/src/openssl30/crypto/pkcs12/p12_mutl.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 1999-2023 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | /* | 
| 11 |  |  * HMAC low level APIs are deprecated for public use, but still ok for internal | 
| 12 |  |  * use. | 
| 13 |  |  */ | 
| 14 |  | #include "internal/deprecated.h" | 
| 15 |  |  | 
| 16 |  | #include <stdio.h> | 
| 17 |  | #include "internal/cryptlib.h" | 
| 18 |  | #include <openssl/crypto.h> | 
| 19 |  | #include <openssl/hmac.h> | 
| 20 |  | #include <openssl/rand.h> | 
| 21 |  | #include <openssl/pkcs12.h> | 
| 22 |  | #include "p12_local.h" | 
| 23 |  |  | 
| 24 |  | int PKCS12_mac_present(const PKCS12 *p12) | 
| 25 | 0 | { | 
| 26 | 0 |     return p12->mac ? 1 : 0; | 
| 27 | 0 | } | 
| 28 |  |  | 
| 29 |  | void PKCS12_get0_mac(const ASN1_OCTET_STRING **pmac, | 
| 30 |  |                      const X509_ALGOR **pmacalg, | 
| 31 |  |                      const ASN1_OCTET_STRING **psalt, | 
| 32 |  |                      const ASN1_INTEGER **piter, | 
| 33 |  |                      const PKCS12 *p12) | 
| 34 | 0 | { | 
| 35 | 0 |     if (p12->mac) { | 
| 36 | 0 |         X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); | 
| 37 | 0 |         if (psalt) | 
| 38 | 0 |             *psalt = p12->mac->salt; | 
| 39 | 0 |         if (piter) | 
| 40 | 0 |             *piter = p12->mac->iter; | 
| 41 | 0 |     } else { | 
| 42 | 0 |         if (pmac) | 
| 43 | 0 |             *pmac = NULL; | 
| 44 | 0 |         if (pmacalg) | 
| 45 | 0 |             *pmacalg = NULL; | 
| 46 | 0 |         if (psalt) | 
| 47 | 0 |             *psalt = NULL; | 
| 48 | 0 |         if (piter) | 
| 49 | 0 |             *piter = NULL; | 
| 50 | 0 |     } | 
| 51 | 0 | } | 
| 52 |  |  | 
| 53 | 0 | #define TK26_MAC_KEY_LEN 32 | 
| 54 |  |  | 
| 55 |  | static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, | 
| 56 |  |                                    const unsigned char *salt, int saltlen, | 
| 57 |  |                                    int iter, int keylen, unsigned char *key, | 
| 58 |  |                                    const EVP_MD *digest) | 
| 59 | 0 | { | 
| 60 | 0 |     unsigned char out[96]; | 
| 61 |  | 
 | 
| 62 | 0 |     if (keylen != TK26_MAC_KEY_LEN) { | 
| 63 | 0 |         return 0; | 
| 64 | 0 |     } | 
| 65 |  |  | 
| 66 | 0 |     if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, | 
| 67 | 0 |                            digest, sizeof(out), out)) { | 
| 68 | 0 |         return 0; | 
| 69 | 0 |     } | 
| 70 | 0 |     memcpy(key, out + sizeof(out) - TK26_MAC_KEY_LEN, TK26_MAC_KEY_LEN); | 
| 71 | 0 |     OPENSSL_cleanse(out, sizeof(out)); | 
| 72 | 0 |     return 1; | 
| 73 | 0 | } | 
| 74 |  |  | 
| 75 |  | /* Generate a MAC */ | 
| 76 |  | static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, | 
| 77 |  |                           unsigned char *mac, unsigned int *maclen, | 
| 78 |  |                           int (*pkcs12_key_gen)(const char *pass, int passlen, | 
| 79 |  |                                                 unsigned char *salt, int slen, | 
| 80 |  |                                                 int id, int iter, int n, | 
