2 * Copyright 1999-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/cryptlib.h"
12 #include <openssl/pkcs12.h>
13 #include <openssl/bn.h>
14 #include <openssl/trace.h>
16 /* PKCS12 compatible key/IV generation */
18 # define min(a,b) ((a) < (b) ? (a) : (b))
21 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
22 int saltlen, int id, int iter, int n,
23 unsigned char *out, const EVP_MD *md_type)
26 unsigned char *unipass;
32 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) {
33 PKCS12err(PKCS12_F_PKCS12_KEY_GEN_ASC, ERR_R_MALLOC_FAILURE);
36 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
37 id, iter, n, out, md_type);
40 OPENSSL_clear_free(unipass, uniplen);
44 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt,
45 int saltlen, int id, int iter, int n,
46 unsigned char *out, const EVP_MD *md_type)
49 unsigned char *unipass;
55 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) {
56 PKCS12err(PKCS12_F_PKCS12_KEY_GEN_UTF8, ERR_R_MALLOC_FAILURE);
59 ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen,
60 id, iter, n, out, md_type);
63 OPENSSL_clear_free(unipass, uniplen);
67 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
68 int saltlen, int id, int iter, int n,
69 unsigned char *out, const EVP_MD *md_type)
71 unsigned char *B = NULL, *D = NULL, *I = NULL, *p = NULL, *Ai = NULL;
75 EVP_MD_CTX *ctx = NULL;
76 unsigned char *tmpout = out;
79 ctx = EVP_MD_CTX_new();
83 OSSL_TRACE_BEGIN(PKCS12_KEYGEN) {
84 BIO_printf(trc_out, "PKCS12_key_gen_uni(): ID %d, ITER %d\n", id, iter);
85 BIO_printf(trc_out, "Password (length %d):\n", passlen);
86 BIO_hex_string(trc_out, 0, passlen, pass, passlen);
87 BIO_printf(trc_out, "\n");
88 BIO_printf(trc_out, "Salt (length %d):\n", saltlen);
89 BIO_hex_string(trc_out, 0, saltlen, salt, saltlen);
90 BIO_printf(trc_out, "\n");
91 } OSSL_TRACE_END(PKCS12_KEYGEN);
92 v = EVP_MD_block_size(md_type);
93 u = EVP_MD_size(md_type);
96 D = OPENSSL_malloc(v);
97 Ai = OPENSSL_malloc(u);
98 B = OPENSSL_malloc(v + 1);
99 Slen = v * ((saltlen + v - 1) / v);
101 Plen = v * ((passlen + v - 1) / v);
105 I = OPENSSL_malloc(Ilen);
106 if (D == NULL || Ai == NULL || B == NULL || I == NULL)
108 for (i = 0; i < v; i++)
111 for (i = 0; i < Slen; i++)
112 *p++ = salt[i % saltlen];
113 for (i = 0; i < Plen; i++)
114 *p++ = pass[i % passlen];
116 if (!EVP_DigestInit_ex(ctx, md_type, NULL)
117 || !EVP_DigestUpdate(ctx, D, v)
118 || !EVP_DigestUpdate(ctx, I, Ilen)
119 || !EVP_DigestFinal_ex(ctx, Ai, NULL))
121 for (j = 1; j < iter; j++) {
122 if (!EVP_DigestInit_ex(ctx, md_type, NULL)
123 || !EVP_DigestUpdate(ctx, Ai, u)
124 || !EVP_DigestFinal_ex(ctx, Ai, NULL))
127 memcpy(out, Ai, min(n, u));
129 OSSL_TRACE_BEGIN(PKCS12_KEYGEN) {
130 BIO_printf(trc_out, "Output KEY (length %d)\n", tmpn);
131 BIO_hex_string(trc_out, 0, tmpn, tmpout, tmpn);
132 BIO_printf(trc_out, "\n");
133 } OSSL_TRACE_END(PKCS12_KEYGEN);
139 for (j = 0; j < v; j++)
141 for (j = 0; j < Ilen; j += v) {
143 unsigned char *Ij = I + j;
146 /* Work out Ij = Ij + B + 1 */
147 for (k = v - 1; k >= 0; k--) {
149 Ij[k] = (unsigned char)c;
156 PKCS12err(PKCS12_F_PKCS12_KEY_GEN_UNI, ERR_R_MALLOC_FAILURE);
163 EVP_MD_CTX_free(ctx);