2 * Copyright 1999-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/cryptlib.h"
12 #include <openssl/pkcs12.h>
13 #include <openssl/bn.h>
14 #include <openssl/trace.h>
16 /* PKCS12 compatible key/IV generation */
18 # define min(a,b) ((a) < (b) ? (a) : (b))
21 int PKCS12_key_gen_asc(const char *pass
, int passlen
, unsigned char *salt
,
22 int saltlen
, int id
, int iter
, int n
,
23 unsigned char *out
, const EVP_MD
*md_type
)
26 unsigned char *unipass
;
32 } else if (!OPENSSL_asc2uni(pass
, passlen
, &unipass
, &uniplen
)) {
33 PKCS12err(PKCS12_F_PKCS12_KEY_GEN_ASC
, ERR_R_MALLOC_FAILURE
);
36 ret
= PKCS12_key_gen_uni(unipass
, uniplen
, salt
, saltlen
,
37 id
, iter
, n
, out
, md_type
);
40 OPENSSL_clear_free(unipass
, uniplen
);
44 int PKCS12_key_gen_utf8(const char *pass
, int passlen
, unsigned char *salt
,
45 int saltlen
, int id
, int iter
, int n
,
46 unsigned char *out
, const EVP_MD
*md_type
)
49 unsigned char *unipass
;
55 } else if (!OPENSSL_utf82uni(pass
, passlen
, &unipass
, &uniplen
)) {
56 PKCS12err(PKCS12_F_PKCS12_KEY_GEN_UTF8
, ERR_R_MALLOC_FAILURE
);
59 ret
= PKCS12_key_gen_uni(unipass
, uniplen
, salt
, saltlen
,
60 id
, iter
, n
, out
, md_type
);
63 OPENSSL_clear_free(unipass
, uniplen
);
67 int PKCS12_key_gen_uni(unsigned char *pass
, int passlen
, unsigned char *salt
,
68 int saltlen
, int id
, int iter
, int n
,
69 unsigned char *out
, const EVP_MD
*md_type
)
71 unsigned char *B
= NULL
, *D
= NULL
, *I
= NULL
, *p
= NULL
, *Ai
= NULL
;
75 EVP_MD_CTX
*ctx
= NULL
;
76 unsigned char *tmpout
= out
;
79 ctx
= EVP_MD_CTX_new();
83 OSSL_TRACE_BEGIN(PKCS12_KEYGEN
) {
84 BIO_printf(trc_out
, "PKCS12_key_gen_uni(): ID %d, ITER %d\n", id
, iter
);
85 BIO_printf(trc_out
, "Password (length %d):\n", passlen
);
86 BIO_hex_string(trc_out
, 0, passlen
, pass
, passlen
);
87 BIO_printf(trc_out
, "\n");
88 BIO_printf(trc_out
, "Salt (length %d):\n", saltlen
);
89 BIO_hex_string(trc_out
, 0, saltlen
, salt
, saltlen
);
90 BIO_printf(trc_out
, "\n");
91 } OSSL_TRACE_END(PKCS12_KEYGEN
);
92 v
= EVP_MD_block_size(md_type
);
93 u
= EVP_MD_size(md_type
);
96 D
= OPENSSL_malloc(v
);
97 Ai
= OPENSSL_malloc(u
);
98 B
= OPENSSL_malloc(v
+ 1);
99 Slen
= v
* ((saltlen
+ v
- 1) / v
);
101 Plen
= v
* ((passlen
+ v
- 1) / v
);
105 I
= OPENSSL_malloc(Ilen
);
106 if (D
== NULL
|| Ai
== NULL
|| B
== NULL
|| I
== NULL
)
108 for (i
= 0; i
< v
; i
++)
111 for (i
= 0; i
< Slen
; i
++)
112 *p
++ = salt
[i
% saltlen
];
113 for (i
= 0; i
< Plen
; i
++)
114 *p
++ = pass
[i
% passlen
];
116 if (!EVP_DigestInit_ex(ctx
, md_type
, NULL
)
117 || !EVP_DigestUpdate(ctx
, D
, v
)
118 || !EVP_DigestUpdate(ctx
, I
, Ilen
)
119 || !EVP_DigestFinal_ex(ctx
, Ai
, NULL
))
121 for (j
= 1; j
< iter
; j
++) {
122 if (!EVP_DigestInit_ex(ctx
, md_type
, NULL
)
123 || !EVP_DigestUpdate(ctx
, Ai
, u
)
124 || !EVP_DigestFinal_ex(ctx
, Ai
, NULL
))
127 memcpy(out
, Ai
, min(n
, u
));
129 OSSL_TRACE_BEGIN(PKCS12_KEYGEN
) {
130 BIO_printf(trc_out
, "Output KEY (length %d)\n", tmpn
);
131 BIO_hex_string(trc_out
, 0, tmpn
, tmpout
, tmpn
);
132 BIO_printf(trc_out
, "\n");
133 } OSSL_TRACE_END(PKCS12_KEYGEN
);
139 for (j
= 0; j
< v
; j
++)
141 for (j
= 0; j
< Ilen
; j
+= v
) {
143 unsigned char *Ij
= I
+ j
;
146 /* Work out Ij = Ij + B + 1 */
147 for (k
= v
- 1; k
>= 0; k
--) {
149 Ij
[k
] = (unsigned char)c
;
156 PKCS12err(PKCS12_F_PKCS12_KEY_GEN_UNI
, ERR_R_MALLOC_FAILURE
);
163 EVP_MD_CTX_free(ctx
);