Change builting PBE to use static table. Add entries for HMAC and MD5, GOST.
[openssl.git] / crypto / evp / evp_pbe.c
1 /* evp_pbe.c */
2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3  * project 1999.
4  */
5 /* ====================================================================
6  * Copyright (c) 1999-2006 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer. 
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com).
56  *
57  */
58
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include <openssl/evp.h>
62 #include <openssl/pkcs12.h>
63 #include <openssl/x509.h>
64
65 /* Password based encryption (PBE) functions */
66
67 static STACK *pbe_algs;
68
69 /* Setup a cipher context from a PBE algorithm */
70
71 typedef struct
72         {
73         int pbe_type;
74         int pbe_nid;
75         int cipher_nid;
76         int md_nid;
77         EVP_PBE_KEYGEN *keygen;
78         } EVP_PBE_CTL;
79
80 EVP_PBE_CTL builtin_pbe[] = 
81         {
82         {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndDES_CBC,
83                         NID_des_cbc, NID_md2, PKCS5_PBE_keyivgen},
84         {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndDES_CBC,
85                         NID_des_cbc, NID_md5, PKCS5_PBE_keyivgen},
86         {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndRC2_CBC,
87                         NID_rc2_64_cbc, NID_sha1, PKCS5_PBE_keyivgen},
88
89         {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC4,
90                         NID_rc4, NID_sha1, PKCS12_PBE_keyivgen},
91         {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC4,
92                         NID_rc4_40, NID_sha1, PKCS12_PBE_keyivgen},
93         {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
94                         NID_des_ede3_cbc, NID_sha1, PKCS12_PBE_keyivgen},
95         {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And2_Key_TripleDES_CBC, 
96                         NID_des_ede_cbc, NID_sha1, PKCS12_PBE_keyivgen},
97         {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And128BitRC2_CBC,
98                         NID_rc2_cbc, NID_sha1, PKCS12_PBE_keyivgen},
99         {EVP_PBE_TYPE_OUTER, NID_pbe_WithSHA1And40BitRC2_CBC,
100                         NID_rc2_40_cbc, NID_sha1, PKCS12_PBE_keyivgen},
101
102 #ifndef OPENSSL_NO_HMAC
103         {EVP_PBE_TYPE_OUTER, NID_pbes2, -1, -1, PKCS5_v2_PBE_keyivgen},
104 #endif
105         {EVP_PBE_TYPE_OUTER, NID_pbeWithMD2AndRC2_CBC,
106                         NID_rc2_64_cbc, NID_md2, PKCS5_PBE_keyivgen},
107         {EVP_PBE_TYPE_OUTER, NID_pbeWithMD5AndRC2_CBC,
108                         NID_rc2_64_cbc, NID_md5, PKCS5_PBE_keyivgen},
109         {EVP_PBE_TYPE_OUTER, NID_pbeWithSHA1AndDES_CBC,
110                         NID_des_cbc, NID_sha1, PKCS5_PBE_keyivgen},
111
112
113         {EVP_PBE_TYPE_PRF, NID_hmacWithSHA1, -1, NID_sha1, 0},
114         {EVP_PBE_TYPE_PRF, NID_id_HMACGostR3411_94, -1, NID_id_GostR3411_94, 0},
115         {EVP_PBE_TYPE_PRF, NID_hmacWithMD5, -1, NID_md5, 0},
116         };
117
118 #ifdef TEST
119 int main(int argc, char **argv)
120         {
121         int i, nid_md, nid_cipher;
122         EVP_PBE_CTL *tpbe, *tpbe2;
123         /*OpenSSL_add_all_algorithms();*/
124
125         for (i = 0; i < sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL); i++)
126                 {
127                 tpbe = builtin_pbe + i;
128                 fprintf(stderr, "%d %d %s ", tpbe->pbe_type, tpbe->pbe_nid,
129                                                 OBJ_nid2sn(tpbe->pbe_nid));
130                 if (EVP_PBE_find(tpbe->pbe_type, tpbe->pbe_nid,
131                                         &nid_cipher ,&nid_md,0))
132                         fprintf(stderr, "Found %s %s\n",
133                                         OBJ_nid2sn(nid_cipher),
134                                         OBJ_nid2sn(nid_md));
135                 else
136                         fprintf(stderr, "Find ERROR!!\n");
137                 }
138
139         return 0;
140         }
141 #endif
142                 
143
144
145 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
146              ASN1_TYPE *param, EVP_CIPHER_CTX *ctx, int en_de)
147         {
148         const EVP_CIPHER *cipher;
149         const EVP_MD *md;
150         int cipher_nid, md_nid;
151         EVP_PBE_KEYGEN *keygen;
152
153         if (!EVP_PBE_find(EVP_PBE_TYPE_OUTER, OBJ_obj2nid(pbe_obj),
154                                         &cipher_nid, &md_nid, &keygen))
155                 {
156                 char obj_tmp[80];
