1/* p12_crpt.c */
2/*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 1999.
5 */
6/* ====================================================================
7 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 *    notice, this list of conditions and the following disclaimer in
18 *    the documentation and/or other materials provided with the
19 *    distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 *    software must display the following acknowledgment:
23 *    "This product includes software developed by the OpenSSL Project
24 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 *    endorse or promote products derived from this software without
28 *    prior written permission. For written permission, please contact
29 *    licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 *    nor may "OpenSSL" appear in their names without prior written
33 *    permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 *    acknowledgment:
37 *    "This product includes software developed by the OpenSSL Project
38 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com).  This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com).
57 *
58 */
59
60#include <stdio.h>
61#include "cryptlib.h"
62#include <openssl/pkcs12.h>
63
64/* PKCS#12 PBE algorithms now in static table */
65
66void PKCS12_PBE_add(void)
67{
68}
69
70int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
71                        ASN1_TYPE *param, const EVP_CIPHER *cipher,
72                        const EVP_MD *md, int en_de)
73{
74    PBEPARAM *pbe;
75    int saltlen, iter, ret;
76    unsigned char *salt;
77    const unsigned char *pbuf;
78    unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
79
80    if (cipher == NULL)
81        return 0;
82
83    /* Extract useful info from parameter */
84    if (param == NULL || param->type != V_ASN1_SEQUENCE ||
85        param->value.sequence == NULL) {
86        PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN, PKCS12_R_DECODE_ERROR);
87        return 0;
88    }
89
90    pbuf = param->value.sequence->data;
91    if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) {
92        PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN, PKCS12_R_DECODE_ERROR);
93        return 0;
94    }
95
96    if (!pbe->iter)
97        iter = 1;
98    else
99        iter = ASN1_INTEGER_get(pbe->iter);
100    salt = pbe->salt->data;
101    saltlen = pbe->salt->length;
102    if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
103                        iter, EVP_CIPHER_key_length(cipher), key, md)) {
104        PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN, PKCS12_R_KEY_GEN_ERROR);
105        PBEPARAM_free(pbe);
106        return 0;
107    }
108    if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID,
109                        iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
110        PKCS12err(PKCS12_F_PKCS12_PBE_KEYIVGEN, PKCS12_R_IV_GEN_ERROR);
111        PBEPARAM_free(pbe);
112        return 0;
113    }
114    PBEPARAM_free(pbe);
115    ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
116    OPENSSL_cleanse(key, EVP_MAX_KEY_LENGTH);
117    OPENSSL_cleanse(iv, EVP_MAX_IV_LENGTH);
118    return ret;
119}
120