Disable content detection tests on Android
[chromium-blink-merge.git] / crypto / rsa_private_key_openssl.cc
blob64a627e5fbfa293591952fdd68aa1194df5e7be5
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "crypto/rsa_private_key.h"
7 #include <openssl/evp.h>
8 #include <openssl/pkcs12.h>
9 #include <openssl/rsa.h>
11 #include "base/logging.h"
12 #include "base/memory/scoped_ptr.h"
13 #include "crypto/openssl_util.h"
15 namespace crypto {
17 namespace {
19 // Function pointer definition, for injecting the required key export function
20 // into ExportKey, below. The supplied function should export EVP_PKEY into
21 // the supplied BIO, returning 1 on success or 0 on failure.
22 typedef int (ExportFunction)(BIO*, EVP_PKEY*);
24 // Helper to export |key| into |output| via the specified ExportFunction.
25 bool ExportKey(EVP_PKEY* key,
26 ExportFunction export_fn,
27 std::vector<uint8>* output) {
28 if (!key)
29 return false;
31 OpenSSLErrStackTracer err_tracer(FROM_HERE);
32 ScopedOpenSSL<BIO, BIO_free_all> bio(BIO_new(BIO_s_mem()));
34 int res = export_fn(bio.get(), key);
35 if (!res)
36 return false;
38 char* data = NULL;
39 long len = BIO_get_mem_data(bio.get(), &data);
40 if (!data || len < 0)
41 return false;
43 output->assign(data, data + len);
44 return true;
47 } // namespace
49 // static
50 RSAPrivateKey* RSAPrivateKey::Create(uint16 num_bits) {
51 OpenSSLErrStackTracer err_tracer(FROM_HERE);
53 ScopedOpenSSL<RSA, RSA_free> rsa_key(RSA_new());
54 ScopedOpenSSL<BIGNUM, BN_free> bn(BN_new());
55 if (!rsa_key.get() || !bn.get() || !BN_set_word(bn.get(), 65537L))
56 return NULL;
58 if (!RSA_generate_key_ex(rsa_key.get(), num_bits, bn.get(), NULL))
59 return NULL;
61 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
62 result->key_ = EVP_PKEY_new();
63 if (!result->key_ || !EVP_PKEY_set1_RSA(result->key_, rsa_key.get()))
64 return NULL;
66 return result.release();
69 // static
70 RSAPrivateKey* RSAPrivateKey::CreateSensitive(uint16 num_bits) {
71 NOTIMPLEMENTED();
72 return NULL;
75 // static
76 RSAPrivateKey* RSAPrivateKey::CreateFromPrivateKeyInfo(
77 const std::vector<uint8>& input) {
78 if (input.empty())
79 return NULL;
81 OpenSSLErrStackTracer err_tracer(FROM_HERE);
82 // BIO_new_mem_buf is not const aware, but it does not modify the buffer.
83 char* data = reinterpret_cast<char*>(const_cast<uint8*>(&input[0]));
84 ScopedOpenSSL<BIO, BIO_free_all> bio(BIO_new_mem_buf(data, input.size()));
85 if (!bio.get())
86 return NULL;
88 // Importing is a little more involved than exporting, as we must first
89 // PKCS#8 decode the input, and then import the EVP_PKEY from Private Key
90 // Info structure returned.
91 ScopedOpenSSL<PKCS8_PRIV_KEY_INFO, PKCS8_PRIV_KEY_INFO_free> p8inf(
92 d2i_PKCS8_PRIV_KEY_INFO_bio(bio.get(), NULL));
93 if (!p8inf.get())
94 return NULL;
96 scoped_ptr<RSAPrivateKey> result(new RSAPrivateKey);
97 result->key_ = EVP_PKCS82PKEY(p8inf.get());
98 if (!result->key_)
99 return NULL;
101 return result.release();
104 // static
105 RSAPrivateKey* RSAPrivateKey::CreateSensitiveFromPrivateKeyInfo(
106 const std::vector<uint8>& input) {
107 NOTIMPLEMENTED();
108 return NULL;
111 // static
112 RSAPrivateKey* RSAPrivateKey::FindFromPublicKeyInfo(
113 const std::vector<uint8>& input) {
114 NOTIMPLEMENTED();
115 return NULL;
118 RSAPrivateKey::RSAPrivateKey()
119 : key_(NULL) {
122 RSAPrivateKey::~RSAPrivateKey() {
123 if (key_)
124 EVP_PKEY_free(key_);
127 RSAPrivateKey* RSAPrivateKey::Copy() const {
128 scoped_ptr<RSAPrivateKey> copy(new RSAPrivateKey());
129 RSA* rsa = EVP_PKEY_get1_RSA(key_);
130 if (!rsa)
131 return NULL;
132 copy->key_ = EVP_PKEY_new();
133 if (!EVP_PKEY_set1_RSA(copy->key_, rsa))
134 return NULL;
135 return copy.release();
138 bool RSAPrivateKey::ExportPrivateKey(std::vector<uint8>* output) const {
139 return ExportKey(key_, i2d_PKCS8PrivateKeyInfo_bio, output);
142 bool RSAPrivateKey::ExportPublicKey(std::vector<uint8>* output) const {
143 return ExportKey(key_, i2d_PUBKEY_bio, output);
146 } // namespace crypto