1*b077aed3SPierre Pronchery /*
2*b077aed3SPierre Pronchery * Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved.
3*b077aed3SPierre Pronchery *
4*b077aed3SPierre Pronchery * Licensed under the Apache License 2.0 (the "License"). You may not use
5*b077aed3SPierre Pronchery * this file except in compliance with the License. You can obtain a copy
6*b077aed3SPierre Pronchery * in the file LICENSE in the source distribution or at
7*b077aed3SPierre Pronchery * https://www.openssl.org/source/license.html
8*b077aed3SPierre Pronchery */
9*b077aed3SPierre Pronchery
10*b077aed3SPierre Pronchery /*
11*b077aed3SPierre Pronchery * HMAC low level APIs are deprecated for public use, but still ok for internal
12*b077aed3SPierre Pronchery * use.
13*b077aed3SPierre Pronchery */
14*b077aed3SPierre Pronchery #include "internal/deprecated.h"
15*b077aed3SPierre Pronchery
16*b077aed3SPierre Pronchery #include <stdlib.h>
17*b077aed3SPierre Pronchery #include <stdarg.h>
18*b077aed3SPierre Pronchery #include <string.h>
19*b077aed3SPierre Pronchery #include <openssl/hmac.h>
20*b077aed3SPierre Pronchery #include <openssl/evp.h>
21*b077aed3SPierre Pronchery #include <openssl/kdf.h>
22*b077aed3SPierre Pronchery #include <openssl/core_names.h>
23*b077aed3SPierre Pronchery #include <openssl/proverr.h>
24*b077aed3SPierre Pronchery #include "internal/cryptlib.h"
25*b077aed3SPierre Pronchery #include "internal/numbers.h"
26*b077aed3SPierre Pronchery #include "crypto/evp.h"
27*b077aed3SPierre Pronchery #include "prov/provider_ctx.h"
28*b077aed3SPierre Pronchery #include "prov/providercommon.h"
29*b077aed3SPierre Pronchery #include "prov/implementations.h"
30*b077aed3SPierre Pronchery #include "prov/provider_util.h"
31*b077aed3SPierre Pronchery #include "pbkdf2.h"
32*b077aed3SPierre Pronchery
33*b077aed3SPierre Pronchery /* Constants specified in SP800-132 */
34*b077aed3SPierre Pronchery #define KDF_PBKDF2_MIN_KEY_LEN_BITS 112
35*b077aed3SPierre Pronchery #define KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO 0xFFFFFFFF
36*b077aed3SPierre Pronchery #define KDF_PBKDF2_MIN_ITERATIONS 1000
37*b077aed3SPierre Pronchery #define KDF_PBKDF2_MIN_SALT_LEN (128 / 8)
38*b077aed3SPierre Pronchery
39*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_newctx_fn kdf_pbkdf2_new;
40*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_freectx_fn kdf_pbkdf2_free;
41*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_reset_fn kdf_pbkdf2_reset;
42*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_derive_fn kdf_pbkdf2_derive;
43*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_pbkdf2_settable_ctx_params;
44*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_set_ctx_params_fn kdf_pbkdf2_set_ctx_params;
45*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_pbkdf2_gettable_ctx_params;
46*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_get_ctx_params_fn kdf_pbkdf2_get_ctx_params;
47*b077aed3SPierre Pronchery
48*b077aed3SPierre Pronchery static int pbkdf2_derive(const char *pass, size_t passlen,
49*b077aed3SPierre Pronchery const unsigned char *salt, int saltlen, uint64_t iter,
50*b077aed3SPierre Pronchery const EVP_MD *digest, unsigned char *key,
51*b077aed3SPierre Pronchery size_t keylen, int extra_checks);
52*b077aed3SPierre Pronchery
53*b077aed3SPierre Pronchery typedef struct {
54*b077aed3SPierre Pronchery void *provctx;
55*b077aed3SPierre Pronchery unsigned char *pass;
56*b077aed3SPierre Pronchery size_t pass_len;
