os/ossrv/ssl/libcrypto/src/crypto/pkcs12/p12_crpt.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* p12_crpt.c */
sl@0
     2
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
sl@0
     3
 * project 1999.
sl@0
     4
 */
sl@0
     5
/* ====================================================================
sl@0
     6
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
sl@0
     7
 *
sl@0
     8
 * Redistribution and use in source and binary forms, with or without
sl@0
     9
 * modification, are permitted provided that the following conditions
sl@0
    10
 * are met:
sl@0
    11
 *
sl@0
    12
 * 1. Redistributions of source code must retain the above copyright
sl@0
    13
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    14
 *
sl@0
    15
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    16
 *    notice, this list of conditions and the following disclaimer in
sl@0
    17
 *    the documentation and/or other materials provided with the
sl@0
    18
 *    distribution.
sl@0
    19
 *
sl@0
    20
 * 3. All advertising materials mentioning features or use of this
sl@0
    21
 *    software must display the following acknowledgment:
sl@0
    22
 *    "This product includes software developed by the OpenSSL Project
sl@0
    23
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
sl@0
    24
 *
sl@0
    25
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
    26
 *    endorse or promote products derived from this software without
sl@0
    27
 *    prior written permission. For written permission, please contact
sl@0
    28
 *    licensing@OpenSSL.org.
sl@0
    29
 *
sl@0
    30
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
    31
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
    32
 *    permission of the OpenSSL Project.
sl@0
    33
 *
sl@0
    34
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
    35
 *    acknowledgment:
sl@0
    36
 *    "This product includes software developed by the OpenSSL Project
sl@0
    37
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
sl@0
    38
 *
sl@0
    39
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
    40
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    41
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
    42
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
    43
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
    44
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
    45
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
    46
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    47
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
    48
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
    49
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
    50
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
    51
 * ====================================================================
sl@0
    52
 *
sl@0
    53
 * This product includes cryptographic software written by Eric Young
sl@0
    54
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
    55
 * Hudson (tjh@cryptsoft.com).
sl@0
    56
 *
sl@0
    57
 */
sl@0
    58
sl@0
    59
#include <stdio.h>
sl@0
    60
#include "cryptlib.h"
sl@0
    61
#include <openssl/pkcs12.h>
sl@0
    62
sl@0
    63
/* PKCS#12 specific PBE functions */
sl@0
    64
sl@0
    65
EXPORT_C void PKCS12_PBE_add(void)
sl@0
    66
{
sl@0
    67
#ifndef OPENSSL_NO_RC4
sl@0
    68
EVP_PBE_alg_add(NID_pbe_WithSHA1And128BitRC4, EVP_rc4(), EVP_sha1(),
sl@0
    69
							 PKCS12_PBE_keyivgen);
sl@0
    70
EVP_PBE_alg_add(NID_pbe_WithSHA1And40BitRC4, EVP_rc4_40(), EVP_sha1(),
sl@0
    71
							 PKCS12_PBE_keyivgen);
sl@0
    72
#endif
sl@0
    73
#ifndef OPENSSL_NO_DES
sl@0
    74
EVP_PBE_alg_add(NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
sl@0
    75
		 	EVP_des_ede3_cbc(), EVP_sha1(), PKCS12_PBE_keyivgen);
sl@0
    76
EVP_PBE_alg_add(NID_pbe_WithSHA1And2_Key_TripleDES_CBC, 
sl@0
    77
			EVP_des_ede_cbc(), EVP_sha1(), PKCS12_PBE_keyivgen);
sl@0
    78
#endif
sl@0
    79
#ifndef OPENSSL_NO_RC2
sl@0
    80
EVP_PBE_alg_add(NID_pbe_WithSHA1And128BitRC2_CBC, EVP_rc2_cbc(),
sl@0
    81
					EVP_sha1(), PKCS12_PBE_keyivgen);
sl@0
    82
EVP_PBE_alg_add(NID_pbe_WithSHA1And40BitRC2_CBC, EVP_rc2_40_cbc(),
sl@0
    83
					EVP_sha1(), PKCS12_PBE_keyivgen);
sl@0
    84
#endif
sl@0
    85
}
sl@0
    86
sl@0
    87
EXPORT_C int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
sl@0
    88
		ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de)
sl@0
    89
{
sl@0
    90
	PBEPARAM *pbe;
sl@0
    91
	int saltlen, iter, ret;
sl@0
    92
	unsigned char *salt;
sl@0
    93
	const unsigned char *pbuf;
sl@0
    94
	unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
sl@0
    95
sl@0
    96
	/* Extract useful info from parameter */
sl@0
    97
	if (param == NULL || param->type != V_ASN1_SEQUENCE ||
sl@0
    98
	    param->value.sequence == NULL) {
sl@0
    99
		PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN,PKCS12_R_DECODE_ERROR);
sl@0
   100
		return 0;
sl@0
   101
	}
sl@0
   102
sl@0
   103
	pbuf = param->value.sequence->data;
sl@0
   104
	if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) {
sl@0
   105
		PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN,PKCS12_R_DECODE_ERROR);
sl@0
   106
		return 0;
sl@0
   107
	}
sl@0
   108
sl@0
   109
	if (!pbe->iter) iter = 1;
sl@0
   110
	else iter = ASN1_INTEGER_get (pbe->iter);
sl@0
   111
	salt = pbe->salt->data;
sl@0
   112
	saltlen = pbe->salt->length;
sl@0
   113
	if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
sl@0
   114
			     iter, EVP_CIPHER_key_length(cipher), key, md)) {
sl@0
   115
		PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN,PKCS12_R_KEY_GEN_ERROR);
sl@0
   116
		PBEPARAM_free(pbe);
sl@0
   117
		return 0;
sl@0
   118
	}
sl@0
   119
	if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
sl@0
   120
				iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
sl@0
   121
		PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN,PKCS12_R_IV_GEN_ERROR);
sl@0
   122
		PBEPARAM_free(pbe);
sl@0
   123
		return 0;
sl@0
   124
	}
sl@0
   125
	PBEPARAM_free(pbe);
sl@0
   126
	ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
sl@0
   127
	OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH);
sl@0
   128
	OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH);
sl@0
   129
	return ret;
sl@0
   130
}