blob: f870f6ab5e71ec0839f88c8969c94d0378b843d9 [file] [log] [blame]
[email protected]bfde7442012-05-02 20:47:471// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]28ae8fe2009-06-05 18:25:062// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]4b559b4d2011-04-14 17:37:145#include "crypto/rsa_private_key.h"
[email protected]28ae8fe2009-06-05 18:25:066
7#include <list>
8
9#include "base/logging.h"
[email protected]3b63f8f42011-03-28 01:54:1510#include "base/memory/scoped_ptr.h"
[email protected]aeea2292009-06-20 01:39:2311#include "base/string_util.h"
[email protected]28ae8fe2009-06-05 18:25:0612
[email protected]e73acd52011-06-03 21:39:1313#pragma comment(lib, "crypt32.lib")
14
[email protected]4b559b4d2011-04-14 17:37:1415namespace crypto {
[email protected]28ae8fe2009-06-05 18:25:0616
17// static
18RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) {
19 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
20 if (!result->InitProvider())
21 return NULL;
22
23 DWORD flags = CRYPT_EXPORTABLE;
24
25 // The size is encoded as the upper 16 bits of the flags. :: sigh ::.
26 flags |= (num_bits << 16);
[email protected]692033a2010-04-09 18:40:5027 if (!CryptGenKey(result->provider_, CALG_RSA_SIGN, flags,
28 result->key_.receive()))
[email protected]28ae8fe2009-06-05 18:25:0629 return NULL;
30
[email protected]28ae8fe2009-06-05 18:25:0631 return result.release();
32}
33
34// static
[email protected]74648052010-08-10 19:37:5135RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) {
36 NOTIMPLEMENTED();
37 return NULL;
38}
39
40// static
[email protected]28ae8fe2009-06-05 18:25:0641RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo(
42 const std::vector<uint8>& input) {
43 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
44 if (!result->InitProvider())
45 return NULL;
46
[email protected]308379a52009-10-07 02:46:3147 PrivateKeyInfoCodec pki(false); // Little-Endian
[email protected]b163bc12012-05-04 04:11:4248 if (!pki.Import(input))
49 return NULL;
[email protected]28ae8fe2009-06-05 18:25:0650
[email protected]b163bc12012-05-04 04:11:4251 size_t blob_size = sizeof(PUBLICKEYSTRUC) +
52 sizeof(RSAPUBKEY) +
53 pki.modulus()->size() +
54 pki.prime1()->size() +
55 pki.prime2()->size() +
56 pki.exponent1()->size() +
57 pki.exponent2()->size() +
58 pki.coefficient()->size() +
59 pki.private_exponent()->size();
[email protected]28ae8fe2009-06-05 18:25:0660 scoped_array<BYTE> blob(new BYTE[blob_size]);
61
62 uint8* dest = blob.get();
63 PUBLICKEYSTRUC* public_key_struc = reinterpret_cast<PUBLICKEYSTRUC*>(dest);
64 public_key_struc->bType = PRIVATEKEYBLOB;
65 public_key_struc->bVersion = 0x02;
66 public_key_struc->reserved = 0;
67 public_key_struc->aiKeyAlg = CALG_RSA_SIGN;
68 dest += sizeof(PUBLICKEYSTRUC);
69
70 RSAPUBKEY* rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(dest);
71 rsa_pub_key->magic = 0x32415352;
[email protected]308379a52009-10-07 02:46:3172 rsa_pub_key->bitlen = pki.modulus()->size() * 8;
[email protected]28ae8fe2009-06-05 18:25:0673 int public_exponent_int = 0;
[email protected]308379a52009-10-07 02:46:3174 for (size_t i = pki.public_exponent()->size(); i > 0; --i) {
[email protected]28ae8fe2009-06-05 18:25:0675 public_exponent_int <<= 8;
[email protected]308379a52009-10-07 02:46:3176 public_exponent_int |= (*pki.public_exponent())[i - 1];
[email protected]28ae8fe2009-06-05 18:25:0677 }
78 rsa_pub_key->pubexp = public_exponent_int;
79 dest += sizeof(RSAPUBKEY);
80