57*b077aed3SPierre Pronchery unsigned char *salt;
58*b077aed3SPierre Pronchery size_t salt_len;
59*b077aed3SPierre Pronchery uint64_t iter;
60*b077aed3SPierre Pronchery PROV_DIGEST digest;
61*b077aed3SPierre Pronchery int lower_bound_checks;
62*b077aed3SPierre Pronchery } KDF_PBKDF2;
63*b077aed3SPierre Pronchery
64*b077aed3SPierre Pronchery static void kdf_pbkdf2_init(KDF_PBKDF2 *ctx);
65*b077aed3SPierre Pronchery
kdf_pbkdf2_new(void * provctx)66*b077aed3SPierre Pronchery static void *kdf_pbkdf2_new(void *provctx)
67*b077aed3SPierre Pronchery {
68*b077aed3SPierre Pronchery KDF_PBKDF2 *ctx;
69*b077aed3SPierre Pronchery
70*b077aed3SPierre Pronchery if (!ossl_prov_is_running())
71*b077aed3SPierre Pronchery return NULL;
72*b077aed3SPierre Pronchery
73*b077aed3SPierre Pronchery ctx = OPENSSL_zalloc(sizeof(*ctx));
74*b077aed3SPierre Pronchery if (ctx == NULL) {
75*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
76*b077aed3SPierre Pronchery return NULL;
77*b077aed3SPierre Pronchery }
78*b077aed3SPierre Pronchery ctx->provctx = provctx;
79*b077aed3SPierre Pronchery kdf_pbkdf2_init(ctx);
80*b077aed3SPierre Pronchery return ctx;
81*b077aed3SPierre Pronchery }
82*b077aed3SPierre Pronchery
kdf_pbkdf2_cleanup(KDF_PBKDF2 * ctx)83*b077aed3SPierre Pronchery static void kdf_pbkdf2_cleanup(KDF_PBKDF2 *ctx)
84*b077aed3SPierre Pronchery {
85*b077aed3SPierre Pronchery ossl_prov_digest_reset(&ctx->digest);
86*b077aed3SPierre Pronchery OPENSSL_free(ctx->salt);
87*b077aed3SPierre Pronchery OPENSSL_clear_free(ctx->pass, ctx->pass_len);
88*b077aed3SPierre Pronchery memset(ctx, 0, sizeof(*ctx));
89*b077aed3SPierre Pronchery }
90*b077aed3SPierre Pronchery
kdf_pbkdf2_free(void * vctx)91*b077aed3SPierre Pronchery static void kdf_pbkdf2_free(void *vctx)
92*b077aed3SPierre Pronchery {
93*b077aed3SPierre Pronchery KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
94*b077aed3SPierre Pronchery
95*b077aed3SPierre Pronchery if (ctx != NULL) {
96*b077aed3SPierre Pronchery kdf_pbkdf2_cleanup(ctx);
97*b077aed3SPierre Pronchery OPENSSL_free(ctx);
98*b077aed3SPierre Pronchery }
99*b077aed3SPierre Pronchery }
100*b077aed3SPierre Pronchery
kdf_pbkdf2_reset(void * vctx)101*b077aed3SPierre Pronchery static void kdf_pbkdf2_reset(void *vctx)
102*b077aed3SPierre Pronchery {
103*b077aed3SPierre Pronchery KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
104*b077aed3SPierre Pronchery void *provctx = ctx->provctx;
105*b077aed3SPierre Pronchery
106*b077aed3SPierre Pronchery kdf_pbkdf2_cleanup(ctx);
107*b077aed3SPierre Pronchery ctx->provctx = provctx;
108*b077aed3SPierre Pronchery kdf_pbkdf2_init(ctx);
109*b077aed3SPierre Pronchery }
110*b077aed3SPierre Pronchery
kdf_pbkdf2_init(KDF_PBKDF2 * ctx)111*b077aed3SPierre Pronchery static void kdf_pbkdf2_init(KDF_PBKDF2 *ctx)
112*b077aed3SPierre Pronchery {
113*b077aed3SPierre Pronchery OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END };
114*b077aed3SPierre Pronchery OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
115*b077aed3SPierre Pronchery
116*b077aed3SPierre Pronchery params[0] = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST,
117*b077aed3SPierre Pronchery SN_sha1, 0);
118*b077aed3SPierre Pronchery if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx))
119*b077aed3SPierre Pronchery /* This is an error, but there is no way to indicate such directly */
120*b077aed3SPierre Pronchery ossl_prov_digest_reset(&ctx->digest);
121*b077aed3SPierre Pronchery ctx->iter = PKCS5_DEFAULT_ITER;