| 81 |  |                                                 unsigned char *out, | 
| 82 |  |                                                 const EVP_MD *md_type)) | 
| 83 | 0 | { | 
| 84 | 0 |     int ret = 0; | 
| 85 | 0 |     const EVP_MD *md; | 
| 86 | 0 |     EVP_MD *md_fetch; | 
| 87 | 0 |     HMAC_CTX *hmac = NULL; | 
| 88 | 0 |     unsigned char key[EVP_MAX_MD_SIZE], *salt; | 
| 89 | 0 |     int saltlen, iter; | 
| 90 | 0 |     char md_name[80]; | 
| 91 | 0 |     int md_size = 0; | 
| 92 | 0 |     int md_nid; | 
| 93 | 0 |     const X509_ALGOR *macalg; | 
| 94 | 0 |     const ASN1_OBJECT *macoid; | 
| 95 |  | 
 | 
| 96 | 0 |     if (!PKCS7_type_is_data(p12->authsafes)) { | 
| 97 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_CONTENT_TYPE_NOT_DATA); | 
| 98 | 0 |         return 0; | 
| 99 | 0 |     } | 
| 100 |  |  | 
| 101 | 0 |     salt = p12->mac->salt->data; | 
| 102 | 0 |     saltlen = p12->mac->salt->length; | 
| 103 | 0 |     if (p12->mac->iter == NULL) | 
| 104 | 0 |         iter = 1; | 
| 105 | 0 |     else | 
| 106 | 0 |         iter = ASN1_INTEGER_get(p12->mac->iter); | 
| 107 | 0 |     X509_SIG_get0(p12->mac->dinfo, &macalg, NULL); | 
| 108 | 0 |     X509_ALGOR_get0(&macoid, NULL, NULL, macalg); | 
| 109 | 0 |     if (OBJ_obj2txt(md_name, sizeof(md_name), macoid, 0) < 0) | 
| 110 | 0 |         return 0; | 
| 111 |  |  | 
| 112 | 0 |     (void)ERR_set_mark(); | 
| 113 | 0 |     md = md_fetch = EVP_MD_fetch(p12->authsafes->ctx.libctx, md_name, | 
| 114 | 0 |                                  p12->authsafes->ctx.propq); | 
| 115 | 0 |     if (md == NULL) | 
| 116 | 0 |         md = EVP_get_digestbynid(OBJ_obj2nid(macoid)); | 
| 117 |  | 
 | 
| 118 | 0 |     if (md == NULL) { | 
| 119 | 0 |         (void)ERR_clear_last_mark(); | 
| 120 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_UNKNOWN_DIGEST_ALGORITHM); | 
| 121 | 0 |         return 0; | 
| 122 | 0 |     } | 
| 123 | 0 |     (void)ERR_pop_to_mark(); | 
| 124 |  | 
 | 
| 125 | 0 |     md_size = EVP_MD_get_size(md); | 
| 126 | 0 |     md_nid = EVP_MD_get_type(md); | 
| 127 | 0 |     if (md_size < 0) | 
| 128 | 0 |         goto err; | 
| 129 | 0 |     if ((md_nid == NID_id_GostR3411_94 | 
| 130 | 0 |          || md_nid == NID_id_GostR3411_2012_256 | 
| 131 | 0 |          || md_nid == NID_id_GostR3411_2012_512) | 
| 132 | 0 |         && ossl_safe_getenv("LEGACY_GOST_PKCS12") == NULL) { | 
| 133 | 0 |         md_size = TK26_MAC_KEY_LEN; | 
| 134 | 0 |         if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, | 
| 135 | 0 |                                      md_size, key, md)) { | 
| 136 | 0 |             ERR_raise(ERR_LIB_PKCS12, PKCS12_R_KEY_GEN_ERROR); | 
| 137 | 0 |             goto err; | 
| 138 | 0 |         } | 
| 139 | 0 |     } else { | 
| 140 | 0 |         if (pkcs12_key_gen != NULL) { | 
| 141 | 0 |             if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, | 
| 142 | 0 |                                    iter, md_size, key, md)) { | 
| 143 | 0 |                 ERR_raise(ERR_LIB_PKCS12, PKCS12_R_KEY_GEN_ERROR); | 
| 144 | 0 |                 goto err; | 
