2013-07-31 01:05:08 +08:00
|
|
|
/*
|
2016-05-18 03:38:09 +08:00
|
|
|
* Copyright 2013-2016 The OpenSSL Project Authors. All Rights Reserved.
|
2013-07-31 01:05:08 +08:00
|
|
|
*
|
2016-05-18 03:38:09 +08:00
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2013-07-31 01:05:08 +08:00
|
|
|
*/
|
|
|
|
|
2015-08-04 00:45:26 +08:00
|
|
|
#include <e_os.h>
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_CMS
|
2013-07-31 01:05:08 +08:00
|
|
|
#include <string.h>
|
|
|
|
#include <openssl/dh.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/asn1.h>
|
|
|
|
#include <openssl/cms.h>
|
|
|
|
|
2015-08-04 00:45:26 +08:00
|
|
|
|
2013-07-31 01:05:08 +08:00
|
|
|
/* Key derivation from X9.42/RFC2631 */
|
2015-08-04 00:45:26 +08:00
|
|
|
/* Uses CMS functions, hence the #ifdef wrapper. */
|
2013-07-31 01:05:08 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
#define DH_KDF_MAX (1L << 30)
|
2013-07-31 01:05:08 +08:00
|
|
|
|
|
|
|
/* Skip past an ASN1 structure: for OBJECT skip content octets too */
|
|
|
|
|
|
|
|
static int skip_asn1(unsigned char **pp, long *plen, int exptag)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
const unsigned char *q = *pp;
|
|
|
|
int i, tag, xclass;
|
|
|
|
long tmplen;
|
|
|
|
i = ASN1_get_object(&q, &tmplen, &tag, &xclass, *plen);
|
|
|
|
if (i & 0x80)
|
|
|
|
return 0;
|
|
|
|
if (tag != exptag || xclass != V_ASN1_UNIVERSAL)
|
|
|
|
return 0;
|
|
|
|
if (tag == V_ASN1_OBJECT)
|
|
|
|
q += tmplen;
|
|
|
|
*plen -= q - *pp;
|
|
|
|
*pp = (unsigned char *)q;
|
|
|
|
return 1;
|
|
|
|
}
|
2013-07-31 01:05:08 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* Encode the DH shared info structure, return an offset to the counter value
|
|
|
|
* so we can update the structure without reencoding it.
|
2013-07-31 01:05:08 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
static int dh_sharedinfo_encode(unsigned char **pder, unsigned char **pctr,
|
2015-01-22 11:40:55 +08:00
|
|
|
ASN1_OBJECT *key_oid, size_t outlen,
|
|
|
|
const unsigned char *ukm, size_t ukmlen)
|
|
|
|
{
|
|
|
|
unsigned char *p;
|
|
|
|
int derlen;
|
|
|
|
long tlen;
|
|
|
|
/* "magic" value to check offset is sane */
|
|
|
|
static unsigned char ctr[4] = { 0xF3, 0x17, 0x22, 0x53 };
|
|
|
|
X509_ALGOR atmp;
|
|
|
|
ASN1_OCTET_STRING ctr_oct, ukm_oct, *pukm_oct;
|
|
|
|
ASN1_TYPE ctr_atype;
|
|
|
|
if (ukmlen > DH_KDF_MAX || outlen > DH_KDF_MAX)
|
|
|
|
return 0;
|
|
|
|
ctr_oct.data = ctr;
|
|
|
|
ctr_oct.length = 4;
|
|
|
|
ctr_oct.flags = 0;
|
|
|
|
ctr_oct.type = V_ASN1_OCTET_STRING;
|
|
|
|
ctr_atype.type = V_ASN1_OCTET_STRING;
|
|
|
|
ctr_atype.value.octet_string = &ctr_oct;
|
|
|
|
atmp.algorithm = key_oid;
|
|
|
|
atmp.parameter = &ctr_atype;
|
|
|
|
if (ukm) {
|
|
|
|
ukm_oct.type = V_ASN1_OCTET_STRING;
|
|
|
|
