Coverage Report

Created: 2025-12-10 06:24

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/crypto/evp/evp_key.c
Line
Count
Source
1
/*
2
 * Copyright 1995-2024 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <stdio.h>
11
#include "internal/cryptlib.h"
12
#include <openssl/x509.h>
13
#include <openssl/objects.h>
14
#include <openssl/evp.h>
15
#include <openssl/ui.h>
16
17
#ifndef BUFSIZ
18
#define BUFSIZ 256
19
#endif
20
21
/* should be init to zeros. */
22
static char prompt_string[80];
23
24
void EVP_set_pw_prompt(const char *prompt)
25
0
{
26
0
    if (prompt == NULL)
27
0
        prompt_string[0] = '\0';
28
0
    else {
29
0
        strncpy(prompt_string, prompt, 79);
30
0
        prompt_string[79] = '\0';
31
0
    }
32
0
}
33
34
char *EVP_get_pw_prompt(void)
35
0
{
36
0
    if (prompt_string[0] == '\0')
37
0
        return NULL;
38
0
    else
39
0
        return prompt_string;
40
0
}
41
42
/*
43
 * For historical reasons, the standard function for reading passwords is in
44
 * the DES library -- if someone ever wants to disable DES, this function
45
 * will fail
46
 */
47
int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify)
48
0
{
49
0
    return EVP_read_pw_string_min(buf, 0, len, prompt, verify);
50
0
}
51
52
int EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt,
53
    int verify)
54
0
{
55
0
    int ret = -1;
56
0
    char buff[BUFSIZ];
57
0
    UI *ui;
58
59
0
    if ((prompt == NULL) && (prompt_string[0] != '\0'))
60
0
        prompt = prompt_string;
61
0
    ui = UI_new();
62
0
    if (ui == NULL)
63
0
        return ret;
64
0
    if (UI_add_input_string(ui, prompt, 0, buf, min,
65
0
            (len >= BUFSIZ) ? BUFSIZ - 1 : len)
66
0
            < 0
67
0
        || (verify
68
0
            && UI_add_verify_string(ui, prompt, 0, buff, min,
69
0
                   (len >= BUFSIZ) ? BUFSIZ - 1 : len,
70
0
                   buf)
71
0
                < 0))
72
0
        goto end;
73
0
    ret = UI_process(ui);
74
0
    OPENSSL_cleanse(buff, BUFSIZ);
75
0
end:
76
0
    UI_free(ui);
77
0
    return ret;
78
0
}
79
80
int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md,
81
    const unsigned char *salt, const unsigned char *data,
82
    int datal, int count, unsigned char *key,
83
    unsigned char *iv)
84
0
{
85
0
    EVP_MD_CTX *c;
86
0
    unsigned char md_buf[EVP_MAX_MD_SIZE];
87
0
    int niv, nkey, addmd = 0;
88
0
    unsigned int mds = 0, i;
89
0
    int rv = 0;
90
0
    nkey = EVP_CIPHER_get_key_length(type);
91
0
    niv = EVP_CIPHER_get_iv_length(type);
92
0
    OPENSSL_assert(nkey <= EVP_MAX_KEY_LENGTH);
93
0
    OPENSSL_assert(niv >= 0 && niv <= EVP_MAX_IV_LENGTH);
94
95
0
    if (data == NULL)
96
0
        return nkey;
97
98
0
    c = EVP_MD_CTX_new();
99
0
    if (c == NULL)
100
0
        goto err;
101
0
    for (;;) {
102
0
        if (!EVP_DigestInit_ex(c, md, NULL))
103
0
            goto err;
104
0
        if (addmd++)
105
0
            if (!EVP_DigestUpdate(c, &(md_buf[0]), mds))
106
0
                goto err;
107
0
        if (!EVP_DigestUpdate(c, data, datal))
108
0
            goto err;
109
0
        if (salt != NULL)
110
0
            if (!EVP_DigestUpdate(c, salt, PKCS5_SALT_LEN))
111
0
                goto err;
112
0
        if (!EVP_DigestFinal_ex(c, &(md_buf[0]), &mds))
113
0
            goto err;
114
115
0
        for (i = 1; i < (unsigned int)count; i++) {
116
0
            if (!EVP_DigestInit_ex(c, md, NULL))
117
0
                goto err;
118
0
            if (!EVP_DigestUpdate(c, &(md_buf[0]), mds))
119
0
                goto err;
120
0
            if (!EVP_DigestFinal_ex(c, &(md_buf[0]), &mds))
121
0
                goto err;
122
0
        }
123
0
        i = 0;
124
0
        if (nkey) {
125
0
            for (;;) {
126
0
                if (nkey == 0)
127
0
                    break;
128
0
                if (i == mds)
129
0
                    break;
130
0
                if (key != NULL)
131
0
                    *(key++) = md_buf[i];
132
0
                nkey--;
133
0
                i++;
134
0
            }
135
0
        }
136
0
        if (niv && (i != mds)) {
137
0
            for (;;) {
138
0
                if (niv == 0)
139
0
                    break;
140
0
                if (i == mds)
141
0
                    break;
142
0
                if (iv != NULL)
143
0
                    *(iv++) = md_buf[i];
144
0
                niv--;
145
0
                i++;
146
0
            }
147
0
        }
148
0
        if ((nkey == 0) && (niv == 0))
149
0
            break;
150
0
    }
151
0
    rv = EVP_CIPHER_get_key_length(type);
152
0
err:
153
0
    EVP_MD_CTX_free(c);
154
0
    OPENSSL_cleanse(md_buf, sizeof(md_buf));
155
0
    return rv;
156
0
}