[email protected]308379a52009-10-07 02:46:3181 memcpy(dest, &pki.modulus()->front(), pki.modulus()->size());
82 dest += pki.modulus()->size();
83 memcpy(dest, &pki.prime1()->front(), pki.prime1()->size());
84 dest += pki.prime1()->size();
85 memcpy(dest, &pki.prime2()->front(), pki.prime2()->size());
86 dest += pki.prime2()->size();
87 memcpy(dest, &pki.exponent1()->front(), pki.exponent1()->size());
88 dest += pki.exponent1()->size();
89 memcpy(dest, &pki.exponent2()->front(), pki.exponent2()->size());
90 dest += pki.exponent2()->size();
91 memcpy(dest, &pki.coefficient()->front(), pki.coefficient()->size());
92 dest += pki.coefficient()->size();
[email protected]08ce4d42010-10-21 00:31:1993 memcpy(dest, &pki.private_exponent()->front(),
94 pki.private_exponent()->size());
[email protected]308379a52009-10-07 02:46:3195 dest += pki.private_exponent()->size();
[email protected]28ae8fe2009-06-05 18:25:0696
[email protected]bfde7442012-05-02 20:47:4797 if (dest != blob.get() + blob_size) {
98 NOTREACHED();
99 return NULL;
100 }
[email protected]08ce4d42010-10-21 00:31:19101 if (!CryptImportKey(result->provider_,
[email protected]b163bc12012-05-04 04:11:42102 reinterpret_cast<uint8*>(public_key_struc),
103 static_cast<DWORD>(blob_size), 0, CRYPT_EXPORTABLE,
104 result->key_.receive())) {
[email protected]28ae8fe2009-06-05 18:25:06105 return NULL;
[email protected]b163bc12012-05-04 04:11:42106 }
[email protected]28ae8fe2009-06-05 18:25:06107
108 return result.release();
109}
110
[email protected]74648052010-08-10 19:37:51111// static
112RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo(
113 const std::vector<uint8>& input) {
114 NOTIMPLEMENTED();
115 return NULL;
116}
117
118// static
119RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo(
120 const std::vector<uint8>& input) {
121 NOTIMPLEMENTED();
122 return NULL;
123}
124
[email protected]28ae8fe2009-06-05 18:25:06125RSAPrivateKey::RSAPrivateKey() : provider_(NULL), key_(NULL) {}
126
[email protected]692033a2010-04-09 18:40:50127RSAPrivateKey::~RSAPrivateKey() {}
[email protected]28ae8fe2009-06-05 18:25:06128
129bool RSAPrivateKey::InitProvider() {
[email protected]692033a2010-04-09 18:40:50130 return FALSE != CryptAcquireContext(provider_.receive(), NULL, NULL,
[email protected]28ae8fe2009-06-05 18:25:06131 PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
132}
133
[email protected]58782882011-12-03 01:12:08134RSAPrivateKey* RSAPrivateKey::Copy() const {
135 scoped_ptr<RSAPrivateKey> copy(new RSAPrivateKey());
136 if (!CryptContextAddRef(provider_, NULL, 0)) {
137 NOTREACHED();
138 return NULL;
139 }
140 copy->provider_.reset(provider_.get());
141 if (!CryptDuplicateKey(key_.get(), NULL, 0, copy->key_.receive()))
142 return NULL;
143 return copy.release();
144}
145
146bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) const {
[email protected]28ae8fe2009-06-05 18:25:06147 // Export the key
148 DWORD blob_length = 0;
[email protected]08ce4d42010-10-21 00:31:19149 if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, NULL, &blob_length)) {
[email protected]28ae8fe2009-06-05 18:25:06150 NOTREACHED();
151 return false;
152 }
153
154 scoped_array<uint8> blob(new uint8[blob_length]);
[email protected]08ce4d42010-10-21 00:31:19155 if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, blob.get(), &blob_length)) {
[email protected]28ae8fe2009-06-05 18:25:06156 NOTREACHED();
157 return false;
158 }
159
160 uint8* pos = blob.get();
161 PUBLICKEYSTRUC *publickey_struct = reinterpret_cast<PUBLICKEYSTRUC*>(pos);
