/src/openssl/crypto/hmac/hm_pmeth.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2007-2018 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the OpenSSL license (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <stdio.h> |
11 | | #include "internal/cryptlib.h" |
12 | | #include <openssl/x509.h> |
13 | | #include <openssl/x509v3.h> |
14 | | #include <openssl/evp.h> |
15 | | #include <openssl/hmac.h> |
16 | | #include <openssl/err.h> |
17 | | #include "internal/evp_int.h" |
18 | | |
19 | | /* HMAC pkey context structure */ |
20 | | |
21 | | typedef struct { |
22 | | const EVP_MD *md; /* MD for HMAC use */ |
23 | | ASN1_OCTET_STRING ktmp; /* Temp storage for key */ |
24 | | HMAC_CTX *ctx; |
25 | | } HMAC_PKEY_CTX; |
26 | | |
27 | | static int pkey_hmac_init(EVP_PKEY_CTX *ctx) |
28 | 0 | { |
29 | 0 | HMAC_PKEY_CTX *hctx; |
30 | 0 |
|
31 | 0 | if ((hctx = OPENSSL_zalloc(sizeof(*hctx))) == NULL) { |
32 | 0 | CRYPTOerr(CRYPTO_F_PKEY_HMAC_INIT, ERR_R_MALLOC_FAILURE); |
33 | 0 | return 0; |
34 | 0 | } |
35 | 0 | hctx->ktmp.type = V_ASN1_OCTET_STRING; |
36 | 0 | hctx->ctx = HMAC_CTX_new(); |
37 | 0 | if (hctx->ctx == NULL) { |
38 | 0 | OPENSSL_free(hctx); |
39 | 0 | return 0; |
40 | 0 | } |
41 | 0 |
|
42 | 0 | ctx->data = hctx; |
43 | 0 | ctx->keygen_info_count = 0; |
44 | 0 |
|
45 | 0 | return 1; |
46 | 0 | } |
47 | | |
48 | | static void pkey_hmac_cleanup(EVP_PKEY_CTX *ctx); |
49 | | |
50 | | static int pkey_hmac_copy(EVP_PKEY_CTX *dst, EVP_PKEY_CTX *src) |
51 | 0 | { |
52 | 0 | HMAC_PKEY_CTX *sctx, *dctx; |
53 | 0 |
|
54 | 0 | /* allocate memory for dst->data and a new HMAC_CTX in dst->data->ctx */ |
55 | 0 | if (!pkey_hmac_init(dst)) |
56 | 0 | return 0; |
57 | 0 | sctx = EVP_PKEY_CTX_get_data(src); |
58 | 0 | dctx = EVP_PKEY_CTX_get_data(dst); |
59 | 0 | dctx->md = sctx->md; |
60 | 0 | if (!HMAC_CTX_copy(dctx->ctx, sctx->ctx)) |
61 | 0 | goto err; |
62 | 0 | if (sctx->ktmp.data) { |
63 | 0 | if (!ASN1_OCTET_STRING_set(&dctx->ktmp, |
64 | 0 | sctx->ktmp.data, sctx->ktmp.length)) |
65 | 0 | goto err; |
66 | 0 | } |
67 | 0 | return 1; |
68 | 0 | err: |
69 | 0 | /* release HMAC_CTX in dst->data->ctx and memory allocated for dst->data */ |
70 | 0 | pkey_hmac_cleanup (dst); |
71 | 0 | return 0; |
72 | 0 | } |
73 | | |
74 | | static void pkey_hmac_cleanup(EVP_PKEY_CTX *ctx) |
75 | 0 | { |
76 | 0 | HMAC_PKEY_CTX *hctx = EVP_PKEY_CTX_get_data(ctx); |
77 | 0 |
|
78 | 0 | if (hctx != NULL) { |
79 | 0 | HMAC_CTX_free(hctx->ctx); |
80 | 0 | OPENSSL_clear_free(hctx->ktmp.data, hctx->ktmp.length); |
81 | 0 | OPENSSL_free(hctx); |
82 | 0 | EVP_PKEY_CTX_set_data(ctx, NULL); |
83 | 0 | } |
84 | 0 | } |
85 | | |
86 | | static int pkey_hmac_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) |
87 | 0 | { |
88 | 0 | ASN1_OCTET_STRING *hkey = NULL; |
89 | 0 | HMAC_PKEY_CTX *hctx = ctx->data; |
90 | 0 | if (!hctx->ktmp.data) |
91 | 0 | return 0; |
92 | 0 | hkey = ASN1_OCTET_STRING_dup(&hctx->ktmp); |
93 | 0 | if (!hkey) |
94 | 0 | return 0; |
95 | 0 | EVP_PKEY_assign(pkey, EVP_PKEY_HMAC, hkey); |
96 | 0 |
|
97 | 0 | return 1; |
98 | 0 | } |
99 | | |
100 | | static int int_update(EVP_MD_CTX *ctx, const void *data, size_t count) |
