| // Copyright 2016 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/ssl/test_ssl_private_key.h" |
| |
| #include <memory> |
| #include <utility> |
| |
| #include "crypto/rsa_private_key.h" |
| #include "net/base/net_errors.h" |
| #include "net/ssl/ssl_platform_key_util.h" |
| #include "net/ssl/ssl_private_key.h" |
| #include "net/ssl/threaded_ssl_private_key.h" |
| #include "third_party/boringssl/src/include/openssl/digest.h" |
| #include "third_party/boringssl/src/include/openssl/ec.h" |
| #include "third_party/boringssl/src/include/openssl/evp.h" |
| #include "third_party/boringssl/src/include/openssl/rsa.h" |
| #include "third_party/boringssl/src/include/openssl/ssl.h" |
| |
| namespace net { |
| |
| namespace { |
| |
| class TestSSLPlatformKey : public ThreadedSSLPrivateKey::Delegate { |
| public: |
| explicit TestSSLPlatformKey(bssl::UniquePtr<EVP_PKEY> key) |
| : key_(std::move(key)) {} |
| |
| TestSSLPlatformKey(const TestSSLPlatformKey&) = delete; |
| TestSSLPlatformKey& operator=(const TestSSLPlatformKey&) = delete; |
| |
| ~TestSSLPlatformKey() override = default; |
| |
| std::string GetProviderName() override { return "EVP_PKEY"; } |
| |
| std::vector<uint16_t> GetAlgorithmPreferences() override { |
| return SSLPrivateKey::DefaultAlgorithmPreferences(EVP_PKEY_id(key_.get()), |
| true /* supports PSS */); |
| } |
| |
| Error Sign(uint16_t algorithm, |
| base::span<const uint8_t> input, |
| std::vector<uint8_t>* signature) override { |
| bssl::ScopedEVP_MD_CTX ctx; |
| EVP_PKEY_CTX* pctx; |
| if (!EVP_DigestSignInit(ctx.get(), &pctx, |
| SSL_get_signature_algorithm_digest(algorithm), |
| nullptr, key_.get())) { |
| return ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED; |
| } |
| if (SSL_is_signature_algorithm_rsa_pss(algorithm)) { |
| if (!EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_PKCS1_PSS_PADDING) || |
| !EVP_PKEY_CTX_set_rsa_pss_saltlen(pctx, -1 /* hash length */)) { |
| return ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED; |
| } |
| } |
| size_t sig_len = 0; |
| if (!EVP_DigestSign(ctx.get(), nullptr, &sig_len, input.data(), |
| input.size())) |
| return ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED; |
| signature->resize(sig_len); |
| if (!EVP_DigestSign(ctx.get(), signature->data(), &sig_len, input.data(), |
| input.size())) { |
| return ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED; |
| } |
| signature->resize(sig_len); |
| return OK; |
| } |
| |
| private: |
| bssl::UniquePtr<EVP_PKEY> key_; |
| }; |
| |
| class FailingSSLPlatformKey : public ThreadedSSLPrivateKey::Delegate { |
| public: |
| FailingSSLPlatformKey() = default; |
| |
| FailingSSLPlatformKey(const FailingSSLPlatformKey&) = delete; |
| FailingSSLPlatformKey& operator=(const FailingSSLPlatformKey&) = delete; |
| |
| ~FailingSSLPlatformKey() override = default; |
| |
| std::string GetProviderName() override { return "FailingSSLPlatformKey"; } |
| |
| std::vector<uint16_t> GetAlgorithmPreferences() override { |
| return SSLPrivateKey::DefaultAlgorithmPreferences(EVP_PKEY_RSA, |
| true /* supports PSS */); |
| } |
| |
| Error Sign(uint16_t algorithm, |
| base::span<const uint8_t> input, |
| std::vector<uint8_t>* signature) override { |
| return ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED; |
| } |
| }; |
| |
| } // namespace |
| |
| scoped_refptr<SSLPrivateKey> WrapOpenSSLPrivateKey( |
| bssl::UniquePtr<EVP_PKEY> key) { |
| if (!key) |
| return nullptr; |
| |
| return base::MakeRefCounted<ThreadedSSLPrivateKey>( |
| std::make_unique<TestSSLPlatformKey>(std::move(key)), |
| GetSSLPlatformKeyTaskRunner()); |
| } |
| |
| scoped_refptr<SSLPrivateKey> WrapRSAPrivateKey( |
| crypto::RSAPrivateKey* rsa_private_key) { |
| return net::WrapOpenSSLPrivateKey(bssl::UpRef(rsa_private_key->key())); |
| } |
| |
| scoped_refptr<SSLPrivateKey> CreateFailSigningSSLPrivateKey() { |
| return base::MakeRefCounted<ThreadedSSLPrivateKey>( |
| std::make_unique<FailingSSLPlatformKey>(), GetSSLPlatformKeyTaskRunner()); |
| } |
| |
| } // namespace net |