xref: /freebsd-src/crypto/openssl/providers/implementations/kdfs/pbkdf2.c (revision b077aed33b7b6aefca7b17ddb250cf521f938613)
1*b077aed3SPierre Pronchery /*
2*b077aed3SPierre Pronchery  * Copyright 2018-2021 The OpenSSL Project Authors. All Rights Reserved.
3*b077aed3SPierre Pronchery  *
4*b077aed3SPierre Pronchery  * Licensed under the Apache License 2.0 (the "License").  You may not use
5*b077aed3SPierre Pronchery  * this file except in compliance with the License.  You can obtain a copy
6*b077aed3SPierre Pronchery  * in the file LICENSE in the source distribution or at
7*b077aed3SPierre Pronchery  * https://www.openssl.org/source/license.html
8*b077aed3SPierre Pronchery  */
9*b077aed3SPierre Pronchery 
10*b077aed3SPierre Pronchery /*
11*b077aed3SPierre Pronchery  * HMAC low level APIs are deprecated for public use, but still ok for internal
12*b077aed3SPierre Pronchery  * use.
13*b077aed3SPierre Pronchery  */
14*b077aed3SPierre Pronchery #include "internal/deprecated.h"
15*b077aed3SPierre Pronchery 
16*b077aed3SPierre Pronchery #include <stdlib.h>
17*b077aed3SPierre Pronchery #include <stdarg.h>
18*b077aed3SPierre Pronchery #include <string.h>
19*b077aed3SPierre Pronchery #include <openssl/hmac.h>
20*b077aed3SPierre Pronchery #include <openssl/evp.h>
21*b077aed3SPierre Pronchery #include <openssl/kdf.h>
22*b077aed3SPierre Pronchery #include <openssl/core_names.h>
23*b077aed3SPierre Pronchery #include <openssl/proverr.h>
24*b077aed3SPierre Pronchery #include "internal/cryptlib.h"
25*b077aed3SPierre Pronchery #include "internal/numbers.h"
26*b077aed3SPierre Pronchery #include "crypto/evp.h"
27*b077aed3SPierre Pronchery #include "prov/provider_ctx.h"
28*b077aed3SPierre Pronchery #include "prov/providercommon.h"
29*b077aed3SPierre Pronchery #include "prov/implementations.h"
30*b077aed3SPierre Pronchery #include "prov/provider_util.h"
31*b077aed3SPierre Pronchery #include "pbkdf2.h"
32*b077aed3SPierre Pronchery 
33*b077aed3SPierre Pronchery /* Constants specified in SP800-132 */
34*b077aed3SPierre Pronchery #define KDF_PBKDF2_MIN_KEY_LEN_BITS  112
35*b077aed3SPierre Pronchery #define KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO 0xFFFFFFFF
36*b077aed3SPierre Pronchery #define KDF_PBKDF2_MIN_ITERATIONS 1000
37*b077aed3SPierre Pronchery #define KDF_PBKDF2_MIN_SALT_LEN   (128 / 8)
38*b077aed3SPierre Pronchery 
39*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_newctx_fn kdf_pbkdf2_new;
40*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_freectx_fn kdf_pbkdf2_free;
41*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_reset_fn kdf_pbkdf2_reset;
42*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_derive_fn kdf_pbkdf2_derive;
43*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_settable_ctx_params_fn kdf_pbkdf2_settable_ctx_params;
44*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_set_ctx_params_fn kdf_pbkdf2_set_ctx_params;
45*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_gettable_ctx_params_fn kdf_pbkdf2_gettable_ctx_params;
46*b077aed3SPierre Pronchery static OSSL_FUNC_kdf_get_ctx_params_fn kdf_pbkdf2_get_ctx_params;
47*b077aed3SPierre Pronchery 
48*b077aed3SPierre Pronchery static int  pbkdf2_derive(const char *pass, size_t passlen,