101 | 0 | { |
102 | 0 | HMAC_PKEY_CTX *hctx = EVP_MD_CTX_pkey_ctx(ctx)->data; |
103 | 0 | if (!HMAC_Update(hctx->ctx, data, count)) |
104 | 0 | return 0; |
105 | 0 | return 1; |
106 | 0 | } |
107 | | |
108 | | static int hmac_signctx_init(EVP_PKEY_CTX *ctx, EVP_MD_CTX *mctx) |
109 | 0 | { |
110 | 0 | HMAC_PKEY_CTX *hctx = ctx->data; |
111 | 0 | HMAC_CTX_set_flags(hctx->ctx, |
112 | 0 | EVP_MD_CTX_test_flags(mctx, ~EVP_MD_CTX_FLAG_NO_INIT)); |
113 | 0 | EVP_MD_CTX_set_flags(mctx, EVP_MD_CTX_FLAG_NO_INIT); |
114 | 0 | EVP_MD_CTX_set_update_fn(mctx, int_update); |
115 | 0 | return 1; |
116 | 0 | } |
117 | | |
118 | | static int hmac_signctx(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, |
119 | | EVP_MD_CTX *mctx) |
120 | 0 | { |
121 | 0 | unsigned int hlen; |
122 | 0 | HMAC_PKEY_CTX *hctx = ctx->data; |
123 | 0 | int l = EVP_MD_CTX_size(mctx); |
124 | 0 |
|
125 | 0 | if (l < 0) |
126 | 0 | return 0; |
127 | 0 | *siglen = l; |
128 | 0 | if (!sig) |
129 | 0 | return 1; |
130 | 0 | |
131 | 0 | if (!HMAC_Final(hctx->ctx, sig, &hlen)) |
132 | 0 | return 0; |
133 | 0 | *siglen = (size_t)hlen; |
134 | 0 | return 1; |
135 | 0 | } |
136 | | |
137 | | static int pkey_hmac_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) |
138 | 0 | { |
139 | 0 | HMAC_PKEY_CTX *hctx = ctx->data; |
140 | 0 | ASN1_OCTET_STRING *key; |
141 | 0 | switch (type) { |
142 | 0 |
|
143 | 0 | case EVP_PKEY_CTRL_SET_MAC_KEY: |
144 | 0 | if ((!p2 && p1 > 0) || (p1 < -1)) |
145 | 0 | return 0; |
146 | 0 | if (!ASN1_OCTET_STRING_set(&hctx->ktmp, p2, p1)) |
147 | 0 | return 0; |
148 | 0 | break; |
149 | 0 |
|
150 | 0 | case EVP_PKEY_CTRL_MD: |
151 | 0 | hctx->md = p2; |
152 | 0 | break; |
153 | 0 |
|
154 | 0 | case EVP_PKEY_CTRL_DIGESTINIT: |
155 | 0 | key = (ASN1_OCTET_STRING *)ctx->pkey->pkey.ptr; |
156 | 0 | if (!HMAC_Init_ex(hctx->ctx, key->data, key->length, hctx->md, |
157 | 0 | ctx->engine)) |
158 | 0 | return 0; |
159 | 0 | break; |
160 | 0 |
|
161 | 0 | default: |
162 | 0 | return -2; |
163 | 0 | |
164 | 0 | } |
165 | 0 | return 1; |
166 | 0 | } |
167 | | |
168 | | static int pkey_hmac_ctrl_str(EVP_PKEY_CTX *ctx, |
169 | | const char *type, const char *value) |
170 | | { |
171 | | if (!value) { |
172 | | return 0; |
173 | | } |
174 | | if (strcmp(type, "key") == 0) |
175 | | return EVP_PKEY_CTX_str2ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, value); |
176 | | if (strcmp(type, "hexkey") == 0) |
177 | | return EVP_PKEY_CTX_hex2ctrl(ctx, EVP_PKEY_CTRL_SET_MAC_KEY, value); |
178 | | return -2; |
179 | | } |
180 | | |
181 | | const EVP_PKEY_METHOD hmac_pkey_meth = { |
182 | | EVP_PKEY_HMAC, |
183 | | 0, |
184 | | pkey_hmac_init, |
185 | | pkey_hmac_copy, |
186 | | pkey_hmac_cleanup, |
187 | | |
188 | | 0, 0, |
189 | | |
190 | | 0, |
191 | | pkey_hmac_keygen, |
192 | | |
193 | | 0, 0, |
194 | | |
195 | | 0, 0, |
196 | | |
197 | | 0, 0, |
198 | | |
199 | | hmac_signctx_init, |
200 | | hmac_signctx, |
201 | | |
202 | | 0, 0, |
203 | | |
204 | | 0, 0, |
205 | | |
206 | | 0, 0, |
207 | | |
208 | | 0, 0, |
209 | | |
210 | | pkey_hmac_ctrl, |
211 | | pkey_hmac_ctrl_str |
212 | | }; |