]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/pkcs12/p12_mutl.c
Fix return checks in GOST engine
[thirdparty/openssl.git] / crypto / pkcs12 / p12_mutl.c
CommitLineData
8d8c7266 1/* p12_mutl.c */
0f113f3e
MC
2/*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 1999.
8d8c7266
DSH
5 */
6/* ====================================================================
7 * Copyright (c) 1999 The OpenSSL Project. All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
0f113f3e 14 * notice, this list of conditions and the following disclaimer.
8d8c7266
DSH
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in
18 * the documentation and/or other materials provided with the
19 * distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 * software must display the following acknowledgment:
23 * "This product includes software developed by the OpenSSL Project
24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 * endorse or promote products derived from this software without
28 * prior written permission. For written permission, please contact
29 * licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 * nor may "OpenSSL" appear in their names without prior written
33 * permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 * acknowledgment:
37 * "This product includes software developed by the OpenSSL Project
38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com). This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com).
57 *
58 */
59
0f113f3e
MC
60# include <stdio.h>
61# include "cryptlib.h"
62# include <openssl/hmac.h>
63# include <openssl/rand.h>
64# include <openssl/pkcs12.h>
8d8c7266
DSH
65
66/* Generate a MAC */
8afca8d9 67int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
0f113f3e 68 unsigned char *mac, unsigned int *maclen)
8d8c7266 69{
0f113f3e
MC
70 const EVP_MD *md_type;
71 HMAC_CTX hmac;
72 unsigned char key[EVP_MAX_MD_SIZE], *salt;
73 int saltlen, iter;
74 int md_size;
dbad1690 75
0f113f3e
MC
76 if (!PKCS7_type_is_data(p12->authsafes)) {
77 PKCS12err(PKCS12_F_PKCS12_GEN_MAC, PKCS12_R_CONTENT_TYPE_NOT_DATA);
78 return 0;
79 }
1c2f1fe5 80
0f113f3e
MC
81 salt = p12->mac->salt->data;
82 saltlen = p12->mac->salt->length;
83 if (!p12->mac->iter)
84 iter = 1;
85 else
86 iter = ASN1_INTEGER_get(p12->mac->iter);
87 if (!(md_type = EVP_get_digestbyobj(p12->mac->dinfo->algor->algorithm))) {
88 PKCS12err(PKCS12_F_PKCS12_GEN_MAC, PKCS12_R_UNKNOWN_DIGEST_ALGORITHM);
89 return 0;
90 }
91 md_size = EVP_MD_size(md_type);
92 if (md_size < 0)
93 return 0;
94 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
95 md_size, key, md_type)) {
96 PKCS12err(PKCS12_F_PKCS12_GEN_MAC, PKCS12_R_KEY_GEN_ERROR);
97 return 0;
98 }
99 HMAC_CTX_init(&hmac);
100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data,
102 p12->authsafes->d.data->length)
103 || !HMAC_Final(&hmac, mac, maclen)) {
104 HMAC_CTX_cleanup(&hmac);
105 return 0;
106 }
107 HMAC_CTX_cleanup(&hmac);
108 return 1;
8d8c7266
DSH
109}
110
111/* Verify the mac */
8afca8d9 112int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
8d8c7266 113{
0f113f3e
MC
114 unsigned char mac[EVP_MAX_MD_SIZE];
115 unsigned int maclen;
116 if (p12->mac == NULL) {
117 PKCS12err(PKCS12_F_PKCS12_VERIFY_MAC, PKCS12_R_MAC_ABSENT);
118 return 0;
119 }
120 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
121 PKCS12err(PKCS12_F_PKCS12_VERIFY_MAC, PKCS12_R_MAC_GENERATION_ERROR);
122 return 0;
123 }
124 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length)
125 || memcmp(mac, p12->mac->dinfo->digest->data, maclen))
126 return 0;
127 return 1;
8d8c7266
DSH
128}
129
130/* Set a mac */
131
8afca8d9 132int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
0f113f3e
MC
133 unsigned char *salt, int saltlen, int iter,
134 const EVP_MD *md_type)
8d8c7266 135{
0f113f3e
MC
136 unsigned char mac[EVP_MAX_MD_SIZE];
137 unsigned int maclen;
61f5b6f3 138
0f113f3e
MC
139 if (!md_type)
140 md_type = EVP_sha1();
141 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == PKCS12_ERROR) {
142 PKCS12err(PKCS12_F_PKCS12_SET_MAC, PKCS12_R_MAC_SETUP_ERROR);
143 return 0;
144 }
145 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
146 PKCS12err(PKCS12_F_PKCS12_SET_MAC, PKCS12_R_MAC_GENERATION_ERROR);
147 return 0;
148 }
f422a514 149 if (!(ASN1_OCTET_STRING_set(p12->mac->dinfo->digest, mac, maclen))) {
0f113f3e
MC
150 PKCS12err(PKCS12_F_PKCS12_SET_MAC, PKCS12_R_MAC_STRING_SET_ERROR);
151 return 0;
152 }
153 return 1;
8d8c7266
DSH
154}
155
156/* Set up a mac structure */
8afca8d9 157int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
0f113f3e 158 const EVP_MD *md_type)
8d8c7266 159{
0f113f3e
MC
160 if (!(p12->mac = PKCS12_MAC_DATA_new()))
161 return PKCS12_ERROR;
162 if (iter > 1) {
f422a514 163 if (!(p12->mac->iter = ASN1_INTEGER_new())) {
0f113f3e
MC
164 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
165 return 0;
166 }
167 if (!ASN1_INTEGER_set(p12->mac->iter, iter)) {
168 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
169 return 0;
170 }
171 }
172 if (!saltlen)
173 saltlen = PKCS12_SALT_LEN;
174 p12->mac->salt->length = saltlen;
175 if (!(p12->mac->salt->data = OPENSSL_malloc(saltlen))) {
176 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
177 return 0;
178 }
179 if (!salt) {
180 if (RAND_pseudo_bytes(p12->mac->salt->data, saltlen) < 0)
181 return 0;
182 } else
183 memcpy(p12->mac->salt->data, salt, saltlen);
184 p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type));
185 if (!(p12->mac->dinfo->algor->parameter = ASN1_TYPE_new())) {
186 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
187 return 0;
188 }
189 p12->mac->dinfo->algor->parameter->type = V_ASN1_NULL;
190
191 return 1;
8d8c7266 192}