// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "crypto/rsa_private_key.h" #include #include #include #include "base/logging.h" #include "base/memory/scoped_ptr.h" #include "base/stl_util-inl.h" #include "crypto/openssl_util.h" namespace crypto { namespace { // Function pointer definition, for injecting the required key export function // into ExportKey, below. The supplied function should export EVP_PKEY into // the supplied BIO, returning 1 on success or 0 on failure. typedef int (ExportFunction)(BIO*, EVP_PKEY*); // Helper to export |key| into |output| via the specified ExportFunction. bool ExportKey(EVP_PKEY* key, ExportFunction export_fn, std::vector* output) { if (!key) return false; OpenSSLErrStackTracer err_tracer(FROM_HERE); ScopedOpenSSL bio(BIO_new(BIO_s_mem())); int res = export_fn(bio.get(), key); if (!res) return false; char* data = NULL; long len = BIO_get_mem_data(bio.get(), &data); if (!data || len < 0) return false; STLAssignToVector(output, reinterpret_cast(data), len); return true; } } // namespace // static RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) { OpenSSLErrStackTracer err_tracer(FROM_HERE); ScopedOpenSSL rsa_key(RSA_new()); ScopedOpenSSL bn(BN_new()); if (!rsa_key.get() || !bn.get() || !BN_set_word(bn.get(), 65537L)) return NULL; if (!RSA_generate_key_ex(rsa_key.get(), num_bits, bn.get(), NULL)) return NULL; scoped_ptr result(new RSAPrivateKey); result->key_ = EVP_PKEY_new(); if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_, rsa_key.get())) return NULL; return result.release(); } // static RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) { NOTIMPLEMENTED(); return NULL; } // static RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo( const std::vector& input) { OpenSSLErrStackTracer err_tracer(FROM_HERE); // BIO_new_mem_buf is not const aware, but it does not modify the buffer. char* data = reinterpret_cast(const_cast( vector_as_array(&input))); ScopedOpenSSL bio(BIO_new_mem_buf(data, input.size())); if (!bio.get()) return NULL; // Importing is a little more involved than exporting, as we must first // PKCS#8 decode the input, and then import the EVP_PKEY from Private Key // Info structure returned. ScopedOpenSSL p8inf( d2i_PKCS8_PRIV_KEY_INFO_bio(bio.get(), NULL)); if (!p8inf.get()) return NULL; scoped_ptr result(new RSAPrivateKey); result->key_ = EVP_PKCS82PKEY(p8inf.get()); if (!result->key_) return NULL; return result.release(); } // static RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo( const std::vector& input) { NOTIMPLEMENTED(); return NULL; } // static RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo( const std::vector& input) { NOTIMPLEMENTED(); return NULL; } RSAPrivateKey::RSAPrivateKey() : key_(NULL) { } RSAPrivateKey::~RSAPrivateKey() { if (key_) EVP_PKEY_free(key_); } bool RSAPrivateKey::ExportPrivateKey(std::vector* output) { return ExportKey(key_, i2d_PKCS8PrivateKeyInfo_bio, output); } bool RSAPrivateKey::ExportPublicKey(std::vector* output) { return ExportKey(key_, i2d_PUBKEY_bio, output); } } // namespace crypto