122*b077aed3SPierre Pronchery ctx->lower_bound_checks = ossl_kdf_pbkdf2_default_checks;
123*b077aed3SPierre Pronchery }
124*b077aed3SPierre Pronchery
pbkdf2_set_membuf(unsigned char ** buffer,size_t * buflen,const OSSL_PARAM * p)125*b077aed3SPierre Pronchery static int pbkdf2_set_membuf(unsigned char **buffer, size_t *buflen,
126*b077aed3SPierre Pronchery const OSSL_PARAM *p)
127*b077aed3SPierre Pronchery {
128*b077aed3SPierre Pronchery OPENSSL_clear_free(*buffer, *buflen);
129*b077aed3SPierre Pronchery *buffer = NULL;
130*b077aed3SPierre Pronchery *buflen = 0;
131*b077aed3SPierre Pronchery
132*b077aed3SPierre Pronchery if (p->data_size == 0) {
133*b077aed3SPierre Pronchery if ((*buffer = OPENSSL_malloc(1)) == NULL) {
134*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
135*b077aed3SPierre Pronchery return 0;
136*b077aed3SPierre Pronchery }
137*b077aed3SPierre Pronchery } else if (p->data != NULL) {
138*b077aed3SPierre Pronchery if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen))
139*b077aed3SPierre Pronchery return 0;
140*b077aed3SPierre Pronchery }
141*b077aed3SPierre Pronchery return 1;
142*b077aed3SPierre Pronchery }
143*b077aed3SPierre Pronchery
kdf_pbkdf2_derive(void * vctx,unsigned char * key,size_t keylen,const OSSL_PARAM params[])144*b077aed3SPierre Pronchery static int kdf_pbkdf2_derive(void *vctx, unsigned char *key, size_t keylen,
145*b077aed3SPierre Pronchery const OSSL_PARAM params[])
146*b077aed3SPierre Pronchery {
147*b077aed3SPierre Pronchery KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
148*b077aed3SPierre Pronchery const EVP_MD *md;
149*b077aed3SPierre Pronchery
150*b077aed3SPierre Pronchery if (!ossl_prov_is_running() || !kdf_pbkdf2_set_ctx_params(ctx, params))
151*b077aed3SPierre Pronchery return 0;
152*b077aed3SPierre Pronchery
153*b077aed3SPierre Pronchery if (ctx->pass == NULL) {
154*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS);
155*b077aed3SPierre Pronchery return 0;
156*b077aed3SPierre Pronchery }
157*b077aed3SPierre Pronchery
158*b077aed3SPierre Pronchery if (ctx->salt == NULL) {
159*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT);
160*b077aed3SPierre Pronchery return 0;
161*b077aed3SPierre Pronchery }
162*b077aed3SPierre Pronchery
163*b077aed3SPierre Pronchery md = ossl_prov_digest_md(&ctx->digest);
164*b077aed3SPierre Pronchery return pbkdf2_derive((char *)ctx->pass, ctx->pass_len,
165*b077aed3SPierre Pronchery ctx->salt, ctx->salt_len, ctx->iter,
166*b077aed3SPierre Pronchery md, key, keylen, ctx->lower_bound_checks);
167*b077aed3SPierre Pronchery }
168*b077aed3SPierre Pronchery
kdf_pbkdf2_set_ctx_params(void * vctx,const OSSL_PARAM params[])169*b077aed3SPierre Pronchery static int kdf_pbkdf2_set_ctx_params(void *vctx, const OSSL_PARAM params[])
170*b077aed3SPierre Pronchery {
171*b077aed3SPierre Pronchery const OSSL_PARAM *p;
172*b077aed3SPierre Pronchery KDF_PBKDF2 *ctx = vctx;
173*b077aed3SPierre Pronchery OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
174*b077aed3SPierre Pronchery int pkcs5;
175*b077aed3SPierre Pronchery uint64_t iter, min_iter;
176*b077aed3SPierre Pronchery
177*b077aed3SPierre Pronchery if (params == NULL)
178*b077aed3SPierre Pronchery return 1;
179*b077aed3SPierre Pronchery
180*b077aed3SPierre Pronchery if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx))
181*b077aed3SPierre Pronchery return 0;
182*b077aed3SPierre Pronchery
183*b077aed3SPierre Pronchery if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PKCS5)) != NULL) {