49*b077aed3SPierre Pronchery                           const unsigned char *salt, int saltlen, uint64_t iter,
50*b077aed3SPierre Pronchery                           const EVP_MD *digest, unsigned char *key,
51*b077aed3SPierre Pronchery                           size_t keylen, int extra_checks);
52*b077aed3SPierre Pronchery 
53*b077aed3SPierre Pronchery typedef struct {
54*b077aed3SPierre Pronchery     void *provctx;
55*b077aed3SPierre Pronchery     unsigned char *pass;
56*b077aed3SPierre Pronchery     size_t pass_len;
57*b077aed3SPierre Pronchery     unsigned char *salt;
58*b077aed3SPierre Pronchery     size_t salt_len;
59*b077aed3SPierre Pronchery     uint64_t iter;
60*b077aed3SPierre Pronchery     PROV_DIGEST digest;
61*b077aed3SPierre Pronchery     int lower_bound_checks;
62*b077aed3SPierre Pronchery } KDF_PBKDF2;
63*b077aed3SPierre Pronchery 
64*b077aed3SPierre Pronchery static void kdf_pbkdf2_init(KDF_PBKDF2 *ctx);
65*b077aed3SPierre Pronchery 
kdf_pbkdf2_new(void * provctx)66*b077aed3SPierre Pronchery static void *kdf_pbkdf2_new(void *provctx)
67*b077aed3SPierre Pronchery {
68*b077aed3SPierre Pronchery     KDF_PBKDF2 *ctx;
69*b077aed3SPierre Pronchery 
70*b077aed3SPierre Pronchery     if (!ossl_prov_is_running())
71*b077aed3SPierre Pronchery         return NULL;
72*b077aed3SPierre Pronchery 
73*b077aed3SPierre Pronchery     ctx = OPENSSL_zalloc(sizeof(*ctx));
74*b077aed3SPierre Pronchery     if (ctx == NULL) {
75*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
76*b077aed3SPierre Pronchery         return NULL;
77*b077aed3SPierre Pronchery     }
78*b077aed3SPierre Pronchery     ctx->provctx = provctx;
79*b077aed3SPierre Pronchery     kdf_pbkdf2_init(ctx);
80*b077aed3SPierre Pronchery     return ctx;
81*b077aed3SPierre Pronchery }
82*b077aed3SPierre Pronchery 
kdf_pbkdf2_cleanup(KDF_PBKDF2 * ctx)83*b077aed3SPierre Pronchery static void kdf_pbkdf2_cleanup(KDF_PBKDF2 *ctx)
84*b077aed3SPierre Pronchery {
85*b077aed3SPierre Pronchery     ossl_prov_digest_reset(&ctx->digest);
86*b077aed3SPierre Pronchery     OPENSSL_free(ctx->salt);
87*b077aed3SPierre Pronchery     OPENSSL_clear_free(ctx->pass, ctx->pass_len);
88*b077aed3SPierre Pronchery     memset(ctx, 0, sizeof(*ctx));
89*b077aed3SPierre Pronchery }
90*b077aed3SPierre Pronchery 
kdf_pbkdf2_free(void * vctx)91*b077aed3SPierre Pronchery static void kdf_pbkdf2_free(void *vctx)
92*b077aed3SPierre Pronchery {
93*b077aed3SPierre Pronchery     KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
94*b077aed3SPierre Pronchery 
95*b077aed3SPierre Pronchery     if (ctx != NULL) {
96*b077aed3SPierre Pronchery         kdf_pbkdf2_cleanup(ctx);
97*b077aed3SPierre Pronchery         OPENSSL_free(ctx);
98*b077aed3SPierre Pronchery     }
99*b077aed3SPierre Pronchery }
100*b077aed3SPierre Pronchery 
kdf_pbkdf2_reset(void * vctx)101*b077aed3SPierre Pronchery static void kdf_pbkdf2_reset(void *vctx)
102*b077aed3SPierre Pronchery {
103*b077aed3SPierre Pronchery     KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
104*b077aed3SPierre Pronchery     void *provctx = ctx->provctx;
105*b077aed3SPierre Pronchery 
106*b077aed3SPierre Pronchery     kdf_pbkdf2_cleanup(ctx);
107*b077aed3SPierre Pronchery     ctx->provctx = provctx;
108*b077aed3SPierre Pronchery     kdf_pbkdf2_init(ctx);
