mirror of
https://github.com/openssl/openssl.git
synced 2024-12-03 05:41:46 +08:00
418d49c276
The OID for {1 3 6 1 5 5 8 1 2} HMAC-SHA1 (NID_hmac_sha1) is explicitly referenced by RFC 2510, RFC 3370, and RFC 4210. This is essential for the common implementations of CMP (Certificate Managing Protocol, RFC4210). HMAC-MD5's OID {1 3 6 1 5 5 8 1 1} (NID_hmac_md5) is in the same branch and it seems to generally exist (-> Internet search), but it is unclear where it is actually defined as it appears not to be referenced by RFCs and practically rather unused. Those OIDs are both duplicates to OIDs from an RSA OID branch, which are already included in builtin_pbe[]: HMAC-SHA1 also has another OID defined in PKCS#5/RFC2898 (NID_hmacWithSHA1). It is also unclear where the other OID for HMAC-MD5 (NID_hmacWithMD5) from the RSA branch is officially specified, as only HMAC-SHA1 from PKCS#5 was found to be defined. Anyway, HMAC-MD5 likely only plays a neglectable role in the future. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/3811)
262 lines
7.4 KiB
C
262 lines
7.4 KiB
C
/*
|
|
* Copyright 1999-2017 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include "internal/cryptlib.h"
|
|
#include <openssl/evp.h>
|
|
#include <openssl/pkcs12.h>
|
|
#include <openssl/x509.h>
|
|
#include "evp_locl.h"
|
|
|
|
/* Password based encryption (PBE) functions */
|
|
|
|
/* Setup a cipher context from a PBE algorithm */
|
|
|
|
struct evp_pbe_st {
|
|
int pbe_type;
|
|
int pbe_nid;
|
|
int cipher_nid;
|
|
int md_nid;
|
|
EVP_PBE_KEYGEN *keygen;
|
|
};
|
|
|
|
static STACK_OF(EVP_PBE_CTL) *pbe_algs;
|
|
|
|
static const EVP_PBE_CTL builtin_pbe[] = {
|
|
{EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC,
|
|
NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndDES_CBC,
|
|
NID_des_cbc, NID_md5, PKCS5_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC,
|
|
NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen},
|
|
|
|
{EVP_PBE_TYPE_OUTER, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen},
|
|
|
|
{EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4,
|
|
NID_rc4, NID_sha1, PKCS12_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4,
|
|
NID_rc4_40, NID_sha1, PKCS12_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
|
|
NID_des_ede3_cbc, NID_sha1, PKCS12_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And2_Key_TripleDES_CBC,
|
|
NID_des_ede_cbc, NID_sha1, PKCS12_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC2_CBC,
|
|
NID_rc2_cbc, NID_sha1, PKCS12_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC2_CBC,
|
|
NID_rc2_40_cbc, NID_sha1, PKCS12_PBE_keyivgen},
|
|
|
|
{EVP_PBE_TYPE_OUTER, NID_pbes2, -1, -1, PKCS5_v2_PBE_keyivgen},
|
|
|
|
{EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndRC2_CBC,
|
|
