| // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/third_party/quiche/src/quic/core/crypto/curve25519_key_exchange.h" |
| |
| #include <cstdint> |
| |
| #include "third_party/boringssl/src/include/openssl/curve25519.h" |
| #include "net/third_party/quiche/src/quic/core/crypto/quic_random.h" |
| #include "net/third_party/quiche/src/quic/platform/api/quic_ptr_util.h" |
| #include "net/third_party/quiche/src/quic/platform/api/quic_string.h" |
| |
| namespace quic { |
| namespace { |
| |
| class Curve25519KeyExchangeFactory : public KeyExchange::Factory { |
| public: |
| Curve25519KeyExchangeFactory() = default; |
| ~Curve25519KeyExchangeFactory() override = default; |
| |
| std::unique_ptr<KeyExchange> Create(QuicRandom* rand) const override { |
| const QuicString private_value = Curve25519KeyExchange::NewPrivateKey(rand); |
| return Curve25519KeyExchange::New(private_value); |
| } |
| |
| QuicTag tag() const override { return kC255; } |
| }; |
| |
| } // namespace |
| |
| Curve25519KeyExchange::Curve25519KeyExchange() {} |
| |
| Curve25519KeyExchange::~Curve25519KeyExchange() {} |
| |
| // static |
| std::unique_ptr<Curve25519KeyExchange> Curve25519KeyExchange::New( |
| QuicStringPiece private_key) { |
| // We don't want to #include the BoringSSL headers in the public header file, |
| // so we use literals for the sizes of private_key_ and public_key_. Here we |
| // assert that those values are equal to the values from the BoringSSL |
| // header. |
| static_assert( |
| sizeof(Curve25519KeyExchange::private_key_) == X25519_PRIVATE_KEY_LEN, |
| "header out of sync"); |
| static_assert( |
| sizeof(Curve25519KeyExchange::public_key_) == X25519_PUBLIC_VALUE_LEN, |
| "header out of sync"); |
| |
| if (private_key.size() != X25519_PRIVATE_KEY_LEN) { |
| return nullptr; |
| } |
| |
| auto ka = QuicWrapUnique(new Curve25519KeyExchange); |
| memcpy(ka->private_key_, private_key.data(), X25519_PRIVATE_KEY_LEN); |
| X25519_public_from_private(ka->public_key_, ka->private_key_); |
| return ka; |
| } |
| |
| // static |
| QuicString Curve25519KeyExchange::NewPrivateKey(QuicRandom* rand) { |
| uint8_t private_key[X25519_PRIVATE_KEY_LEN]; |
| rand->RandBytes(private_key, sizeof(private_key)); |
| return QuicString(reinterpret_cast<char*>(private_key), sizeof(private_key)); |
| } |
| |
| const Curve25519KeyExchange::Factory& Curve25519KeyExchange::GetFactory() |
| const { |
| static const Factory* factory = new Curve25519KeyExchangeFactory; |
| return *factory; |
| } |
| |
| bool Curve25519KeyExchange::CalculateSharedKey( |
| QuicStringPiece peer_public_value, |
| QuicString* out_result) const { |
| if (peer_public_value.size() != X25519_PUBLIC_VALUE_LEN) { |
| return false; |
| } |
| |
| uint8_t result[X25519_PUBLIC_VALUE_LEN]; |
| if (!X25519(result, private_key_, |
| reinterpret_cast<const uint8_t*>(peer_public_value.data()))) { |
| return false; |
| } |
| |
| out_result->assign(reinterpret_cast<char*>(result), sizeof(result)); |
| return true; |
| } |
| |
| void Curve25519KeyExchange::CalculateSharedKey( |
| QuicStringPiece peer_public_value, |
| QuicString* shared_key, |
| std::unique_ptr<Callback> callback) const { |
| callback->Run(CalculateSharedKey(peer_public_value, shared_key)); |
| } |
| |
| QuicStringPiece Curve25519KeyExchange::public_value() const { |
| return QuicStringPiece(reinterpret_cast<const char*>(public_key_), |
| sizeof(public_key_)); |
| } |
| |
| } // namespace quic |