Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame^] | 1 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 2 | * project 1999. |
| 3 | */ |
| 4 | /* ==================================================================== |
| 5 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. |
| 6 | * |
| 7 | * Redistribution and use in source and binary forms, with or without |
| 8 | * modification, are permitted provided that the following conditions |
| 9 | * are met: |
| 10 | * |
| 11 | * 1. Redistributions of source code must retain the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer. |
| 13 | * |
| 14 | * 2. Redistributions in binary form must reproduce the above copyright |
| 15 | * notice, this list of conditions and the following disclaimer in |
| 16 | * the documentation and/or other materials provided with the |
| 17 | * distribution. |
| 18 | * |
| 19 | * 3. All advertising materials mentioning features or use of this |
| 20 | * software must display the following acknowledgment: |
| 21 | * "This product includes software developed by the OpenSSL Project |
| 22 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
| 23 | * |
| 24 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
| 25 | * endorse or promote products derived from this software without |
| 26 | * prior written permission. For written permission, please contact |
| 27 | * licensing@OpenSSL.org. |
| 28 | * |
| 29 | * 5. Products derived from this software may not be called "OpenSSL" |
| 30 | * nor may "OpenSSL" appear in their names without prior written |
| 31 | * permission of the OpenSSL Project. |
| 32 | * |
| 33 | * 6. Redistributions of any form whatsoever must retain the following |
| 34 | * acknowledgment: |
| 35 | * "This product includes software developed by the OpenSSL Project |
| 36 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
| 37 | * |
| 38 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
| 39 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 40 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| 41 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
| 42 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 43 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 44 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| 45 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 46 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| 47 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 48 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 49 | * OF THE POSSIBILITY OF SUCH DAMAGE. |
| 50 | * ==================================================================== |
| 51 | * |
| 52 | * This product includes cryptographic software written by Eric Young |
| 53 | * (eay@cryptsoft.com). This product includes software written by Tim |
| 54 | * Hudson (tjh@cryptsoft.com). */ |
| 55 | |
| 56 | #include <openssl/evp.h> |
| 57 | |
| 58 | #include <openssl/hmac.h> |
| 59 | |
| 60 | |
| 61 | int PKCS5_PBKDF2_HMAC(const char *password, int password_len, |
| 62 | const uint8_t *salt, size_t salt_len, unsigned iterations, |
| 63 | const EVP_MD *digest, size_t key_len, uint8_t *out_key) { |
| 64 | uint8_t digest_tmp[EVP_MAX_MD_SIZE], *p, itmp[4]; |
| 65 | size_t cplen, mdlen, tkeylen, k; |
| 66 | unsigned j; |
| 67 | uint32_t i = 1; |
| 68 | HMAC_CTX hctx_tpl, hctx; |
| 69 | |
| 70 | mdlen = EVP_MD_size(digest); |
| 71 | HMAC_CTX_init(&hctx_tpl); |
| 72 | p = out_key; |
| 73 | tkeylen = key_len; |
| 74 | if (password == NULL) { |
| 75 | password_len = 0; |
| 76 | } else if (password_len == -1) { |
| 77 | /* TODO(fork): remove this hack. The OpenSSL code took the strlen when the |
| 78 | * length is given as -1. */ |
| 79 | password_len = strlen(password); |
| 80 | } |
| 81 | if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) { |
| 82 | HMAC_CTX_cleanup(&hctx_tpl); |
| 83 | return 0; |
| 84 | } |
| 85 | while (tkeylen) { |
| 86 | if (tkeylen > mdlen) { |
| 87 | cplen = mdlen; |
| 88 | } else { |
| 89 | cplen = tkeylen; |
| 90 | } |
| 91 | /* We are unlikely to ever use more than 256 blocks (5120 bits!) |
| 92 | * but just in case... */ |
| 93 | itmp[0] = (uint8_t)((i >> 24) & 0xff); |
| 94 | itmp[1] = (uint8_t)((i >> 16) & 0xff); |
| 95 | itmp[2] = (uint8_t)((i >> 8) & 0xff); |
| 96 | itmp[3] = (uint8_t)(i & 0xff); |
| 97 | if (!HMAC_CTX_copy(&hctx, &hctx_tpl)) { |
| 98 | HMAC_CTX_cleanup(&hctx_tpl); |
| 99 | return 0; |
| 100 | } |
| 101 | if (!HMAC_Update(&hctx, salt, salt_len) || |
| 102 | !HMAC_Update(&hctx, itmp, 4) || |
| 103 | !HMAC_Final(&hctx, digest_tmp, NULL)) { |
| 104 | HMAC_CTX_cleanup(&hctx_tpl); |
| 105 | HMAC_CTX_cleanup(&hctx); |
| 106 | return 0; |
| 107 | } |
| 108 | HMAC_CTX_cleanup(&hctx); |
| 109 | memcpy(p, digest_tmp, cplen); |
| 110 | for (j = 1; j < iterations; j++) { |
| 111 | if (!HMAC_CTX_copy(&hctx, &hctx_tpl)) { |
| 112 | HMAC_CTX_cleanup(&hctx_tpl); |
| 113 | return 0; |
| 114 | } |
| 115 | if (!HMAC_Update(&hctx, digest_tmp, mdlen) || |
| 116 | !HMAC_Final(&hctx, digest_tmp, NULL)) { |
| 117 | HMAC_CTX_cleanup(&hctx_tpl); |
| 118 | HMAC_CTX_cleanup(&hctx); |
| 119 | return 0; |
| 120 | } |
| 121 | HMAC_CTX_cleanup(&hctx); |
| 122 | for (k = 0; k < cplen; k++) { |
| 123 | p[k] ^= digest_tmp[k]; |
| 124 | } |
| 125 | } |
| 126 | tkeylen -= cplen; |
| 127 | i++; |
| 128 | p += cplen; |
| 129 | } |
| 130 | HMAC_CTX_cleanup(&hctx_tpl); |
| 131 | return 1; |
| 132 | } |
| 133 | |
| 134 | int PKCS5_PBKDF2_HMAC_SHA1(const char *password, int password_len, |
| 135 | const uint8_t *salt, size_t salt_len, |
| 136 | unsigned iterations, size_t key_len, |
| 137 | uint8_t *out_key) { |
| 138 | return PKCS5_PBKDF2_HMAC(password, password_len, salt, salt_len, iterations, |
| 139 | EVP_sha1(), key_len, out_key); |
| 140 | } |