// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/cert/jwk_serializer.h"
#include <cert.h>
#include <keyhi.h>
#include <nss.h>
#include "base/base64.h"
#include "base/values.h"
#include "crypto/nss_util.h"
#include "crypto/scoped_nss_types.h"
namespace net {
namespace JwkSerializer {
namespace {
bool ConvertEcPrime256v1PublicKeyInfoToJwk(
CERTSubjectPublicKeyInfo* spki,
base::DictionaryValue* public_key_jwk) {
static const int kUncompressedEncodingType = 4;
static const int kPrime256v1PublicKeyLength = 64;
// The public key value is encoded as 0x04 + 64 bytes of public key.
// NSS gives the length as the bit length.
if (spki->subjectPublicKey.len != (kPrime256v1PublicKeyLength + 1) * 8 ||
spki->subjectPublicKey.data[0] != kUncompressedEncodingType)
return false;
public_key_jwk->SetString("kty", "EC");
public_key_jwk->SetString("crv", "P-256");
base::StringPiece x(
reinterpret_cast<char*>(spki->subjectPublicKey.data + 1),
kPrime256v1PublicKeyLength / 2);
std::string x_b64;
base::Base64Encode(x, &x_b64);
public_key_jwk->SetString("x", x_b64);
base::StringPiece y(
reinterpret_cast<char*>(spki->subjectPublicKey.data + 1 +
kPrime256v1PublicKeyLength / 2),
kPrime256v1PublicKeyLength / 2);
std::string y_b64;
base::Base64Encode(y, &y_b64);
public_key_jwk->SetString("y", y_b64);
return true;
}
bool ConvertEcPublicKeyInfoToJwk(
CERTSubjectPublicKeyInfo* spki,
base::DictionaryValue* public_key_jwk) {
// 1.2.840.10045.3.1.7
// (iso.member-body.us.ansi-x9-62.ellipticCurve.primeCurve.prime256v1)
// (This includes the DER-encoded type (OID) and length: parameters can be
// anything, so the DER type isn't implied, and NSS includes it.)
static const unsigned char kPrime256v1[] = {
0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07
};
if (spki->algorithm.parameters.len == sizeof(kPrime256v1) &&
!memcmp(spki->algorithm.parameters.data, kPrime256v1,
sizeof(kPrime256v1))) {
return ConvertEcPrime256v1PublicKeyInfoToJwk(spki, public_key_jwk);
}
// TODO(juanlang): other curves
return false;
}
typedef scoped_ptr<
CERTSubjectPublicKeyInfo,
crypto::NSSDestroyer<CERTSubjectPublicKeyInfo,
SECKEY_DestroySubjectPublicKeyInfo> >
ScopedCERTSubjectPublicKeyInfo;
} // namespace
bool ConvertSpkiFromDerToJwk(
const base::StringPiece& spki_der,
base::DictionaryValue* public_key_jwk) {
public_key_jwk->Clear();
crypto::EnsureNSSInit();
if (!NSS_IsInitialized())
return false;
SECItem sec_item;
sec_item.data = const_cast<unsigned char*>(
reinterpret_cast<const unsigned char*>(spki_der.data()));
sec_item.len = spki_der.size();
ScopedCERTSubjectPublicKeyInfo spki(
SECKEY_DecodeDERSubjectPublicKeyInfo(&sec_item));
if (!spki)
return false;
// 1.2.840.10045.2
// (iso.member-body.us.ansi-x9-62.id-ecPublicKey)
// (This omits the ASN.1 encoding of the type (OID) and length: the fact that
// this is an OID is already clear, and NSS omits it here.)
static const unsigned char kIdEcPublicKey[] = {
0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01
};
bool rv = false;
if (spki->algorithm.algorithm.len == sizeof(kIdEcPublicKey) &&
!memcmp(spki->algorithm.algorithm.data, kIdEcPublicKey,
sizeof(kIdEcPublicKey))) {
rv = ConvertEcPublicKeyInfoToJwk(spki.get(), public_key_jwk);
}
// TODO(juanlang): other algorithms
return rv;
}
} // namespace JwkSerializer
} // namespace net