184*b077aed3SPierre Pronchery if (!OSSL_PARAM_get_int(p, &pkcs5))
185*b077aed3SPierre Pronchery return 0;
186*b077aed3SPierre Pronchery ctx->lower_bound_checks = pkcs5 == 0;
187*b077aed3SPierre Pronchery }
188*b077aed3SPierre Pronchery
189*b077aed3SPierre Pronchery if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL)
190*b077aed3SPierre Pronchery if (!pbkdf2_set_membuf(&ctx->pass, &ctx->pass_len, p))
191*b077aed3SPierre Pronchery return 0;
192*b077aed3SPierre Pronchery
193*b077aed3SPierre Pronchery if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) {
194*b077aed3SPierre Pronchery if (ctx->lower_bound_checks != 0
195*b077aed3SPierre Pronchery && p->data_size < KDF_PBKDF2_MIN_SALT_LEN) {
196*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
197*b077aed3SPierre Pronchery return 0;
198*b077aed3SPierre Pronchery }
199*b077aed3SPierre Pronchery if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len,p))
200*b077aed3SPierre Pronchery return 0;
201*b077aed3SPierre Pronchery }
202*b077aed3SPierre Pronchery
203*b077aed3SPierre Pronchery if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ITER)) != NULL) {
204*b077aed3SPierre Pronchery if (!OSSL_PARAM_get_uint64(p, &iter))
205*b077aed3SPierre Pronchery return 0;
206*b077aed3SPierre Pronchery min_iter = ctx->lower_bound_checks != 0 ? KDF_PBKDF2_MIN_ITERATIONS : 1;
207*b077aed3SPierre Pronchery if (iter < min_iter) {
208*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT);
209*b077aed3SPierre Pronchery return 0;
210*b077aed3SPierre Pronchery }
211*b077aed3SPierre Pronchery ctx->iter = iter;
212*b077aed3SPierre Pronchery }
213*b077aed3SPierre Pronchery return 1;
214*b077aed3SPierre Pronchery }
215*b077aed3SPierre Pronchery
kdf_pbkdf2_settable_ctx_params(ossl_unused void * ctx,ossl_unused void * p_ctx)216*b077aed3SPierre Pronchery static const OSSL_PARAM *kdf_pbkdf2_settable_ctx_params(ossl_unused void *ctx,
217*b077aed3SPierre Pronchery ossl_unused void *p_ctx)
218*b077aed3SPierre Pronchery {
219*b077aed3SPierre Pronchery static const OSSL_PARAM known_settable_ctx_params[] = {
220*b077aed3SPierre Pronchery OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
221*b077aed3SPierre Pronchery OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
222*b077aed3SPierre Pronchery OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0),
223*b077aed3SPierre Pronchery OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
224*b077aed3SPierre Pronchery OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL),
225*b077aed3SPierre Pronchery OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS5, NULL),
226*b077aed3SPierre Pronchery OSSL_PARAM_END
227*b077aed3SPierre Pronchery };
228*b077aed3SPierre Pronchery return known_settable_ctx_params;
229*b077aed3SPierre Pronchery }
230*b077aed3SPierre Pronchery
kdf_pbkdf2_get_ctx_params(void * vctx,OSSL_PARAM params[])231*b077aed3SPierre Pronchery static int kdf_pbkdf2_get_ctx_params(void *vctx, OSSL_PARAM params[])
232*b077aed3SPierre Pronchery {
233*b077aed3SPierre Pronchery OSSL_PARAM *p;
234*b077aed3SPierre Pronchery
235*b077aed3SPierre Pronchery if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL)
236*b077aed3SPierre Pronchery return OSSL_PARAM_set_size_t(p, SIZE_MAX);
237*b077aed3SPierre Pronchery return -2;
238*b077aed3SPierre Pronchery }
239*b077aed3SPierre Pronchery
kdf_pbkdf2_gettable_ctx_params(ossl_unused void * ctx,ossl_unused void * p_ctx)240*b077aed3SPierre Pronchery static const OSSL_PARAM *kdf_pbkdf2_gettable_ctx_params(ossl_unused void *ctx,