| 145 | 0 |             } | 
| 146 | 0 |         } else { | 
| 147 |  |             /* Default to UTF-8 password */ | 
| 148 | 0 |             if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, | 
| 149 | 0 |                                        iter, md_size, key, md, | 
| 150 | 0 |                                        p12->authsafes->ctx.libctx, | 
| 151 | 0 |                                        p12->authsafes->ctx.propq)) { | 
| 152 | 0 |                 ERR_raise(ERR_LIB_PKCS12, PKCS12_R_KEY_GEN_ERROR); | 
| 153 | 0 |                 goto err; | 
| 154 | 0 |             } | 
| 155 | 0 |         } | 
| 156 | 0 |     } | 
| 157 | 0 |     if ((hmac = HMAC_CTX_new()) == NULL | 
| 158 | 0 |         || !HMAC_Init_ex(hmac, key, md_size, md, NULL) | 
| 159 | 0 |         || !HMAC_Update(hmac, p12->authsafes->d.data->data, | 
| 160 | 0 |                         p12->authsafes->d.data->length) | 
| 161 | 0 |         || !HMAC_Final(hmac, mac, maclen)) { | 
| 162 | 0 |         goto err; | 
| 163 | 0 |     } | 
| 164 | 0 |     ret = 1; | 
| 165 |  | 
 | 
| 166 | 0 | err: | 
| 167 | 0 |     OPENSSL_cleanse(key, sizeof(key)); | 
| 168 | 0 |     HMAC_CTX_free(hmac); | 
| 169 | 0 |     EVP_MD_free(md_fetch); | 
| 170 | 0 |     return ret; | 
| 171 | 0 | } | 
| 172 |  |  | 
| 173 |  | int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, | 
| 174 |  |                    unsigned char *mac, unsigned int *maclen) | 
| 175 | 0 | { | 
| 176 | 0 |     return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); | 
| 177 | 0 | } | 
| 178 |  |  | 
| 179 |  | /* Verify the mac */ | 
| 180 |  | int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) | 
| 181 | 0 | { | 
| 182 | 0 |     unsigned char mac[EVP_MAX_MD_SIZE]; | 
| 183 | 0 |     unsigned int maclen; | 
| 184 | 0 |     const ASN1_OCTET_STRING *macoct; | 
| 185 |  | 
 | 
| 186 | 0 |     if (p12->mac == NULL) { | 
| 187 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_MAC_ABSENT); | 
| 188 | 0 |         return 0; | 
| 189 | 0 |     } | 
| 190 | 0 |     if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { | 
| 191 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_MAC_GENERATION_ERROR); | 
| 192 | 0 |         return 0; | 
| 193 | 0 |     } | 
| 194 | 0 |     X509_SIG_get0(p12->mac->dinfo, NULL, &macoct); | 
| 195 | 0 |     if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) | 
| 196 | 0 |         || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) | 
| 197 | 0 |         return 0; | 
| 198 |  |  | 
| 199 | 0 |     return 1; | 
| 200 | 0 | } | 
| 201 |  |  | 
| 202 |  | /* Set a mac */ | 
| 203 |  |  | 
| 204 |  | int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, | 
| 205 |  |                    unsigned char *salt, int saltlen, int iter, | 
| 206 |  |                    const EVP_MD *md_type) | 
| 207 | 0 | { | 
| 208 | 0 |     unsigned char mac[EVP_MAX_MD_SIZE]; | 
| 209 | 0 |     unsigned int maclen; | 
| 210 | 0 |     ASN1_OCTET_STRING *macoct; | 
| 211 |  | 
 | 
| 212 | 0 |     if (md_type == NULL) | 
| 213 |  |         /* No need to do a fetch as the md_type is used only to get a NID */ | 