109*b077aed3SPierre Pronchery }
110*b077aed3SPierre Pronchery 
kdf_pbkdf2_init(KDF_PBKDF2 * ctx)111*b077aed3SPierre Pronchery static void kdf_pbkdf2_init(KDF_PBKDF2 *ctx)
112*b077aed3SPierre Pronchery {
113*b077aed3SPierre Pronchery     OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END };
114*b077aed3SPierre Pronchery     OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
115*b077aed3SPierre Pronchery 
116*b077aed3SPierre Pronchery     params[0] = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_DIGEST,
117*b077aed3SPierre Pronchery                                                  SN_sha1, 0);
118*b077aed3SPierre Pronchery     if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx))
119*b077aed3SPierre Pronchery         /* This is an error, but there is no way to indicate such directly */
120*b077aed3SPierre Pronchery         ossl_prov_digest_reset(&ctx->digest);
121*b077aed3SPierre Pronchery     ctx->iter = PKCS5_DEFAULT_ITER;
122*b077aed3SPierre Pronchery     ctx->lower_bound_checks = ossl_kdf_pbkdf2_default_checks;
123*b077aed3SPierre Pronchery }
124*b077aed3SPierre Pronchery 
pbkdf2_set_membuf(unsigned char ** buffer,size_t * buflen,const OSSL_PARAM * p)125*b077aed3SPierre Pronchery static int pbkdf2_set_membuf(unsigned char **buffer, size_t *buflen,
126*b077aed3SPierre Pronchery                              const OSSL_PARAM *p)
127*b077aed3SPierre Pronchery {
128*b077aed3SPierre Pronchery     OPENSSL_clear_free(*buffer, *buflen);
129*b077aed3SPierre Pronchery     *buffer = NULL;
130*b077aed3SPierre Pronchery     *buflen = 0;
131*b077aed3SPierre Pronchery 
132*b077aed3SPierre Pronchery     if (p->data_size == 0) {
133*b077aed3SPierre Pronchery         if ((*buffer = OPENSSL_malloc(1)) == NULL) {
134*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, ERR_R_MALLOC_FAILURE);
135*b077aed3SPierre Pronchery             return 0;
136*b077aed3SPierre Pronchery         }
137*b077aed3SPierre Pronchery     } else if (p->data != NULL) {
138*b077aed3SPierre Pronchery         if (!OSSL_PARAM_get_octet_string(p, (void **)buffer, 0, buflen))
139*b077aed3SPierre Pronchery             return 0;
140*b077aed3SPierre Pronchery     }
141*b077aed3SPierre Pronchery     return 1;
142*b077aed3SPierre Pronchery }
143*b077aed3SPierre Pronchery 
kdf_pbkdf2_derive(void * vctx,unsigned char * key,size_t keylen,const OSSL_PARAM params[])144*b077aed3SPierre Pronchery static int kdf_pbkdf2_derive(void *vctx, unsigned char *key, size_t keylen,
145*b077aed3SPierre Pronchery                              const OSSL_PARAM params[])
146*b077aed3SPierre Pronchery {
147*b077aed3SPierre Pronchery     KDF_PBKDF2 *ctx = (KDF_PBKDF2 *)vctx;
148*b077aed3SPierre Pronchery     const EVP_MD *md;
149*b077aed3SPierre Pronchery 
150*b077aed3SPierre Pronchery     if (!ossl_prov_is_running() || !kdf_pbkdf2_set_ctx_params(ctx, params))
151*b077aed3SPierre Pronchery         return 0;
152*b077aed3SPierre Pronchery 
153*b077aed3SPierre Pronchery     if (ctx->pass == NULL) {
154*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_PASS);
155*b077aed3SPierre Pronchery         return 0;
156*b077aed3SPierre Pronchery     }
157*b077aed3SPierre Pronchery 
158*b077aed3SPierre Pronchery     if (ctx->salt == NULL) {