241*b077aed3SPierre Pronchery ossl_unused void *p_ctx)
242*b077aed3SPierre Pronchery {
243*b077aed3SPierre Pronchery static const OSSL_PARAM known_gettable_ctx_params[] = {
244*b077aed3SPierre Pronchery OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
245*b077aed3SPierre Pronchery OSSL_PARAM_END
246*b077aed3SPierre Pronchery };
247*b077aed3SPierre Pronchery return known_gettable_ctx_params;
248*b077aed3SPierre Pronchery }
249*b077aed3SPierre Pronchery
250*b077aed3SPierre Pronchery const OSSL_DISPATCH ossl_kdf_pbkdf2_functions[] = {
251*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_pbkdf2_new },
252*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_pbkdf2_free },
253*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_pbkdf2_reset },
254*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_pbkdf2_derive },
255*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS,
256*b077aed3SPierre Pronchery (void(*)(void))kdf_pbkdf2_settable_ctx_params },
257*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_set_ctx_params },
258*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS,
259*b077aed3SPierre Pronchery (void(*)(void))kdf_pbkdf2_gettable_ctx_params },
260*b077aed3SPierre Pronchery { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_get_ctx_params },
261*b077aed3SPierre Pronchery { 0, NULL }
262*b077aed3SPierre Pronchery };
263*b077aed3SPierre Pronchery
264*b077aed3SPierre Pronchery /*
265*b077aed3SPierre Pronchery * This is an implementation of PKCS#5 v2.0 password based encryption key
266*b077aed3SPierre Pronchery * derivation function PBKDF2. SHA1 version verified against test vectors
267*b077aed3SPierre Pronchery * posted by Peter Gutmann to the PKCS-TNG mailing list.
268*b077aed3SPierre Pronchery *
269*b077aed3SPierre Pronchery * The constraints specified by SP800-132 have been added i.e.
270*b077aed3SPierre Pronchery * - Check the range of the key length.
271*b077aed3SPierre Pronchery * - Minimum iteration count of 1000.
272*b077aed3SPierre Pronchery * - Randomly-generated portion of the salt shall be at least 128 bits.
273*b077aed3SPierre Pronchery */
pbkdf2_derive(const char * pass,size_t passlen,const unsigned char * salt,int saltlen,uint64_t iter,const EVP_MD * digest,unsigned char * key,size_t keylen,int lower_bound_checks)274*b077aed3SPierre Pronchery static int pbkdf2_derive(const char *pass, size_t passlen,
275*b077aed3SPierre Pronchery const unsigned char *salt, int saltlen, uint64_t iter,
276*b077aed3SPierre Pronchery const EVP_MD *digest, unsigned char *key,
277*b077aed3SPierre Pronchery size_t keylen, int lower_bound_checks)
278*b077aed3SPierre Pronchery {
279*b077aed3SPierre Pronchery int ret = 0;
280*b077aed3SPierre Pronchery unsigned char digtmp[EVP_MAX_MD_SIZE], *p, itmp[4];
281*b077aed3SPierre Pronchery int cplen, k, tkeylen, mdlen;
282*b077aed3SPierre Pronchery uint64_t j;
283*b077aed3SPierre Pronchery unsigned long i = 1;
284*b077aed3SPierre Pronchery HMAC_CTX *hctx_tpl = NULL, *hctx = NULL;
285*b077aed3SPierre Pronchery
286*b077aed3SPierre Pronchery mdlen = EVP_MD_get_size(digest);
287*b077aed3SPierre Pronchery if (mdlen <= 0)
288*b077aed3SPierre Pronchery return 0;
289*b077aed3SPierre Pronchery
290*b077aed3SPierre Pronchery /*
291*b077aed3SPierre Pronchery * This check should always be done because keylen / mdlen >= (2^32 - 1)
292*b077aed3SPierre Pronchery * results in an overflow of the loop counter 'i'.
