yuezonghe | 824eb0c | 2024-06-27 02:32:26 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2013-2016 The OpenSSL Project Authors. All Rights Reserved. |
| 3 | * |
| 4 | * Licensed under the OpenSSL license (the "License"). You may not use |
| 5 | * this file except in compliance with the License. You can obtain a copy |
| 6 | * in the file LICENSE in the source distribution or at |
| 7 | * https://www.openssl.org/source/license.html |
| 8 | */ |
| 9 | |
| 10 | #include "e_os.h" |
| 11 | |
| 12 | #ifndef OPENSSL_NO_CMS |
| 13 | #include <string.h> |
| 14 | #include <openssl/dh.h> |
| 15 | #include <openssl/evp.h> |
| 16 | #include <openssl/asn1.h> |
| 17 | #include <openssl/cms.h> |
| 18 | |
| 19 | |
| 20 | /* Key derivation from X9.42/RFC2631 */ |
| 21 | /* Uses CMS functions, hence the #ifdef wrapper. */ |
| 22 | |
| 23 | #define DH_KDF_MAX (1L << 30) |
| 24 | |
| 25 | /* Skip past an ASN1 structure: for OBJECT skip content octets too */ |
| 26 | |
| 27 | static int skip_asn1(unsigned char **pp, long *plen, int exptag) |
| 28 | { |
| 29 | const unsigned char *q = *pp; |
| 30 | int i, tag, xclass; |
| 31 | long tmplen; |
| 32 | i = ASN1_get_object(&q, &tmplen, &tag, &xclass, *plen); |
| 33 | if (i & 0x80) |
| 34 | return 0; |
| 35 | if (tag != exptag || xclass != V_ASN1_UNIVERSAL) |
| 36 | return 0; |
| 37 | if (tag == V_ASN1_OBJECT) |
| 38 | q += tmplen; |
| 39 | *plen -= q - *pp; |
| 40 | *pp = (unsigned char *)q; |
| 41 | return 1; |
| 42 | } |
| 43 | |
| 44 | /* |
| 45 | * Encode the DH shared info structure, return an offset to the counter value |
| 46 | * so we can update the structure without reencoding it. |
| 47 | */ |
| 48 | |
| 49 | static int dh_sharedinfo_encode(unsigned char **pder, unsigned char **pctr, |
| 50 | ASN1_OBJECT *key_oid, size_t outlen, |
| 51 | const unsigned char *ukm, size_t ukmlen) |
| 52 | { |
| 53 | unsigned char *p; |
| 54 | int derlen; |
| 55 | long tlen; |
| 56 | /* "magic" value to check offset is sane */ |
| 57 | static unsigned char ctr[4] = { 0xF3, 0x17, 0x22, 0x53 }; |
| 58 | X509_ALGOR atmp; |
| 59 | ASN1_OCTET_STRING ctr_oct, ukm_oct, *pukm_oct; |
| 60 | ASN1_TYPE ctr_atype; |
| 61 | if (ukmlen > DH_KDF_MAX || outlen > DH_KDF_MAX) |
| 62 | return 0; |
| 63 | ctr_oct.data = ctr; |
| 64 | ctr_oct.length = 4; |
| 65 | ctr_oct.flags = 0; |
| 66 | ctr_oct.type = V_ASN1_OCTET_STRING; |
| 67 | ctr_atype.type = V_ASN1_OCTET_STRING; |
| 68 | ctr_atype.value.octet_string = &ctr_oct; |
| 69 | atmp.algorithm = key_oid; |
| 70 | atmp.parameter = &ctr_atype; |
| 71 | if (ukm) { |
| 72 | ukm_oct.type = V_ASN1_OCTET_STRING; |
| 73 | ukm_oct.flags = 0; |
| 74 | ukm_oct.data = (unsigned char *)ukm; |
| 75 | ukm_oct.length = ukmlen; |
| 76 | pukm_oct = &ukm_oct; |
| 77 | } else |
| 78 | pukm_oct = NULL; |
| 79 | derlen = CMS_SharedInfo_encode(pder, &atmp, pukm_oct, outlen); |
| 80 | if (derlen <= 0) |
| 81 | return 0; |
| 82 | p = *pder; |
| 83 | tlen = derlen; |
| 84 | if (!skip_asn1(&p, &tlen, V_ASN1_SEQUENCE)) |
| 85 | return 0; |
| 86 | if (!skip_asn1(&p, &tlen, V_ASN1_SEQUENCE)) |
| 87 | return 0; |
| 88 | if (!skip_asn1(&p, &tlen, V_ASN1_OBJECT)) |
| 89 | return 0; |
| 90 | if (!skip_asn1(&p, &tlen, V_ASN1_OCTET_STRING)) |
| 91 | return 0; |
| 92 | if (CRYPTO_memcmp(p, ctr, 4)) |
| 93 | return 0; |
| 94 | *pctr = p; |
| 95 | return derlen; |
| 96 | } |
| 97 | |
| 98 | int DH_KDF_X9_42(unsigned char *out, size_t outlen, |
| 99 | const unsigned char *Z, size_t Zlen, |
| 100 | ASN1_OBJECT *key_oid, |
| 101 | const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) |
| 102 | { |
| 103 | EVP_MD_CTX *mctx = NULL; |
| 104 | int rv = 0; |
| 105 | unsigned int i; |
| 106 | size_t mdlen; |
| 107 | unsigned char *der = NULL, *ctr; |
| 108 | int derlen; |
| 109 | if (Zlen > DH_KDF_MAX) |
| 110 | return 0; |
| 111 | mctx = EVP_MD_CTX_new(); |
| 112 | if (mctx == NULL) |
| 113 | return 0; |
| 114 | mdlen = EVP_MD_size(md); |
| 115 | derlen = dh_sharedinfo_encode(&der, &ctr, key_oid, outlen, ukm, ukmlen); |
| 116 | if (derlen == 0) |
| 117 | goto err; |
| 118 | for (i = 1;; i++) { |
| 119 | unsigned char mtmp[EVP_MAX_MD_SIZE]; |
| 120 | if (!EVP_DigestInit_ex(mctx, md, NULL) |
| 121 | || !EVP_DigestUpdate(mctx, Z, Zlen)) |
| 122 | goto err; |
| 123 | ctr[3] = i & 0xFF; |
| 124 | ctr[2] = (i >> 8) & 0xFF; |
| 125 | ctr[1] = (i >> 16) & 0xFF; |
| 126 | ctr[0] = (i >> 24) & 0xFF; |
| 127 | if (!EVP_DigestUpdate(mctx, der, derlen)) |
| 128 | goto err; |
| 129 | if (outlen >= mdlen) { |
| 130 | if (!EVP_DigestFinal(mctx, out, NULL)) |
| 131 | goto err; |
| 132 | outlen -= mdlen; |
| 133 | if (outlen == 0) |
| 134 | break; |
| 135 | out += mdlen; |
| 136 | } else { |
| 137 | if (!EVP_DigestFinal(mctx, mtmp, NULL)) |
| 138 | goto err; |
| 139 | memcpy(out, mtmp, outlen); |
| 140 | OPENSSL_cleanse(mtmp, mdlen); |
| 141 | break; |
| 142 | } |
| 143 | } |
| 144 | rv = 1; |
| 145 | err: |
| 146 | OPENSSL_free(der); |
| 147 | EVP_MD_CTX_free(mctx); |
| 148 | return rv; |
| 149 | } |
| 150 | #endif |