162 pos += sizeof(PUBLICKEYSTRUC);
163
164 RSAPUBKEY *rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(pos);
165 pos += sizeof(RSAPUBKEY);
166
167 int mod_size = rsa_pub_key->bitlen / 8;
168 int primes_size = rsa_pub_key->bitlen / 16;
[email protected]28ae8fe2009-06-05 18:25:06169
[email protected]308379a52009-10-07 02:46:31170 PrivateKeyInfoCodec pki(false); // Little-Endian
171
172 pki.modulus()->assign(pos, pos + mod_size);
[email protected]28ae8fe2009-06-05 18:25:06173 pos += mod_size;
174
[email protected]308379a52009-10-07 02:46:31175 pki.prime1()->assign(pos, pos + primes_size);
[email protected]28ae8fe2009-06-05 18:25:06176 pos += primes_size;
[email protected]308379a52009-10-07 02:46:31177 pki.prime2()->assign(pos, pos + primes_size);
[email protected]28ae8fe2009-06-05 18:25:06178 pos += primes_size;
179
[email protected]308379a52009-10-07 02:46:31180 pki.exponent1()->assign(pos, pos + primes_size);
[email protected]fbc97c52009-06-22 17:17:26181 pos += primes_size;
[email protected]308379a52009-10-07 02:46:31182 pki.exponent2()->assign(pos, pos + primes_size);
[email protected]fbc97c52009-06-22 17:17:26183 pos += primes_size;
[email protected]28ae8fe2009-06-05 18:25:06184
[email protected]308379a52009-10-07 02:46:31185 pki.coefficient()->assign(pos, pos + primes_size);
[email protected]fbc97c52009-06-22 17:17:26186 pos += primes_size;
[email protected]28ae8fe2009-06-05 18:25:06187
[email protected]308379a52009-10-07 02:46:31188 pki.private_exponent()->assign(pos, pos + mod_size);
[email protected]fbc97c52009-06-22 17:17:26189 pos += mod_size;
[email protected]28ae8fe2009-06-05 18:25:06190
[email protected]308379a52009-10-07 02:46:31191 pki.public_exponent()->assign(reinterpret_cast<uint8*>(&rsa_pub_key->pubexp),
192 reinterpret_cast<uint8*>(&rsa_pub_key->pubexp) + 4);
193
[email protected]37199a82010-03-02 18:29:42194 CHECK_EQ(pos - blob_length, reinterpret_cast<BYTE*>(publickey_struct));
[email protected]28ae8fe2009-06-05 18:25:06195
[email protected]308379a52009-10-07 02:46:31196 return pki.Export(output);
[email protected]28ae8fe2009-06-05 18:25:06197}
198
[email protected]58782882011-12-03 01:12:08199bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) const {
[email protected]28ae8fe2009-06-05 18:25:06200 DWORD key_info_len;
201 if (!CryptExportPublicKeyInfo(
202 provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
203 NULL, &key_info_len)) {
204 NOTREACHED();
205 return false;
206 }
207
208 scoped_array<uint8> key_info(new uint8[key_info_len]);
209 if (!CryptExportPublicKeyInfo(
210 provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
211 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) {
212 NOTREACHED();
213 return false;
214 }
215
216 DWORD encoded_length;
217 if (!CryptEncodeObject(
218 X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
219 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL,
220 &encoded_length)) {
221 NOTREACHED();
222 return false;
223 }
224
225 scoped_array<BYTE> encoded(new BYTE[encoded_length]);
226 if (!CryptEncodeObject(
227 X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
228 reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(),
229 &encoded_length)) {
230 NOTREACHED();
231 return false;
232 }
233
[email protected]9dd6a2d2011-11-15 04:45:16234 output->assign(encoded.get(), encoded.get() + encoded_length);
[email protected]28ae8fe2009-06-05 18:25:06235 return true;
236}
237
[email protected]4b559b4d2011-04-14 17:37:14238} // namespace crypto