293*b077aed3SPierre Pronchery */
294*b077aed3SPierre Pronchery if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) {
295*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
296*b077aed3SPierre Pronchery return 0;
297*b077aed3SPierre Pronchery }
298*b077aed3SPierre Pronchery
299*b077aed3SPierre Pronchery if (lower_bound_checks) {
300*b077aed3SPierre Pronchery if ((keylen * 8) < KDF_PBKDF2_MIN_KEY_LEN_BITS) {
301*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL);
302*b077aed3SPierre Pronchery return 0;
303*b077aed3SPierre Pronchery }
304*b077aed3SPierre Pronchery if (saltlen < KDF_PBKDF2_MIN_SALT_LEN) {
305*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
306*b077aed3SPierre Pronchery return 0;
307*b077aed3SPierre Pronchery }
308*b077aed3SPierre Pronchery if (iter < KDF_PBKDF2_MIN_ITERATIONS) {
309*b077aed3SPierre Pronchery ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT);
310*b077aed3SPierre Pronchery return 0;
311*b077aed3SPierre Pronchery }
312*b077aed3SPierre Pronchery }
313*b077aed3SPierre Pronchery
314*b077aed3SPierre Pronchery hctx_tpl = HMAC_CTX_new();
315*b077aed3SPierre Pronchery if (hctx_tpl == NULL)
316*b077aed3SPierre Pronchery return 0;
317*b077aed3SPierre Pronchery p = key;
318*b077aed3SPierre Pronchery tkeylen = keylen;
319*b077aed3SPierre Pronchery if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL))
320*b077aed3SPierre Pronchery goto err;
321*b077aed3SPierre Pronchery hctx = HMAC_CTX_new();
322*b077aed3SPierre Pronchery if (hctx == NULL)
323*b077aed3SPierre Pronchery goto err;
324*b077aed3SPierre Pronchery while (tkeylen) {
325*b077aed3SPierre Pronchery if (tkeylen > mdlen)
326*b077aed3SPierre Pronchery cplen = mdlen;
327*b077aed3SPierre Pronchery else
328*b077aed3SPierre Pronchery cplen = tkeylen;
329*b077aed3SPierre Pronchery /*
330*b077aed3SPierre Pronchery * We are unlikely to ever use more than 256 blocks (5120 bits!) but
331*b077aed3SPierre Pronchery * just in case...
332*b077aed3SPierre Pronchery */
333*b077aed3SPierre Pronchery itmp[0] = (unsigned char)((i >> 24) & 0xff);
334*b077aed3SPierre Pronchery itmp[1] = (unsigned char)((i >> 16) & 0xff);
335*b077aed3SPierre Pronchery itmp[2] = (unsigned char)((i >> 8) & 0xff);
336*b077aed3SPierre Pronchery itmp[3] = (unsigned char)(i & 0xff);
337*b077aed3SPierre Pronchery if (!HMAC_CTX_copy(hctx, hctx_tpl))
338*b077aed3SPierre Pronchery goto err;
339*b077aed3SPierre Pronchery if (!HMAC_Update(hctx, salt, saltlen)
340*b077aed3SPierre Pronchery || !HMAC_Update(hctx, itmp, 4)
341*b077aed3SPierre Pronchery || !HMAC_Final(hctx, digtmp, NULL))
342*b077aed3SPierre Pronchery goto err;
343*b077aed3SPierre Pronchery memcpy(p, digtmp, cplen);
344*b077aed3SPierre Pronchery for (j = 1; j < iter; j++) {
345*b077aed3SPierre Pronchery if (!HMAC_CTX_copy(hctx, hctx_tpl))
346*b077aed3SPierre Pronchery goto err;
347*b077aed3SPierre Pronchery if (!HMAC_Update(hctx, digtmp, mdlen)
348*b077aed3SPierre Pronchery || !HMAC_Final(hctx, digtmp, NULL))
349*b077aed3SPierre Pronchery goto err;
350*b077aed3SPierre Pronchery for (k = 0; k < cplen; k++)
351*b077aed3SPierre Pronchery p[k] ^= digtmp[k];
352*b077aed3SPierre Pronchery }
353*b077aed3SPierre Pronchery tkeylen -= cplen;
354*b077aed3SPierre Pronchery i++;
355*b077aed3SPierre Pronchery p += cplen;
356*b077aed3SPierre Pronchery }
357*b077aed3SPierre Pronchery ret = 1;
358*b077aed3SPierre Pronchery
359*b077aed3SPierre Pronchery err:
360*b077aed3SPierre Pronchery HMAC_CTX_free(hctx);
361*b077aed3SPierre Pronchery HMAC_CTX_free(hctx_tpl);
362*b077aed3SPierre Pronchery return ret;
363*b077aed3SPierre Pronchery }
364