| 214 | 0 |         md_type = EVP_sha256(); | 
| 215 | 0 |     if (!iter) | 
| 216 | 0 |         iter = PKCS12_DEFAULT_ITER; | 
| 217 | 0 |     if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == PKCS12_ERROR) { | 
| 218 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_MAC_SETUP_ERROR); | 
| 219 | 0 |         return 0; | 
| 220 | 0 |     } | 
| 221 |  |     /* | 
| 222 |  |      * Note that output mac is forced to UTF-8... | 
| 223 |  |      */ | 
| 224 | 0 |     if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { | 
| 225 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_MAC_GENERATION_ERROR); | 
| 226 | 0 |         return 0; | 
| 227 | 0 |     } | 
| 228 | 0 |     X509_SIG_getm(p12->mac->dinfo, NULL, &macoct); | 
| 229 | 0 |     if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) { | 
| 230 | 0 |         ERR_raise(ERR_LIB_PKCS12, PKCS12_R_MAC_STRING_SET_ERROR); | 
| 231 | 0 |         return 0; | 
| 232 | 0 |     } | 
| 233 | 0 |     return 1; | 
| 234 | 0 | } | 
| 235 |  |  | 
| 236 |  | /* Set up a mac structure */ | 
| 237 |  | int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, | 
| 238 |  |                      const EVP_MD *md_type) | 
| 239 | 0 | { | 
| 240 | 0 |     X509_ALGOR *macalg; | 
| 241 |  | 
 | 
| 242 | 0 |     PKCS12_MAC_DATA_free(p12->mac); | 
| 243 | 0 |     p12->mac = NULL; | 
| 244 |  | 
 | 
| 245 | 0 |     if ((p12->mac = PKCS12_MAC_DATA_new()) == NULL) | 
| 246 | 0 |         return PKCS12_ERROR; | 
| 247 | 0 |     if (iter > 1) { | 
| 248 | 0 |         if ((p12->mac->iter = ASN1_INTEGER_new()) == NULL) { | 
| 249 | 0 |             ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE); | 
| 250 | 0 |             return 0; | 
| 251 | 0 |         } | 
| 252 | 0 |         if (!ASN1_INTEGER_set(p12->mac->iter, iter)) { | 
| 253 | 0 |             ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE); | 
| 254 | 0 |             return 0; | 
| 255 | 0 |         } | 
| 256 | 0 |     } | 
| 257 | 0 |     if (saltlen == 0) | 
| 258 | 0 |         saltlen = PKCS12_SALT_LEN; | 
| 259 | 0 |     else if (saltlen < 0) | 
| 260 | 0 |         return 0; | 
| 261 | 0 |     if ((p12->mac->salt->data = OPENSSL_malloc(saltlen)) == NULL) { | 
| 262 | 0 |         ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE); | 
| 263 | 0 |         return 0; | 
| 264 | 0 |     } | 
| 265 | 0 |     p12->mac->salt->length = saltlen; | 
| 266 | 0 |     if (salt == NULL) { | 
| 267 | 0 |         if (RAND_bytes_ex(p12->authsafes->ctx.libctx, p12->mac->salt->data, | 
| 268 | 0 |                           (size_t)saltlen, 0) <= 0) | 
| 269 | 0 |             return 0; | 
| 270 | 0 |     } else { | 
| 271 | 0 |         memcpy(p12->mac->salt->data, salt, saltlen); | 
| 272 | 0 |     } | 
| 273 | 0 |     X509_SIG_getm(p12->mac->dinfo, &macalg, NULL); | 
| 274 | 0 |     if (!X509_ALGOR_set0(macalg, OBJ_nid2obj(EVP_MD_get_type(md_type)), | 
| 275 | 0 |                          V_ASN1_NULL, NULL)) { | 
| 276 | 0 |         ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE); | 
| 277 | 0 |         return 0; | 
| 278 | 0 |     } | 
| 279 |  |  | 
| 280 | 0 |     return 1; | 
| 281 | 0 | } |