Coverage Report

Created: 2018-08-29 13:53

/src/openssl/crypto/dh/dh_kdf.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2013-2016 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the OpenSSL license (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include "e_os.h"
11
12
#ifndef OPENSSL_NO_CMS
13
#include <string.h>
14
#include <openssl/dh.h>
15
#include <openssl/evp.h>
16
#include <openssl/asn1.h>
17
#include <openssl/cms.h>
18
19
20
/* Key derivation from X9.42/RFC2631 */
21
/* Uses CMS functions, hence the #ifdef wrapper. */
22
23
0
#define DH_KDF_MAX      (1L << 30)
24
25
/* Skip past an ASN1 structure: for OBJECT skip content octets too */
26
27
static int skip_asn1(unsigned char **pp, long *plen, int exptag)
28
0
{
29
0
    const unsigned char *q = *pp;
30
0
    int i, tag, xclass;
31
0
    long tmplen;
32
0
    i = ASN1_get_object(&q, &tmplen, &tag, &xclass, *plen);
33
0
    if (i & 0x80)
34
0
        return 0;
35
0
    if (tag != exptag || xclass != V_ASN1_UNIVERSAL)
36
0
        return 0;
37
0
    if (tag == V_ASN1_OBJECT)
38
0
        q += tmplen;
39
0
    *plen -= q - *pp;
40
0
    *pp = (unsigned char *)q;
41
0
    return 1;
42
0
}
43
44
/*
45
 * Encode the DH shared info structure, return an offset to the counter value
46
 * so we can update the structure without reencoding it.
47
 */
48
49
static int dh_sharedinfo_encode(unsigned char **pder, unsigned char **pctr,
50
                                ASN1_OBJECT *key_oid, size_t outlen,
51
                                const unsigned char *ukm, size_t ukmlen)
52
0
{
53
0
    unsigned char *p;
54
0
    int derlen;
55
0
    long tlen;
56
0
    /* "magic" value to check offset is sane */
57
0
    static unsigned char ctr[4] = { 0xF3, 0x17, 0x22, 0x53 };
58
0
    X509_ALGOR atmp;
59
0
    ASN1_OCTET_STRING ctr_oct, ukm_oct, *pukm_oct;
60
0
    ASN1_TYPE ctr_atype;
61
0
    if (ukmlen > DH_KDF_MAX || outlen > DH_KDF_MAX)
62
0
        return 0;
63
0
    ctr_oct.data = ctr;
64
0
    ctr_oct.length = 4;
65
0
    ctr_oct.flags = 0;
66
0
    ctr_oct.type = V_ASN1_OCTET_STRING;
67
0
    ctr_atype.type = V_ASN1_OCTET_STRING;
68
0
    ctr_atype.value.octet_string = &ctr_oct;
69
0
    atmp.algorithm = key_oid;
70
0
    atmp.parameter = &ctr_atype;
71
0
    if (ukm) {
72
0
        ukm_oct.type = V_ASN1_OCTET_STRING;
73
0
        ukm_oct.flags = 0;
74
0
        ukm_oct.data = (unsigned char *)ukm;
75
0
        ukm_oct.length = ukmlen;
76
0
        pukm_oct = &ukm_oct;
77
0
    } else
78
0
        pukm_oct = NULL;
79
0
    derlen = CMS_SharedInfo_encode(pder, &atmp, pukm_oct, outlen);
80
0
    if (derlen <= 0)
81
0
        return 0;
82
0
    p = *pder;
83
0
    tlen = derlen;
84
0
    if (!skip_asn1(&p, &tlen, V_ASN1_SEQUENCE))
85
0
        return 0;
86
0
    if (!skip_asn1(&p, &tlen, V_ASN1_SEQUENCE))
87
0
        return 0;
88
0
    if (!skip_asn1(&p, &tlen, V_ASN1_OBJECT))
89
0
        return 0;
90
0
    if (!skip_asn1(&p, &tlen, V_ASN1_OCTET_STRING))
91
0
        return 0;
92
0
    if (CRYPTO_memcmp(p, ctr, 4))
93
0
        return 0;
94
0
    *pctr = p;
95
0
    return derlen;
96
0
}
97
98
int DH_KDF_X9_42(unsigned char *out, size_t outlen,
99
                 const unsigned char *Z, size_t Zlen,
100
                 ASN1_OBJECT *key_oid,
101
                 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md)
102
0
{
103
0
    EVP_MD_CTX *mctx = NULL;
104
0
    int rv = 0;
105
0
    unsigned int i;
106
0
    size_t mdlen;
107
0
    unsigned char *der = NULL, *ctr;
108
0
    int derlen;
109
0
    if (Zlen > DH_KDF_MAX)
110
0
        return 0;
111
0
    mctx = EVP_MD_CTX_new();
112
0
    if (mctx == NULL)
113
0
        return 0;
114
0
    mdlen = EVP_MD_size(md);
115
0
    derlen = dh_sharedinfo_encode(&der, &ctr, key_oid, outlen, ukm, ukmlen);
116
0
    if (derlen == 0)
117
0
        goto err;
118
0
    for (i = 1;; i++) {
119
0
        unsigned char mtmp[EVP_MAX_MD_SIZE];
120
0
        if (!EVP_DigestInit_ex(mctx, md, NULL)
121
0
            || !EVP_DigestUpdate(mctx, Z, Zlen))
122
0
            goto err;
123
0
        ctr[3] = i & 0xFF;
124
0
        ctr[2] = (i >> 8) & 0xFF;
125
0
        ctr[1] = (i >> 16) & 0xFF;
126
0
        ctr[0] = (i >> 24) & 0xFF;
127
0
        if (!EVP_DigestUpdate(mctx, der, derlen))
128
0
            goto err;
129
0
        if (outlen >= mdlen) {
130
0
            if (!EVP_DigestFinal(mctx, out, NULL))
131
0
                goto err;
132
0
            outlen -= mdlen;
133
0
            if (outlen == 0)
134
0
                break;
135
0
            out += mdlen;
136
0
        } else {
137
0
            if (!EVP_DigestFinal(mctx, mtmp, NULL))
138
0
                goto err;
139
0
            memcpy(out, mtmp, outlen);
140
0
            OPENSSL_cleanse(mtmp, mdlen);
141
0
            break;
142
0
        }
143
0
    }
144
0
    rv = 1;
145
0
 err:
146
0
    OPENSSL_free(der);
147
0
    EVP_MD_CTX_free(mctx);
148
0
    return rv;
149
0
}
150
#endif