NID_rc2_64_cbc, NID_md2, PKCS5_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndRC2_CBC,
|
|
NID_rc2_64_cbc, NID_md5, PKCS5_PBE_keyivgen},
|
|
{EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndDES_CBC,
|
|
NID_des_cbc, NID_sha1, PKCS5_PBE_keyivgen},
|
|
|
|
{EVP_PBE_TYPE_PRF, NID_hmacWithSHA1, -1, NID_sha1, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmac_md5, -1, NID_md5, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmac_sha1, -1, NID_sha1, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmacWithMD5, -1, NID_md5, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmacWithSHA224, -1, NID_sha224, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmacWithSHA256, -1, NID_sha256, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmacWithSHA384, -1, NID_sha384, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_hmacWithSHA512, -1, NID_sha512, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_id_HMACGostR3411_94, -1, NID_id_GostR3411_94, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_id_tc26_hmac_gost_3411_2012_256, -1,
|
|
NID_id_GostR3411_2012_256, 0},
|
|
{EVP_PBE_TYPE_PRF, NID_id_tc26_hmac_gost_3411_2012_512, -1,
|
|
NID_id_GostR3411_2012_512, 0},
|
|
{EVP_PBE_TYPE_KDF, NID_id_pbkdf2, -1, -1, PKCS5_v2_PBKDF2_keyivgen},
|
|
#ifndef OPENSSL_NO_SCRYPT
|
|
{EVP_PBE_TYPE_KDF, NID_id_scrypt, -1, -1, PKCS5_v2_scrypt_keyivgen}
|
|
#endif
|
|
};
|
|
|
|
int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
|
|
ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de)
|
|
{
|
|
const EVP_CIPHER *cipher;
|
|
const EVP_MD *md;
|
|
int cipher_nid, md_nid;
|
|
EVP_PBE_KEYGEN *keygen;
|
|
|
|
if (!EVP_PBE_find(EVP_PBE_TYPE_OUTER, OBJ_obj2nid(pbe_obj),
|
|
&cipher_nid, &md_nid, &keygen)) {
|
|
char obj_tmp[80];
|
|
EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_PBE_ALGORITHM);
|
|
if (!pbe_obj)
|
|
OPENSSL_strlcpy(obj_tmp, "NULL", sizeof(obj_tmp));
|
|
else
|
|
i2t_ASN1_OBJECT(obj_tmp, sizeof(obj_tmp), pbe_obj);
|
|
ERR_add_error_data(2, "TYPE=", obj_tmp);
|
|
return 0;
|
|
}
|
|
|
|
if (!pass)
|
|
passlen = 0;
|
|
else if (passlen == -1)
|
|
passlen = strlen(pass);
|
|
|
|
if (cipher_nid == -1)
|
|
cipher = NULL;
|
|
else {
|
|
cipher = EVP_get_cipherbynid(cipher_nid);
|
|
if (!cipher) {
|
|
EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_CIPHER);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (md_nid == -1)
|
|
md = NULL;
|
|
else {
|
|
md = EVP_get_digestbynid(md_nid);
|
|
if (!md) {
|
|
EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_UNKNOWN_DIGEST);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
|
|
EVPerr(EVP_F_EVP_PBE_CIPHERINIT, EVP_R_KEYGEN_FAILURE);
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
DECLARE_OBJ_BSEARCH_CMP_FN(EVP_PBE_CTL, EVP_PBE_CTL, pbe2);
|
|
|
|
static int pbe2_cmp(const EVP_PBE_CTL *pbe1, const EVP_PBE_CTL *pbe2)