ukm_oct.flags = 0;
|
|
|
|
ukm_oct.data = (unsigned char *)ukm;
|
|
|
|
ukm_oct.length = ukmlen;
|
|
|
|
pukm_oct = &ukm_oct;
|
|
|
|
} else
|
|
|
|
pukm_oct = NULL;
|
|
|
|
derlen = CMS_SharedInfo_encode(pder, &atmp, pukm_oct, outlen);
|
|
|
|
if (derlen <= 0)
|
|
|
|
return 0;
|
|
|
|
p = *pder;
|
|
|
|
tlen = derlen;
|
|
|
|
if (!skip_asn1(&p, &tlen, V_ASN1_SEQUENCE))
|
|
|
|
return 0;
|
|
|
|
if (!skip_asn1(&p, &tlen, V_ASN1_SEQUENCE))
|
|
|
|
return 0;
|
|
|
|
if (!skip_asn1(&p, &tlen, V_ASN1_OBJECT))
|
|
|
|
return 0;
|
|
|
|
if (!skip_asn1(&p, &tlen, V_ASN1_OCTET_STRING))
|
|
|
|
return 0;
|
|
|
|
if (CRYPTO_memcmp(p, ctr, 4))
|
|
|
|
return 0;
|
|
|
|
*pctr = p;
|
|
|
|
return derlen;
|
|
|
|
}
|
2013-07-31 01:05:08 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
int DH_KDF_X9_42(unsigned char *out, size_t outlen,
|
|
|
|
const unsigned char *Z, size_t Zlen,
|
|
|
|
ASN1_OBJECT *key_oid,
|
|
|
|
const unsigned char *ukm, size_t ukmlen, const EVP_MD *md)
|
|
|
|
{
|
2015-11-27 21:02:12 +08:00
|
|
|
EVP_MD_CTX *mctx = NULL;
|
2015-01-22 11:40:55 +08:00
|
|
|
int rv = 0;
|
|
|
|
unsigned int i;
|
|
|
|
size_t mdlen;
|
|
|
|
unsigned char *der = NULL, *ctr;
|
|
|
|
int derlen;
|
|
|
|
if (Zlen > DH_KDF_MAX)
|
|
|
|
return 0;
|
2015-12-02 07:49:35 +08:00
|
|
|
mctx = EVP_MD_CTX_new();
|
2015-11-27 21:02:12 +08:00
|
|
|
if (mctx == NULL)
|
|
|
|
return 0;
|
2015-01-22 11:40:55 +08:00
|
|
|
mdlen = EVP_MD_size(md);
|
|
|
|
derlen = dh_sharedinfo_encode(&der, &ctr, key_oid, outlen, ukm, ukmlen);
|
|
|
|
if (derlen == 0)
|
|
|
|
goto err;
|
|
|
|
for (i = 1;; i++) {
|
|
|
|
unsigned char mtmp[EVP_MAX_MD_SIZE];
|
2016-06-18 22:46:13 +08:00
|
|
|
if (!EVP_DigestInit_ex(mctx, md, NULL)
|
|
|
|
|| !EVP_DigestUpdate(mctx, Z, Zlen))
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
ctr[3] = i & 0xFF;
|
|
|
|
ctr[2] = (i >> 8) & 0xFF;
|
|
|
|
ctr[1] = (i >> 16) & 0xFF;
|
|
|
|
ctr[0] = (i >> 24) & 0xFF;
|
2015-11-27 21:02:12 +08:00
|
|
|
if (!EVP_DigestUpdate(mctx, der, derlen))
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
if (outlen >= mdlen) {
|
2015-11-27 21:02:12 +08:00
|
|
|
if (!EVP_DigestFinal(mctx, out, NULL))
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
outlen -= mdlen;
|
|
|
|
if (outlen == 0)
|
|
|
|
break;
|
|
|
|
out += mdlen;
|
|
|
|
} else {
|
2015-11-27 21:02:12 +08:00
|
|
|
if (!EVP_DigestFinal(mctx, mtmp, NULL))
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
memcpy(out, mtmp, outlen);
|
|
|
|
OPENSSL_cleanse(mtmp, mdlen);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rv = 1;
|
|
|
|
err:
|
2015-05-01 22:02:07 +08:00
|
|
|
OPENSSL_free(der);
|
2015-12-02 07:49:35 +08:00
|
|
|
EVP_MD_CTX_free(mctx);
|
2015-01-22 11:40:55 +08:00
|
|
|
return rv;
|
|
|
|
}
|
2015-08-04 00:45:26 +08:00
|
|
|
#endif
|