // static
CreateSensitiveFromPrivateKeyInfo(const std::vector<uint8> & input)113 RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo(
114     const std::vector<uint8>& input) {
115   NOTIMPLEMENTED();
116   return NULL;
117 }
118 
119 // static
FindFromPublicKeyInfo(const std::vector<uint8> & input)120 RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo(
121     const std::vector<uint8>& input) {
122   NOTIMPLEMENTED();
123   return NULL;
124 }
125 
RSAPrivateKey()126 RSAPrivateKey::RSAPrivateKey() : provider_(NULL), key_(NULL) {}
127 
~RSAPrivateKey()128 RSAPrivateKey::~RSAPrivateKey() {}
129 
InitProvider()130 bool RSAPrivateKey::InitProvider() {
131   return FALSE != CryptAcquireContext(provider_.receive(), NULL, NULL,
132                                       PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
133 }
134 
ExportPrivateKey(std::vector<uint8> * output)135 bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) {
136   // Export the key
137   DWORD blob_length = 0;
138   if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, NULL, &blob_length)) {
139     NOTREACHED();
140     return false;
141   }
142 
143   scoped_array<uint8> blob(new uint8[blob_length]);
144   if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, blob.get(), &blob_length)) {
145     NOTREACHED();
146     return false;
147   }
148 
149   uint8* pos = blob.get();
150   PUBLICKEYSTRUC *publickey_struct = reinterpret_cast<PUBLICKEYSTRUC*>(pos);
151   pos += sizeof(PUBLICKEYSTRUC);
152 
153   RSAPUBKEY *rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(pos);
154   pos += sizeof(RSAPUBKEY);
155 
156   int mod_size = rsa_pub_key->bitlen / 8;
157   int primes_size = rsa_pub_key->bitlen / 16;
158 
159   PrivateKeyInfoCodec pki(false);  // Little-Endian
160 
161   pki.modulus()->assign(pos, pos + mod_size);
162   pos += mod_size;
163 
164   pki.prime1()->assign(pos, pos + primes_size);
165   pos += primes_size;
166   pki.prime2()->assign(pos, pos + primes_size);
167   pos += primes_size;
168 
169   pki.exponent1()->assign(pos, pos + primes_size);
170   pos += primes_size;
171   pki.exponent2()->assign(pos, pos + primes_size);
172   pos += primes_size;
173 
174   pki.coefficient()->assign(pos, pos + primes_size);
175   pos += primes_size;
176 
177   pki.private_exponent()->assign(pos, pos + mod_size);
178   pos += mod_size;
179 
180   pki.public_exponent()->assign(reinterpret_cast<uint8*>(&rsa_pub_key->pubexp),
181       reinterpret_cast<uint8*>(&rsa_pub_key->pubexp) + 4);
182 
183   CHECK_EQ(pos - blob_length, reinterpret_cast<BYTE*>(publickey_struct));
184 
185   return pki.Export(output);
186 }
187 
ExportPublicKey(std::vector<uint8> * output)188 bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) {
189   DWORD key_info_len;
190   if (!CryptExportPublicKeyInfo(
191       provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
192       NULL, &key_info_len)) {
193     NOTREACHED();
194     return false;
195   }
196 
197   scoped_array<uint8> key_info(new uint8[key_info_len]);
198   if (!CryptExportPublicKeyInfo(
199       provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
200       reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) {
201     NOTREACHED();
202     return false;
203   }
204 
205   DWORD encoded_length;
206   if (!CryptEncodeObject(
207       X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
208       reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL,
209       &encoded_length)) {
210     NOTREACHED();
211     return false;
212   }
213 
214   scoped_array<BYTE> encoded(new BYTE[encoded_length]);
215   if (!CryptEncodeObject(
216       X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
217       reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(),
218       &encoded_length)) {
219     NOTREACHED();
220     return false;
221   }
222 
223   for (size_t i = 0; i < encoded_length; ++i)
224     output->push_back(encoded[i]);
225 
226   return true;
227 }
228 
229 }  // namespace crypto
230