|
|
{
|
|
int ret = pbe1->pbe_type - pbe2->pbe_type;
|
|
if (ret)
|
|
return ret;
|
|
else
|
|
return pbe1->pbe_nid - pbe2->pbe_nid;
|
|
}
|
|
|
|
IMPLEMENT_OBJ_BSEARCH_CMP_FN(EVP_PBE_CTL, EVP_PBE_CTL, pbe2);
|
|
|
|
static int pbe_cmp(const EVP_PBE_CTL *const *a, const EVP_PBE_CTL *const *b)
|
|
{
|
|
int ret = (*a)->pbe_type - (*b)->pbe_type;
|
|
if (ret)
|
|
return ret;
|
|
else
|
|
return (*a)->pbe_nid - (*b)->pbe_nid;
|
|
}
|
|
|
|
/* Add a PBE algorithm */
|
|
|
|
int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid,
|
|
int md_nid, EVP_PBE_KEYGEN *keygen)
|
|
{
|
|
EVP_PBE_CTL *pbe_tmp;
|
|
|
|
if (pbe_algs == NULL) {
|
|
pbe_algs = sk_EVP_PBE_CTL_new(pbe_cmp);
|
|
if (pbe_algs == NULL)
|
|
goto err;
|
|
}
|
|
|
|
if ((pbe_tmp = OPENSSL_malloc(sizeof(*pbe_tmp))) == NULL)
|
|
goto err;
|
|
|
|
pbe_tmp->pbe_type = pbe_type;
|
|
pbe_tmp->pbe_nid = pbe_nid;
|
|
pbe_tmp->cipher_nid = cipher_nid;
|
|
pbe_tmp->md_nid = md_nid;
|
|
pbe_tmp->keygen = keygen;
|
|
|
|
if (!sk_EVP_PBE_CTL_push(pbe_algs, pbe_tmp)) {
|
|
OPENSSL_free(pbe_tmp);
|
|
goto err;
|
|
}
|
|
return 1;
|
|
|
|
err:
|
|
EVPerr(EVP_F_EVP_PBE_ALG_ADD_TYPE, ERR_R_MALLOC_FAILURE);
|
|
return 0;
|
|
}
|
|
|
|
int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
|
|
EVP_PBE_KEYGEN *keygen)
|
|
{
|
|
int cipher_nid, md_nid;
|
|
|
|
if (cipher)
|
|
cipher_nid = EVP_CIPHER_nid(cipher);
|
|
else
|
|
cipher_nid = -1;
|
|
if (md)
|
|
md_nid = EVP_MD_type(md);
|
|
else
|
|
md_nid = -1;
|
|
|
|
return EVP_PBE_alg_add_type(EVP_PBE_TYPE_OUTER, nid,
|
|
cipher_nid, md_nid, keygen);
|
|
}
|
|
|
|
int EVP_PBE_find(int type, int pbe_nid,
|
|
int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen)
|
|
{
|
|
EVP_PBE_CTL *pbetmp = NULL, pbelu;
|
|
int i;
|
|
if (pbe_nid == NID_undef)
|
|
return 0;
|
|
|
|
pbelu.pbe_type = type;
|
|
pbelu.pbe_nid = pbe_nid;
|
|
|
|
if (pbe_algs) {
|
|
i = sk_EVP_PBE_CTL_find(pbe_algs, &pbelu);
|
|
if (i != -1)
|
|
pbetmp = sk_EVP_PBE_CTL_value(pbe_algs, i);
|
|
}
|
|
if (pbetmp == NULL) {
|
|
pbetmp = OBJ_bsearch_pbe2(&pbelu, builtin_pbe, OSSL_NELEM(builtin_pbe));
|
|
}
|
|
if (pbetmp == NULL)
|
|
return 0;
|
|
if (pcnid)
|
|
*pcnid = pbetmp->cipher_nid;
|
|
if (pmnid)
|
|
*pmnid = pbetmp->md_nid;
|
|
if (pkeygen)
|
|
*pkeygen = pbetmp->keygen;
|
|
return 1;
|
|
}
|
|
|
|
static void free_evp_pbe_ctl(EVP_PBE_CTL *pbe)
|
|
{
|
|
OPENSSL_free(pbe);
|
|
}
|
|
|
|
void EVP_PBE_cleanup(void)
|
|
{
|
|
sk_EVP_PBE_CTL_pop_free(pbe_algs, free_evp_pbe_ctl);
|
|
pbe_algs = NULL;
|
|
}
|
|
|
|
int EVP_PBE_get(int *ptype, int *ppbe_nid, size_t num)
|
|
{
|
|
const EVP_PBE_CTL *tpbe;
|
|
|
|
if (num >= OSSL_NELEM(builtin_pbe))
|
|
return 0;
|
|
|
|
tpbe = builtin_pbe + num;
|
|
if (ptype)
|
|
*ptype = tpbe->pbe_type;
|
|
if (ppbe_nid)
|
|
*ppbe_nid = tpbe->pbe_nid;
|
|
return 1;
|
|
}
|