Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1043)

Unified Diff: crypto/rsa_private_key_win.cc

Issue 17265013: Remove platform-specific implementations of RSAPrivateKey and SignatureCreator (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fix colliding serial numbers Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « crypto/rsa_private_key_openssl.cc ('k') | crypto/signature_creator.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: crypto/rsa_private_key_win.cc
diff --git a/crypto/rsa_private_key_win.cc b/crypto/rsa_private_key_win.cc
deleted file mode 100644
index 29ee663eed3c9fa376b4d7a06593f46b5ebfe095..0000000000000000000000000000000000000000
--- a/crypto/rsa_private_key_win.cc
+++ /dev/null
@@ -1,238 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "crypto/rsa_private_key.h"
-
-#include <list>
-
-#include "base/logging.h"
-#include "base/memory/scoped_ptr.h"
-#include "base/strings/string_util.h"
-
-#pragma comment(lib, "crypt32.lib")
-
-namespace crypto {
-
-// static
-RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) {
- scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
- if (!result->InitProvider())
- return NULL;
-
- DWORD flags = CRYPT_EXPORTABLE;
-
- // The size is encoded as the upper 16 bits of the flags. :: sigh ::.
- flags |= (num_bits << 16);
- if (!CryptGenKey(result->provider_, CALG_RSA_SIGN, flags,
- result->key_.receive()))
- return NULL;
-
- return result.release();
-}
-
-// static
-RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) {
- NOTIMPLEMENTED();
- return NULL;
-}
-
-// static
-RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo(
- const std::vector<uint8>& input) {
- scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
- if (!result->InitProvider())
- return NULL;
-
- PrivateKeyInfoCodec pki(false); // Little-Endian
- if (!pki.Import(input))
- return NULL;
-
- size_t blob_size = sizeof(PUBLICKEYSTRUC) +
- sizeof(RSAPUBKEY) +
- pki.modulus()->size() +
- pki.prime1()->size() +
- pki.prime2()->size() +
- pki.exponent1()->size() +
- pki.exponent2()->size() +
- pki.coefficient()->size() +
- pki.private_exponent()->size();
- scoped_ptr<BYTE[]> blob(new BYTE[blob_size]);
-
- uint8* dest = blob.get();
- PUBLICKEYSTRUC* public_key_struc = reinterpret_cast<PUBLICKEYSTRUC*>(dest);
- public_key_struc->bType = PRIVATEKEYBLOB;
- public_key_struc->bVersion = 0x02;
- public_key_struc->reserved = 0;
- public_key_struc->aiKeyAlg = CALG_RSA_SIGN;
- dest += sizeof(PUBLICKEYSTRUC);
-
- RSAPUBKEY* rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(dest);
- rsa_pub_key->magic = 0x32415352;
- rsa_pub_key->bitlen = pki.modulus()->size() * 8;
- int public_exponent_int = 0;
- for (size_t i = pki.public_exponent()->size(); i > 0; --i) {
- public_exponent_int <<= 8;
- public_exponent_int |= (*pki.public_exponent())[i - 1];
- }
- rsa_pub_key->pubexp = public_exponent_int;
- dest += sizeof(RSAPUBKEY);
-
- memcpy(dest, &pki.modulus()->front(), pki.modulus()->size());
- dest += pki.modulus()->size();
- memcpy(dest, &pki.prime1()->front(), pki.prime1()->size());
- dest += pki.prime1()->size();
- memcpy(dest, &pki.prime2()->front(), pki.prime2()->size());
- dest += pki.prime2()->size();
- memcpy(dest, &pki.exponent1()->front(), pki.exponent1()->size());
- dest += pki.exponent1()->size();
- memcpy(dest, &pki.exponent2()->front(), pki.exponent2()->size());
- dest += pki.exponent2()->size();
- memcpy(dest, &pki.coefficient()->front(), pki.coefficient()->size());
- dest += pki.coefficient()->size();
- memcpy(dest, &pki.private_exponent()->front(),
- pki.private_exponent()->size());
- dest += pki.private_exponent()->size();
-
- if (dest != blob.get() + blob_size) {
- NOTREACHED();
- return NULL;
- }
- if (!CryptImportKey(result->provider_,
- reinterpret_cast<uint8*>(public_key_struc),
- static_cast<DWORD>(blob_size), 0, CRYPT_EXPORTABLE,
