/*
- * Copyright 2013-2020 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2013-2022 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
*/
#include "internal/deprecated.h"
-#include "e_os.h"
+#include "internal/e_os.h"
+#include <string.h>
+#include <openssl/core_names.h>
+#include <openssl/dh.h>
+#include <openssl/evp.h>
+#include <openssl/asn1.h>
+#include <openssl/kdf.h>
+#include "internal/provider.h"
+#include "crypto/dh.h"
-#ifndef OPENSSL_NO_CMS
-# include <string.h>
-# include <openssl/core_names.h>
-# include <openssl/dh.h>
-# include <openssl/evp.h>
-# include <openssl/asn1.h>
-# include <openssl/kdf.h>
-# include <internal/provider.h>
-
-int DH_KDF_X9_42(unsigned char *out, size_t outlen,
- const unsigned char *Z, size_t Zlen,
- ASN1_OBJECT *key_oid,
- const unsigned char *ukm, size_t ukmlen, const EVP_MD *md)
+/* Key derivation function from X9.63/SECG */
+int ossl_dh_kdf_X9_42_asn1(unsigned char *out, size_t outlen,
+ const unsigned char *Z, size_t Zlen,
+ const char *cek_alg,
+ const unsigned char *ukm, size_t ukmlen,
+ const EVP_MD *md,
+ OSSL_LIB_CTX *libctx, const char *propq)
{
- int ret = 0, nid;
+ int ret = 0;
EVP_KDF_CTX *kctx = NULL;
EVP_KDF *kdf = NULL;
- const char *oid_sn;
OSSL_PARAM params[5], *p = params;
- const char *mdname = EVP_MD_name(md);
- const OSSL_PROVIDER *prov = EVP_MD_provider(md);
- OPENSSL_CTX *provctx = ossl_provider_library_context(prov);
+ const char *mdname = EVP_MD_get0_name(md);
- nid = OBJ_obj2nid(key_oid);
- if (nid == NID_undef)
+ kdf = EVP_KDF_fetch(libctx, OSSL_KDF_NAME_X942KDF_ASN1, propq);
+ if (kdf == NULL)
return 0;
- oid_sn = OBJ_nid2sn(nid);
- if (oid_sn == NULL)
- return 0;
-
- kdf = EVP_KDF_fetch(provctx, OSSL_KDF_NAME_X942KDF, NULL);
- if ((kctx = EVP_KDF_new_ctx(kdf)) == NULL)
+ kctx = EVP_KDF_CTX_new(kdf);
+ if (kctx == NULL)
goto err;
+
*p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST,
(char *)mdname, 0);
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY,
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM,
(unsigned char *)ukm, ukmlen);
*p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_CEK_ALG,
- (char *)oid_sn, 0);
+ (char *)cek_alg, 0);
*p = OSSL_PARAM_construct_end();
- ret = EVP_KDF_set_ctx_params(kctx, params) > 0
- && EVP_KDF_derive(kctx, out, outlen) > 0;
+ ret = EVP_KDF_derive(kctx, out, outlen, params) > 0;
err:
- EVP_KDF_free_ctx(kctx);
+ EVP_KDF_CTX_free(kctx);
EVP_KDF_free(kdf);
return ret;
}
-#endif /* OPENSSL_NO_CMS */
+
+#if !defined(FIPS_MODULE)
+int DH_KDF_X9_42(unsigned char *out, size_t outlen,
+ const unsigned char *Z, size_t Zlen,
+ ASN1_OBJECT *key_oid,
+ const unsigned char *ukm, size_t ukmlen, const EVP_MD *md)
+{
+ char key_alg[OSSL_MAX_NAME_SIZE];
+ const OSSL_PROVIDER *prov = EVP_MD_get0_provider(md);
+ OSSL_LIB_CTX *libctx = ossl_provider_libctx(prov);
+
+ if (OBJ_obj2txt(key_alg, sizeof(key_alg), key_oid, 0) <= 0)
+ return 0;
+
+ return ossl_dh_kdf_X9_42_asn1(out, outlen, Z, Zlen, key_alg,
+ ukm, ukmlen, md, libctx, NULL);
+}
+#endif /* !defined(FIPS_MODULE) */