xref: /aosp_15_r20/external/cronet/net/test/key_util.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker // Copyright 2019 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker 
5*6777b538SAndroid Build Coastguard Worker #include "net/test/key_util.h"
6*6777b538SAndroid Build Coastguard Worker 
7*6777b538SAndroid Build Coastguard Worker #include <string>
8*6777b538SAndroid Build Coastguard Worker #include <utility>
9*6777b538SAndroid Build Coastguard Worker 
10*6777b538SAndroid Build Coastguard Worker #include "base/files/file_util.h"
11*6777b538SAndroid Build Coastguard Worker #include "base/logging.h"
12*6777b538SAndroid Build Coastguard Worker #include "net/ssl/openssl_private_key.h"
13*6777b538SAndroid Build Coastguard Worker #include "net/ssl/ssl_private_key.h"
14*6777b538SAndroid Build Coastguard Worker #include "third_party/boringssl/src/include/openssl/bio.h"
15*6777b538SAndroid Build Coastguard Worker #include "third_party/boringssl/src/include/openssl/evp.h"
16*6777b538SAndroid Build Coastguard Worker #include "third_party/boringssl/src/include/openssl/pem.h"
17*6777b538SAndroid Build Coastguard Worker 
18*6777b538SAndroid Build Coastguard Worker namespace net::key_util {
19*6777b538SAndroid Build Coastguard Worker 
LoadEVP_PKEYFromPEM(const base::FilePath & filepath)20*6777b538SAndroid Build Coastguard Worker bssl::UniquePtr<EVP_PKEY> LoadEVP_PKEYFromPEM(const base::FilePath& filepath) {
21*6777b538SAndroid Build Coastguard Worker   std::string data;
22*6777b538SAndroid Build Coastguard Worker   if (!base::ReadFileToString(filepath, &data)) {
23*6777b538SAndroid Build Coastguard Worker     LOG(ERROR) << "Could not read private key file: " << filepath.value();
24*6777b538SAndroid Build Coastguard Worker     return nullptr;
25*6777b538SAndroid Build Coastguard Worker   }
26*6777b538SAndroid Build Coastguard Worker   bssl::UniquePtr<BIO> bio(BIO_new_mem_buf(const_cast<char*>(data.data()),
27*6777b538SAndroid Build Coastguard Worker                                            static_cast<int>(data.size())));
28*6777b538SAndroid Build Coastguard Worker   if (!bio) {
29*6777b538SAndroid Build Coastguard Worker     LOG(ERROR) << "Could not allocate BIO for buffer?";
30*6777b538SAndroid Build Coastguard Worker     return nullptr;
31*6777b538SAndroid Build Coastguard Worker   }
32*6777b538SAndroid Build Coastguard Worker   bssl::UniquePtr<EVP_PKEY> result(
33*6777b538SAndroid Build Coastguard Worker       PEM_read_bio_PrivateKey(bio.get(), nullptr, nullptr, nullptr));
34*6777b538SAndroid Build Coastguard Worker   if (!result) {
35*6777b538SAndroid Build Coastguard Worker     LOG(ERROR) << "Could not decode private key file: " << filepath.value();
36*6777b538SAndroid Build Coastguard Worker     return nullptr;
37*6777b538SAndroid Build Coastguard Worker   }
38*6777b538SAndroid Build Coastguard Worker   return result;
39*6777b538SAndroid Build Coastguard Worker }
40*6777b538SAndroid Build Coastguard Worker 
PEMFromPrivateKey(EVP_PKEY * key)41*6777b538SAndroid Build Coastguard Worker std::string PEMFromPrivateKey(EVP_PKEY* key) {
42*6777b538SAndroid Build Coastguard Worker   bssl::UniquePtr<BIO> temp_memory_bio(BIO_new(BIO_s_mem()));
43*6777b538SAndroid Build Coastguard Worker   if (!temp_memory_bio) {
44*6777b538SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to allocate temporary memory bio";
45*6777b538SAndroid Build Coastguard Worker     return std::string();
46*6777b538SAndroid Build Coastguard Worker   }
47*6777b538SAndroid Build Coastguard Worker   if (!PEM_write_bio_PrivateKey(temp_memory_bio.get(), key, nullptr, nullptr, 0,
48*6777b538SAndroid Build Coastguard Worker                                 nullptr, nullptr)) {
49*6777b538SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to write private key";
50*6777b538SAndroid Build Coastguard Worker     return std::string();
51*6777b538SAndroid Build Coastguard Worker   }
52*6777b538SAndroid Build Coastguard Worker   const uint8_t* buffer;
53*6777b538SAndroid Build Coastguard Worker   size_t len;
54*6777b538SAndroid Build Coastguard Worker   if (!BIO_mem_contents(temp_memory_bio.get(), &buffer, &len)) {
55*6777b538SAndroid Build Coastguard Worker     LOG(ERROR) << "BIO_mem_contents failed";
56*6777b538SAndroid Build Coastguard Worker     return std::string();
57*6777b538SAndroid Build Coastguard Worker   }
58*6777b538SAndroid Build Coastguard Worker   return std::string(reinterpret_cast<const char*>(buffer), len);
59*6777b538SAndroid Build Coastguard Worker }
60*6777b538SAndroid Build Coastguard Worker 
LoadPrivateKeyOpenSSL(const base::FilePath & filepath)61*6777b538SAndroid Build Coastguard Worker scoped_refptr<SSLPrivateKey> LoadPrivateKeyOpenSSL(
62*6777b538SAndroid Build Coastguard Worker     const base::FilePath& filepath) {
63*6777b538SAndroid Build Coastguard Worker   bssl::UniquePtr<EVP_PKEY> key = LoadEVP_PKEYFromPEM(filepath);
64*6777b538SAndroid Build Coastguard Worker   if (!key)
65*6777b538SAndroid Build Coastguard Worker     return nullptr;
66*6777b538SAndroid Build Coastguard Worker   return WrapOpenSSLPrivateKey(std::move(key));
67*6777b538SAndroid Build Coastguard Worker }
68*6777b538SAndroid Build Coastguard Worker 
69*6777b538SAndroid Build Coastguard Worker }  // namespace net::key_util
70