159*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_MISSING_SALT);
160*b077aed3SPierre Pronchery         return 0;
161*b077aed3SPierre Pronchery     }
162*b077aed3SPierre Pronchery 
163*b077aed3SPierre Pronchery     md = ossl_prov_digest_md(&ctx->digest);
164*b077aed3SPierre Pronchery     return pbkdf2_derive((char *)ctx->pass, ctx->pass_len,
165*b077aed3SPierre Pronchery                          ctx->salt, ctx->salt_len, ctx->iter,
166*b077aed3SPierre Pronchery                          md, key, keylen, ctx->lower_bound_checks);
167*b077aed3SPierre Pronchery }
168*b077aed3SPierre Pronchery 
kdf_pbkdf2_set_ctx_params(void * vctx,const OSSL_PARAM params[])169*b077aed3SPierre Pronchery static int kdf_pbkdf2_set_ctx_params(void *vctx, const OSSL_PARAM params[])
170*b077aed3SPierre Pronchery {
171*b077aed3SPierre Pronchery     const OSSL_PARAM *p;
172*b077aed3SPierre Pronchery     KDF_PBKDF2 *ctx = vctx;
173*b077aed3SPierre Pronchery     OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
174*b077aed3SPierre Pronchery     int pkcs5;
175*b077aed3SPierre Pronchery     uint64_t iter, min_iter;
176*b077aed3SPierre Pronchery 
177*b077aed3SPierre Pronchery     if (params == NULL)
178*b077aed3SPierre Pronchery         return 1;
179*b077aed3SPierre Pronchery 
180*b077aed3SPierre Pronchery     if (!ossl_prov_digest_load_from_params(&ctx->digest, params, provctx))
181*b077aed3SPierre Pronchery         return 0;
182*b077aed3SPierre Pronchery 
183*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PKCS5)) != NULL) {
184*b077aed3SPierre Pronchery         if (!OSSL_PARAM_get_int(p, &pkcs5))
185*b077aed3SPierre Pronchery             return 0;
186*b077aed3SPierre Pronchery         ctx->lower_bound_checks = pkcs5 == 0;
187*b077aed3SPierre Pronchery     }
188*b077aed3SPierre Pronchery 
189*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_PASSWORD)) != NULL)
190*b077aed3SPierre Pronchery         if (!pbkdf2_set_membuf(&ctx->pass, &ctx->pass_len, p))
191*b077aed3SPierre Pronchery             return 0;
192*b077aed3SPierre Pronchery 
193*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_SALT)) != NULL) {
194*b077aed3SPierre Pronchery         if (ctx->lower_bound_checks != 0
195*b077aed3SPierre Pronchery             && p->data_size < KDF_PBKDF2_MIN_SALT_LEN) {
196*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
197*b077aed3SPierre Pronchery             return 0;
198*b077aed3SPierre Pronchery         }
199*b077aed3SPierre Pronchery         if (!pbkdf2_set_membuf(&ctx->salt, &ctx->salt_len,p))
200*b077aed3SPierre Pronchery             return 0;
201*b077aed3SPierre Pronchery     }
202*b077aed3SPierre Pronchery 
203*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate_const(params, OSSL_KDF_PARAM_ITER)) != NULL) {
204*b077aed3SPierre Pronchery         if (!OSSL_PARAM_get_uint64(p, &iter))
205*b077aed3SPierre Pronchery             return 0;
206*b077aed3SPierre Pronchery         min_iter = ctx->lower_bound_checks != 0 ? KDF_PBKDF2_MIN_ITERATIONS : 1;
207*b077aed3SPierre Pronchery         if (iter < min_iter) {
208*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT);
209*b077aed3SPierre Pronchery             return 0;
210*b077aed3SPierre Pronchery         }
