]> git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/pkcs12/p12_mutl.c
d5eb8ffe74eb207d0f14a768d50e9fda90e07a11
[thirdparty/openssl.git] / crypto / pkcs12 / p12_mutl.c
1 /* p12_mutl.c */
2 /*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 1999.
5 */
6 /* ====================================================================
7 * Copyright (c) 1999 The OpenSSL Project. All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in
18 * the documentation and/or other materials provided with the
19 * distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 * software must display the following acknowledgment:
23 * "This product includes software developed by the OpenSSL Project
24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 * endorse or promote products derived from this software without
28 * prior written permission. For written permission, please contact
29 * licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 * nor may "OpenSSL" appear in their names without prior written
33 * permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 * acknowledgment:
37 * "This product includes software developed by the OpenSSL Project
38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com). This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com).
57 *
58 */
59
60 # include <stdio.h>
61 # include "cryptlib.h"
62 # include <openssl/hmac.h>
63 # include <openssl/rand.h>
64 # include <openssl/pkcs12.h>
65
66 /* Generate a MAC */
67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
68 unsigned char *mac, unsigned int *maclen)
69 {
70 const EVP_MD *md_type;
71 HMAC_CTX hmac;
72 unsigned char key[EVP_MAX_MD_SIZE], *salt;
73 int saltlen, iter;
74 int md_size;
75
76 if (!PKCS7_type_is_data(p12->authsafes)) {
77 PKCS12err(PKCS12_F_PKCS12_GEN_MAC, PKCS12_R_CONTENT_TYPE_NOT_DATA);
78 return 0;
79 }
80
81 salt = p12->mac->salt->data;
82 saltlen = p12->mac->salt->length;
83 if (!p12->mac->iter)
84 iter = 1;
85 else
86 iter = ASN1_INTEGER_get(p12->mac->iter);
87 if (!(md_type = EVP_get_digestbyobj(p12->mac->dinfo->algor->algorithm))) {
88 PKCS12err(PKCS12_F_PKCS12_GEN_MAC, PKCS12_R_UNKNOWN_DIGEST_ALGORITHM);
89 return 0;
90 }
91 md_size = EVP_MD_size(md_type);
92 if (md_size < 0)
93 return 0;
94 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
95 md_size, key, md_type)) {
96 PKCS12err(PKCS12_F_PKCS12_GEN_MAC, PKCS12_R_KEY_GEN_ERROR);
97 return 0;
98 }
99 HMAC_CTX_init(&hmac);
100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
101 || !HMAC_Update(&hmac, p12->authsafes->d.data->data,
102 p12->authsafes->d.data->length)
103 || !HMAC_Final(&hmac, mac, maclen)) {
104 HMAC_CTX_cleanup(&hmac);
105 return 0;
106 }
107 HMAC_CTX_cleanup(&hmac);
108 return 1;
109 }
110
111 /* Verify the mac */
112 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
113 {
114 unsigned char mac[EVP_MAX_MD_SIZE];
115 unsigned int maclen;
116 if (p12->mac == NULL) {
117 PKCS12err(PKCS12_F_PKCS12_VERIFY_MAC, PKCS12_R_MAC_ABSENT);
118 return 0;
119 }
120 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
121 PKCS12err(PKCS12_F_PKCS12_VERIFY_MAC, PKCS12_R_MAC_GENERATION_ERROR);
122 return 0;
123 }
124 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length)
125 || memcmp(mac, p12->mac->dinfo->digest->data, maclen))
126 return 0;
127 return 1;
128 }
129
130 /* Set a mac */
131
132 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
133 unsigned char *salt, int saltlen, int iter,
134 const EVP_MD *md_type)
135 {
136 unsigned char mac[EVP_MAX_MD_SIZE];
137 unsigned int maclen;
138
139 if (!md_type)
140 md_type = EVP_sha1();
141 if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == PKCS12_ERROR) {
142 PKCS12err(PKCS12_F_PKCS12_SET_MAC, PKCS12_R_MAC_SETUP_ERROR);
143 return 0;
144 }
145 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
146 PKCS12err(PKCS12_F_PKCS12_SET_MAC, PKCS12_R_MAC_GENERATION_ERROR);
147 return 0;
148 }
149 if (!(ASN1_OCTET_STRING_set(p12->mac->dinfo->digest, mac, maclen))) {
150 PKCS12err(PKCS12_F_PKCS12_SET_MAC, PKCS12_R_MAC_STRING_SET_ERROR);
151 return 0;
152 }
153 return 1;
154 }
155
156 /* Set up a mac structure */
157 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
158 const EVP_MD *md_type)
159 {
160 if (!(p12->mac = PKCS12_MAC_DATA_new()))
161 return PKCS12_ERROR;
162 if (iter > 1) {
163 if (!(p12->mac->iter = ASN1_INTEGER_new())) {
164 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
165 return 0;
166 }
167 if (!ASN1_INTEGER_set(p12->mac->iter, iter)) {
168 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
169 return 0;
170 }
171 }
172 if (!saltlen)
173 saltlen = PKCS12_SALT_LEN;
174 p12->mac->salt->length = saltlen;
175 if (!(p12->mac->salt->data = OPENSSL_malloc(saltlen))) {
176 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
177 return 0;
178 }
179 if (!salt) {
180 if (RAND_pseudo_bytes(p12->mac->salt->data, saltlen) < 0)
181 return 0;
182 } else
183 memcpy(p12->mac->salt->data, salt, saltlen);
184 p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type));
185 if (!(p12->mac->dinfo->algor->parameter = ASN1_TYPE_new())) {
186 PKCS12err(PKCS12_F_PKCS12_SETUP_MAC, ERR_R_MALLOC_FAILURE);
187 return 0;
188 }
189 p12->mac->dinfo->algor->parameter->type = V_ASN1_NULL;
190
191 return 1;
192 }