// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/cert/jwk_serializer.h" #include #include #include #include "base/base64.h" #include "base/values.h" #include "crypto/nss_util.h" #include "crypto/scoped_nss_types.h" namespace net { namespace JwkSerializer { namespace { bool ConvertEcPrime256v1PublicKeyInfoToJwk( CERTSubjectPublicKeyInfo* spki, base::DictionaryValue* public_key_jwk) { static const int kUncompressedEncodingType = 4; static const int kPrime256v1PublicKeyLength = 64; // The public key value is encoded as 0x04 + 64 bytes of public key. // NSS gives the length as the bit length. if (spki->subjectPublicKey.len != (kPrime256v1PublicKeyLength + 1) * 8 || spki->subjectPublicKey.data[0] != kUncompressedEncodingType) return false; public_key_jwk->SetString("kty", "EC"); public_key_jwk->SetString("crv", "P-256"); base::StringPiece x( reinterpret_cast(spki->subjectPublicKey.data + 1), kPrime256v1PublicKeyLength / 2); std::string x_b64; base::Base64Encode(x, &x_b64); public_key_jwk->SetString("x", x_b64); base::StringPiece y( reinterpret_cast(spki->subjectPublicKey.data + 1 + kPrime256v1PublicKeyLength / 2), kPrime256v1PublicKeyLength / 2); std::string y_b64; base::Base64Encode(y, &y_b64); public_key_jwk->SetString("y", y_b64); return true; } bool ConvertEcPublicKeyInfoToJwk( CERTSubjectPublicKeyInfo* spki, base::DictionaryValue* public_key_jwk) { // 1.2.840.10045.3.1.7 // (iso.member-body.us.ansi-x9-62.ellipticCurve.primeCurve.prime256v1) // (This includes the DER-encoded type (OID) and length: parameters can be // anything, so the DER type isn't implied, and NSS includes it.) static const unsigned char kPrime256v1[] = { 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 }; if (spki->algorithm.parameters.len == sizeof(kPrime256v1) && !memcmp(spki->algorithm.parameters.data, kPrime256v1, sizeof(kPrime256v1))) { return ConvertEcPrime256v1PublicKeyInfoToJwk(spki, public_key_jwk); } // TODO(juanlang): other curves return false; } typedef scoped_ptr< CERTSubjectPublicKeyInfo, crypto::NSSDestroyer > ScopedCERTSubjectPublicKeyInfo; } // namespace bool ConvertSpkiFromDerToJwk( const base::StringPiece& spki_der, base::DictionaryValue* public_key_jwk) { public_key_jwk->Clear(); crypto::EnsureNSSInit(); if (!NSS_IsInitialized()) return false; SECItem sec_item; sec_item.data = const_cast( reinterpret_cast(spki_der.data())); sec_item.len = spki_der.size(); ScopedCERTSubjectPublicKeyInfo spki( SECKEY_DecodeDERSubjectPublicKeyInfo(&sec_item)); if (!spki) return false; // 1.2.840.10045.2 // (iso.member-body.us.ansi-x9-62.id-ecPublicKey) // (This omits the ASN.1 encoding of the type (OID) and length: the fact that // this is an OID is already clear, and NSS omits it here.) static const unsigned char kIdEcPublicKey[] = { 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01 }; bool rv = false; if (spki->algorithm.algorithm.len == sizeof(kIdEcPublicKey) && !memcmp(spki->algorithm.algorithm.data, kIdEcPublicKey, sizeof(kIdEcPublicKey))) { rv = ConvertEcPublicKeyInfoToJwk(spki.get(), public_key_jwk); } // TODO(juanlang): other algorithms return rv; } } // namespace JwkSerializer } // namespace net