diff options
Diffstat (limited to 'Source/WebCore/crypto/keys/CryptoKeyRSA.cpp')
-rw-r--r-- | Source/WebCore/crypto/keys/CryptoKeyRSA.cpp | 153 |
1 files changed, 153 insertions, 0 deletions
diff --git a/Source/WebCore/crypto/keys/CryptoKeyRSA.cpp b/Source/WebCore/crypto/keys/CryptoKeyRSA.cpp new file mode 100644 index 000000000..960be3183 --- /dev/null +++ b/Source/WebCore/crypto/keys/CryptoKeyRSA.cpp @@ -0,0 +1,153 @@ +/* + * Copyright (C) 2016 Apple Inc. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, + * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF + * THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "config.h" +#include "CryptoKeyRSA.h" + +#include "CryptoKeyDataRSAComponents.h" +#include "JsonWebKey.h" +#include <wtf/text/Base64.h> + +#if ENABLE(SUBTLE_CRYPTO) + +namespace WebCore { + +RefPtr<CryptoKeyRSA> CryptoKeyRSA::importJwk(CryptoAlgorithmIdentifier algorithm, std::optional<CryptoAlgorithmIdentifier> hash, JsonWebKey&& keyData, bool extractable, CryptoKeyUsageBitmap usages) +{ + if (keyData.kty != "RSA") + return nullptr; + if (keyData.usages && ((keyData.usages & usages) != usages)) + return nullptr; + if (keyData.ext && !keyData.ext.value() && extractable) + return nullptr; + + if (keyData.n.isNull() || keyData.e.isNull()) + return nullptr; + Vector<uint8_t> modulus; + if (!WTF::base64URLDecode(keyData.n, modulus)) + return nullptr; + // Per RFC 7518 Section 6.3.1.1: https://tools.ietf.org/html/rfc7518#section-6.3.1.1 + if (!modulus.isEmpty() && !modulus[0]) + modulus.remove(0); + Vector<uint8_t> exponent; + if (!WTF::base64URLDecode(keyData.e, exponent)) + return nullptr; + if (keyData.d.isNull()) { + // import public key + auto publicKeyComponents = CryptoKeyDataRSAComponents::createPublic(WTFMove(modulus), WTFMove(exponent)); + // Notice: CryptoAlgorithmIdentifier::SHA_1 is just a placeholder. It should not have any effect if hash is std::nullopt. + return CryptoKeyRSA::create(algorithm, hash.value_or(CryptoAlgorithmIdentifier::SHA_1), !!hash, *publicKeyComponents, extractable, usages); + } + + // import private key + Vector<uint8_t> privateExponent; + if (!WTF::base64URLDecode(keyData.d, privateExponent)) + return nullptr; + if (keyData.p.isNull() && keyData.q.isNull() && keyData.dp.isNull() && keyData.dp.isNull() && keyData.qi.isNull()) { + auto privateKeyComponents = CryptoKeyDataRSAComponents::createPrivate(WTFMove(modulus), WTFMove(exponent), WTFMove(privateExponent)); + // Notice: CryptoAlgorithmIdentifier::SHA_1 is just a placeholder. It should not have any effect if hash is std::nullopt. + return CryptoKeyRSA::create(algorithm, hash.value_or(CryptoAlgorithmIdentifier::SHA_1), !!hash, *privateKeyComponents, extractable, usages); + } + + if (keyData.p.isNull() || keyData.q.isNull() || keyData.dp.isNull() || keyData.dq.isNull() || keyData.qi.isNull()) + return nullptr; + CryptoKeyDataRSAComponents::PrimeInfo firstPrimeInfo; + CryptoKeyDataRSAComponents::PrimeInfo secondPrimeInfo; + if (!WTF::base64URLDecode(keyData.p, firstPrimeInfo.primeFactor)) + return nullptr; + if (!WTF::base64URLDecode(keyData.dp, firstPrimeInfo.factorCRTExponent)) + return nullptr; + if (!WTF::base64URLDecode(keyData.q, secondPrimeInfo.primeFactor)) + return nullptr; + if (!WTF::base64URLDecode(keyData.dq, secondPrimeInfo.factorCRTExponent)) + return nullptr; + if (!WTF::base64URLDecode(keyData.qi, secondPrimeInfo.factorCRTCoefficient)) + return nullptr; + if (!keyData.oth) { + auto privateKeyComponents = CryptoKeyDataRSAComponents::createPrivateWithAdditionalData(WTFMove(modulus), WTFMove(exponent), WTFMove(privateExponent), WTFMove(firstPrimeInfo), WTFMove(secondPrimeInfo), { }); + // Notice: CryptoAlgorithmIdentifier::SHA_1 is just a placeholder. It should not have any effect if hash is std::nullopt. + return CryptoKeyRSA::create(algorithm, hash.value_or(CryptoAlgorithmIdentifier::SHA_1), !!hash, *privateKeyComponents, extractable, usages); + } + + Vector<CryptoKeyDataRSAComponents::PrimeInfo> otherPrimeInfos; + for (auto value : keyData.oth.value()) { + CryptoKeyDataRSAComponents::PrimeInfo info; + if (!WTF::base64URLDecode(value.r, info.primeFactor)) + return nullptr; + if (!WTF::base64URLDecode(value.d, info.factorCRTExponent)) + return nullptr; + if (!WTF::base64URLDecode(value.t, info.factorCRTCoefficient)) + return nullptr; + otherPrimeInfos.append(info); + } + + auto privateKeyComponents = CryptoKeyDataRSAComponents::createPrivateWithAdditionalData(WTFMove(modulus), WTFMove(exponent), WTFMove(privateExponent), WTFMove(firstPrimeInfo), WTFMove(secondPrimeInfo), WTFMove(otherPrimeInfos)); + // Notice: CryptoAlgorithmIdentifier::SHA_1 is just a placeholder. It should not have any effect if hash is std::nullopt. + return CryptoKeyRSA::create(algorithm, hash.value_or(CryptoAlgorithmIdentifier::SHA_1), !!hash, *privateKeyComponents, extractable, usages); +} + +JsonWebKey CryptoKeyRSA::exportJwk() const +{ + JsonWebKey result; + result.kty = "RSA"; + result.key_ops = usages(); + result.ext = extractable(); + + auto keyData = exportData(); + const auto& rsaKeyData = downcast<CryptoKeyDataRSAComponents>(*keyData); + // public key + result.n = base64URLEncode(rsaKeyData.modulus()); + result.e = base64URLEncode(rsaKeyData.exponent()); + if (rsaKeyData.type() == CryptoKeyDataRSAComponents::Type::Public) + return result; + + // private key + result.d = base64URLEncode(rsaKeyData.privateExponent()); + if (!rsaKeyData.hasAdditionalPrivateKeyParameters()) + return result; + + result.p = base64URLEncode(rsaKeyData.firstPrimeInfo().primeFactor); + result.q = base64URLEncode(rsaKeyData.secondPrimeInfo().primeFactor); + result.dp = base64URLEncode(rsaKeyData.firstPrimeInfo().factorCRTExponent); + result.dq = base64URLEncode(rsaKeyData.secondPrimeInfo().factorCRTExponent); + result.qi = base64URLEncode(rsaKeyData.secondPrimeInfo().factorCRTCoefficient); + if (rsaKeyData.otherPrimeInfos().isEmpty()) + return result; + + Vector<RsaOtherPrimesInfo> oth; + for (auto info : rsaKeyData.otherPrimeInfos()) { + RsaOtherPrimesInfo otherInfo; + otherInfo.r = base64URLEncode(info.primeFactor); + otherInfo.d = base64URLEncode(info.factorCRTExponent); + otherInfo.t = base64URLEncode(info.factorCRTCoefficient); + oth.append(WTFMove(otherInfo)); + } + result.oth = WTFMove(oth); + return result; +} + +} // namespace WebCore + +#endif // ENABLE(SUBTLE_CRYPTO) |