summaryrefslogtreecommitdiffstats
path: root/net/quic/crypto/p256_key_exchange_openssl.cc
blob: ae7f30e9583d0f1984fd52d003f9fbbc589bd217 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "net/quic/crypto/p256_key_exchange.h"

#include <openssl/ec.h>
#include <openssl/ecdh.h>
#include <openssl/evp.h>

#include "base/logging.h"

namespace net {

P256KeyExchange::P256KeyExchange(EC_KEY* private_key, const uint8* public_key)
    : private_key_(private_key) {
  memcpy(public_key_, public_key, sizeof(public_key_));
}

P256KeyExchange::~P256KeyExchange() {
}

// static
P256KeyExchange* P256KeyExchange::New(base::StringPiece key) {
  if (key.empty()) {
    DLOG(INFO) << "Private key is empty";
    return NULL;
  }

  const uint8* keyp = reinterpret_cast<const uint8*>(key.data());
  crypto::ScopedOpenSSL<EC_KEY, EC_KEY_free> private_key(
      d2i_ECPrivateKey(NULL, &keyp, key.size()));
  if (!private_key.get() || !EC_KEY_check_key(private_key.get())) {
    DLOG(INFO) << "Private key is invalid";
    return NULL;
  }

  uint8 public_key[kUncompressedP256PointBytes];
  if (EC_POINT_point2oct(
          EC_KEY_get0_group(private_key.get()),
          EC_KEY_get0_public_key(private_key.get()),
          POINT_CONVERSION_UNCOMPRESSED,
          public_key,
          sizeof(public_key),
          NULL) != sizeof(public_key)) {
    DLOG(INFO) << "Can't get public key";
    return NULL;
  }

  return new P256KeyExchange(private_key.release(), public_key);
}

// static
std::string P256KeyExchange::NewPrivateKey() {
  crypto::ScopedOpenSSL<EC_KEY, EC_KEY_free> key(
      EC_KEY_new_by_curve_name(NID_X9_62_prime256v1));
  if (!key.get() || !EC_KEY_generate_key(key.get())) {
    DLOG(INFO) << "Can't generate a new private key";
    return std::string();
  }

  int key_len = i2d_ECPrivateKey(key.get(), NULL);
  if (key_len <= 0) {
    DLOG(INFO) << "Can't convert private key to string";
    return std::string();
  }
  scoped_ptr<uint8[]> private_key(new uint8[key_len]);
  uint8* keyp = private_key.get();
  if (!i2d_ECPrivateKey(key.get(), &keyp)) {
    DLOG(INFO) << "Can't convert private key to string";
    return std::string();
  }
  return std::string(reinterpret_cast<char*>(private_key.get()), key_len);
}

bool P256KeyExchange::CalculateSharedKey(
    const base::StringPiece& peer_public_value,
    std::string* out_result) const {
  if (peer_public_value.size() != kUncompressedP256PointBytes) {
    DLOG(INFO) << "Peer public value is invalid";
    return false;
  }

  crypto::ScopedOpenSSL<EC_POINT, EC_POINT_free> point(
      EC_POINT_new(EC_KEY_get0_group(private_key_.get())));
  if (!point.get() ||
      !EC_POINT_oct2point( /* also test if point is on curve */
          EC_KEY_get0_group(private_key_.get()),
          point.get(),
          reinterpret_cast<const uint8*>(peer_public_value.data()),
          peer_public_value.size(),
          NULL)) {
    DLOG(INFO) << "Can't convert peer public value to curve point";
    return false;
  }

  uint8 result[kP256FieldBytes];
  if (ECDH_compute_key(
      result,
      sizeof(result),
      point.get(),
      private_key_.get(),
      NULL) != sizeof(result)) {
    DLOG(INFO) << "Can't compute ECDH shared key";
    return false;
  }

  out_result->assign(reinterpret_cast<char*>(result), sizeof(result));
  return true;
}

base::StringPiece P256KeyExchange::public_value() const {
  return base::StringPiece(reinterpret_cast<const char*>(public_key_),
                           sizeof(public_key_));
}

CryptoTag P256KeyExchange::tag() const {
  return kP256;
}

}  // namespace net