This is the initial code drop of the reference implementation and test cases for the Widevine Whitebox API. In this drop, the full reference implementation for the AEAD white-box is provided and all test cases verifying the top-level behave have are enabled. Since the implementations can vary so much the testing is mostly left to verifying the return codes for specific parameter conditions. A full reference implementation for the license white-box is provided, however not all tests are implemented or enabled. A number of tests have been disabled as they required a loaded license and test licenses are still being worked on. The two license white-box API functions that are the further from competition are ProcessLicenseResponse() and MaskedDecryt(). ProcessLicenseResponse() is still being worked on and MaskedDecrypt() is waiting on Decrypt() to be fully functional. Most tests focus on verifying return code for specific parameter conditions, but as test licenses are created, tests looking to test the internal behaviour of license management will be added to ProcessLicenseResponse(), Decrypt(), and MaskedDecrypt().
87 lines
2.5 KiB
C++
87 lines
2.5 KiB
C++
////////////////////////////////////////////////////////////////////////////////
|
|
// Copyright 2019 Google LLC.
|
|
//
|
|
// This software is licensed under the terms defined in the Widevine Master
|
|
// License Agreement. For a copy of this agreement, please contact
|
|
// widevine-licensing@google.com.
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Description:
|
|
// Shared private key utilities between RSA and EC.
|
|
|
|
#ifndef WHITEBOX_CRYPTO_UTILS_PRIVATE_KEY_UTIL_H_
|
|
#define WHITEBOX_CRYPTO_UTILS_PRIVATE_KEY_UTIL_H_
|
|
|
|
#include <string>
|
|
|
|
#include "base/logging.h"
|
|
#include "third_party/boringssl/src/include/openssl/bio.h"
|
|
|
|
namespace widevine {
|
|
namespace private_key_util {
|
|
|
|
template <class Key>
|
|
bool SerializeKey(const Key* key,
|
|
int (*serialization_func)(BIO*, Key*),
|
|
std::string* serialized_key) {
|
|
if (key == nullptr) {
|
|
LOG(ERROR) << "Key is nullptr.";
|
|
return false;
|
|
}
|
|
if (serialized_key == nullptr) {
|
|
LOG(ERROR) << "Pointer to hold serialized key is nullptr.";
|
|
return false;
|
|
}
|
|
BIO* bio = BIO_new(BIO_s_mem());
|
|
if (bio == nullptr) {
|
|
LOG(ERROR) << "BIO_new returned nullptr";
|
|
return false;
|
|
}
|
|
bool success = false;
|
|
if (serialization_func(bio, const_cast<Key*>(key)) != 0) {
|
|
int serialized_size = BIO_pending(bio);
|
|
serialized_key->assign(serialized_size, 0);
|
|
if (BIO_read(bio, &(*serialized_key)[0], serialized_size) ==
|
|
serialized_size) {
|
|
success = true;
|
|
} else {
|
|
LOG(ERROR) << "BIO_read failure";
|
|
}
|
|
} else {
|
|
LOG(ERROR) << "Key serialization failure";
|
|
}
|
|
BIO_free(bio);
|
|
return success;
|
|
}
|
|
|
|
template <class Key>
|
|
bool DeserializeKey(const std::string& serialized_key,
|
|
Key* (*deserialization_func)(BIO*, Key**),
|
|
Key** key) {
|
|
if (serialized_key.empty()) {
|
|
LOG(ERROR) << "Serialized key is empty.";
|
|
return false;
|
|
}
|
|
if (key == nullptr) {
|
|
LOG(ERROR) << "Pointer to hold new key is nullptr.";
|
|
return false;
|
|
}
|
|
BIO* bio = BIO_new_mem_buf(const_cast<char*>(serialized_key.data()),
|
|
serialized_key.size());
|
|
if (bio == nullptr) {
|
|
LOG(ERROR) << "BIO_new_mem_buf returned nullptr";
|
|
return false;
|
|
}
|
|
*key = deserialization_func(bio, nullptr);
|
|
BIO_free(bio);
|
|
if (*key == nullptr) {
|
|
LOG(ERROR) << "Key deserialization failure";
|
|
}
|
|
return *key != nullptr;
|
|
}
|
|
|
|
} // namespace private_key_util
|
|
} // namespace widevine
|
|
|
|
#endif // WHITEBOX_CRYPTO_UTILS_PRIVATE_KEY_UTIL_H_
|