- result->key_.receive())) {
- return NULL;
- }
-
- return result.release();
-}
-
-// static
-RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo(
- const std::vector<uint8>& input) {
- NOTIMPLEMENTED();
- return NULL;
-}
-
-// static
-RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo(
- const std::vector<uint8>& input) {
- NOTIMPLEMENTED();
- return NULL;
-}
-
-RSAPrivateKey::RSAPrivateKey() : provider_(NULL), key_(NULL) {}
-
-RSAPrivateKey::~RSAPrivateKey() {}
-
-bool RSAPrivateKey::InitProvider() {
- return FALSE != CryptAcquireContext(provider_.receive(), NULL, NULL,
- PROV_RSA_FULL, CRYPT_VERIFYCONTEXT);
-}
-
-RSAPrivateKey* RSAPrivateKey::Copy() const {
- scoped_ptr<RSAPrivateKey> copy(new RSAPrivateKey());
- if (!CryptContextAddRef(provider_, NULL, 0)) {
- NOTREACHED();
- return NULL;
- }
- copy->provider_.reset(provider_.get());
- if (!CryptDuplicateKey(key_.get(), NULL, 0, copy->key_.receive()))
- return NULL;
- return copy.release();
-}
-
-bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) const {
- // Export the key
- DWORD blob_length = 0;
- if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, NULL, &blob_length)) {
- NOTREACHED();
- return false;
- }
-
- scoped_ptr<uint8[]> blob(new uint8[blob_length]);
- if (!CryptExportKey(key_, 0, PRIVATEKEYBLOB, 0, blob.get(), &blob_length)) {
- NOTREACHED();
- return false;
- }
-
- uint8* pos = blob.get();
- PUBLICKEYSTRUC *publickey_struct = reinterpret_cast<PUBLICKEYSTRUC*>(pos);
- pos += sizeof(PUBLICKEYSTRUC);
-
- RSAPUBKEY *rsa_pub_key = reinterpret_cast<RSAPUBKEY*>(pos);
- pos += sizeof(RSAPUBKEY);
-
- int mod_size = rsa_pub_key->bitlen / 8;
- int primes_size = rsa_pub_key->bitlen / 16;
-
- PrivateKeyInfoCodec pki(false); // Little-Endian
-
- pki.modulus()->assign(pos, pos + mod_size);
- pos += mod_size;
-
- pki.prime1()->assign(pos, pos + primes_size);
- pos += primes_size;
- pki.prime2()->assign(pos, pos + primes_size);
- pos += primes_size;
-
- pki.exponent1()->assign(pos, pos + primes_size);
- pos += primes_size;
- pki.exponent2()->assign(pos, pos + primes_size);
- pos += primes_size;
-
- pki.coefficient()->assign(pos, pos + primes_size);
- pos += primes_size;
-
- pki.private_exponent()->assign(pos, pos + mod_size);
- pos += mod_size;
-
- pki.public_exponent()->assign(reinterpret_cast<uint8*>(&rsa_pub_key->pubexp),
- reinterpret_cast<uint8*>(&rsa_pub_key->pubexp) + 4);
-
- CHECK_EQ(pos - blob_length, reinterpret_cast<BYTE*>(publickey_struct));
-
- return pki.Export(output);
-}
-
-bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) const {
- DWORD key_info_len;
- if (!CryptExportPublicKeyInfo(
- provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
- NULL, &key_info_len)) {
- NOTREACHED();
- return false;
- }
-
- scoped_ptr<uint8[]> key_info(new uint8[key_info_len]);
- if (!CryptExportPublicKeyInfo(
- provider_, AT_SIGNATURE, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
- reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), &key_info_len)) {
- NOTREACHED();
- return false;
- }
-
- DWORD encoded_length;
- if (!CryptEncodeObject(
- X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
- reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), NULL,
- &encoded_length)) {
- NOTREACHED();
- return false;
- }
-
- scoped_ptr<BYTE[]> encoded(new BYTE[encoded_length]);
- if (!CryptEncodeObject(
- X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, X509_PUBLIC_KEY_INFO,
- reinterpret_cast<CERT_PUBLIC_KEY_INFO*>(key_info.get()), encoded.get(),
- &encoded_length)) {
- NOTREACHED();
- return false;
- }
-
- output->assign(encoded.get(), encoded.get() + encoded_length);
- return true;
-}
-
-} // namespace crypto
« no previous file with comments | « crypto/rsa_private_key_openssl.cc ('k') | crypto/signature_creator.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698