157                 EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_UNKNOWN_PBE_ALGORITHM);
158                 if (!pbe_obj) BUF_strlcpy (obj_tmp, "NULL", sizeof obj_tmp);
159                 else i2t_ASN1_OBJECT(obj_tmp, sizeof obj_tmp, pbe_obj);
160                 ERR_add_error_data(2, "TYPE=", obj_tmp);
161                 return 0;
162                 }
163
164         if(!pass)
165                 passlen = 0;
166         else if (passlen == -1)
167                 passlen = strlen(pass);
168
169         if (cipher_nid == -1)
170                 cipher = NULL;
171         else
172                 cipher = EVP_get_cipherbynid(cipher_nid);
173
174         if (md_nid == -1)
175                 md = NULL;
176         else
177                 md = EVP_get_digestbynid(md_nid);
178
179         if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
180                 {
181                 EVPerr(EVP_F_EVP_PBE_CIPHERINIT,EVP_R_KEYGEN_FAILURE);
182                 return 0;
183                 }
184         return 1;       
185 }
186
187 static int pbe_cmp2(const void *a, const void *b)
188         {
189         const EVP_PBE_CTL *pbe1 = a;
190         const EVP_PBE_CTL *pbe2 = b;
191         int ret = pbe1->pbe_type - pbe2->pbe_type;
192         if (ret)
193                 return ret;
194         else
195                 return pbe1->pbe_nid - pbe2->pbe_nid;
196         }
197
198 static int pbe_cmp(const char * const *a, const char * const *b)
199         {
200         const EVP_PBE_CTL * const *pbe1 = (const EVP_PBE_CTL * const *) a,
201                         * const *pbe2 = (const EVP_PBE_CTL * const *)b;
202         int ret = (*pbe1)->pbe_type - (*pbe2)->pbe_type;
203         if (ret)
204                 return ret;
205         else
206                 return (*pbe1)->pbe_nid - (*pbe2)->pbe_nid;
207         }
208
209 /* Add a PBE algorithm */
210
211 int EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid,
212              EVP_PBE_KEYGEN *keygen)
213         {
214         EVP_PBE_CTL *pbe_tmp;
215         if (!pbe_algs)
216                 pbe_algs = sk_new(pbe_cmp);
217         if (!(pbe_tmp = (EVP_PBE_CTL*) OPENSSL_malloc (sizeof(EVP_PBE_CTL))))
218                 {
219                 EVPerr(EVP_F_EVP_PBE_ALG_ADD,ERR_R_MALLOC_FAILURE);
220                 return 0;
221                 }
222         pbe_tmp->pbe_type = pbe_type;
223         pbe_tmp->pbe_nid = pbe_nid;
224         pbe_tmp->cipher_nid = cipher_nid;
225         pbe_tmp->md_nid = md_nid;
226         pbe_tmp->keygen = keygen;
227
228
229         sk_push (pbe_algs, (char *)pbe_tmp);
230         return 1;
231         }
232
233 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
234              EVP_PBE_KEYGEN *keygen)
235         {
236         int cipher_nid, md_nid;
237         if (cipher)
238                 cipher_nid = EVP_CIPHER_type(cipher);
239         else
240                 cipher_nid = -1;
241         if (md)
242                 md_nid = EVP_MD_type(md);
243         else
244                 md_nid = -1;
245
246         return EVP_PBE_alg_add_type(EVP_PBE_TYPE_OUTER, nid,
247                                         cipher_nid, md_nid, keygen);
248         }
249
250 int EVP_PBE_find(int type, int pbe_nid,
251                         int *pcnid, int *pmnid, EVP_PBE_KEYGEN **pkeygen)
252         {
253         EVP_PBE_CTL *pbetmp = NULL, pbelu;
254         int i;
255         if (pbe_nid == NID_undef)
256                 return 0;
257
258         pbelu.pbe_type = type;
259         pbelu.pbe_nid = pbe_nid;
260
261         if (pbe_algs)
262                 {
263                 i = sk_find(pbe_algs, (char *)&pbelu);
264                 if (i != -1)
265                         pbetmp = (EVP_PBE_CTL *)sk_value (pbe_algs, i);
266                 }
267         if (pbetmp == NULL)
268                 {
269                 pbetmp = (EVP_PBE_CTL *) OBJ_bsearch((char *)&pbelu,
270                         (char *)builtin_pbe,
271                         sizeof(builtin_pbe)/sizeof(EVP_PBE_CTL),
272                         sizeof(EVP_PBE_CTL),
273                         pbe_cmp2);
274                 }
275         if (pbetmp == NULL)
276                 return 0;
277         if (pcnid)
278                 *pcnid = pbetmp->cipher_nid;
279         if (pmnid)
280                 *pmnid = pbetmp->md_nid;
281         if (pkeygen)
282                 *pkeygen = pbetmp->keygen;
283         return 1;
284         }
285                 
286
287
288 void EVP_PBE_cleanup(void)
289         {
290         sk_pop_free(pbe_algs, OPENSSL_freeFunc);
291         pbe_algs = NULL;
292         }