211*b077aed3SPierre Pronchery         ctx->iter = iter;
212*b077aed3SPierre Pronchery     }
213*b077aed3SPierre Pronchery     return 1;
214*b077aed3SPierre Pronchery }
215*b077aed3SPierre Pronchery 
kdf_pbkdf2_settable_ctx_params(ossl_unused void * ctx,ossl_unused void * p_ctx)216*b077aed3SPierre Pronchery static const OSSL_PARAM *kdf_pbkdf2_settable_ctx_params(ossl_unused void *ctx,
217*b077aed3SPierre Pronchery                                                         ossl_unused void *p_ctx)
218*b077aed3SPierre Pronchery {
219*b077aed3SPierre Pronchery     static const OSSL_PARAM known_settable_ctx_params[] = {
220*b077aed3SPierre Pronchery         OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
221*b077aed3SPierre Pronchery         OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
222*b077aed3SPierre Pronchery         OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0),
223*b077aed3SPierre Pronchery         OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
224*b077aed3SPierre Pronchery         OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL),
225*b077aed3SPierre Pronchery         OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS5, NULL),
226*b077aed3SPierre Pronchery         OSSL_PARAM_END
227*b077aed3SPierre Pronchery     };
228*b077aed3SPierre Pronchery     return known_settable_ctx_params;
229*b077aed3SPierre Pronchery }
230*b077aed3SPierre Pronchery 
kdf_pbkdf2_get_ctx_params(void * vctx,OSSL_PARAM params[])231*b077aed3SPierre Pronchery static int kdf_pbkdf2_get_ctx_params(void *vctx, OSSL_PARAM params[])
232*b077aed3SPierre Pronchery {
233*b077aed3SPierre Pronchery     OSSL_PARAM *p;
234*b077aed3SPierre Pronchery 
235*b077aed3SPierre Pronchery     if ((p = OSSL_PARAM_locate(params, OSSL_KDF_PARAM_SIZE)) != NULL)
236*b077aed3SPierre Pronchery         return OSSL_PARAM_set_size_t(p, SIZE_MAX);
237*b077aed3SPierre Pronchery     return -2;
238*b077aed3SPierre Pronchery }
239*b077aed3SPierre Pronchery 
kdf_pbkdf2_gettable_ctx_params(ossl_unused void * ctx,ossl_unused void * p_ctx)240*b077aed3SPierre Pronchery static const OSSL_PARAM *kdf_pbkdf2_gettable_ctx_params(ossl_unused void *ctx,
241*b077aed3SPierre Pronchery                                                         ossl_unused void *p_ctx)
242*b077aed3SPierre Pronchery {
243*b077aed3SPierre Pronchery     static const OSSL_PARAM known_gettable_ctx_params[] = {
244*b077aed3SPierre Pronchery         OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
245*b077aed3SPierre Pronchery         OSSL_PARAM_END
246*b077aed3SPierre Pronchery     };
247*b077aed3SPierre Pronchery     return known_gettable_ctx_params;
248*b077aed3SPierre Pronchery }
249*b077aed3SPierre Pronchery 
250*b077aed3SPierre Pronchery const OSSL_DISPATCH ossl_kdf_pbkdf2_functions[] = {
251*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_NEWCTX, (void(*)(void))kdf_pbkdf2_new },
252*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_FREECTX, (void(*)(void))kdf_pbkdf2_free },
253*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_RESET, (void(*)(void))kdf_pbkdf2_reset },
254*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_DERIVE, (void(*)(void))kdf_pbkdf2_derive },
255*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS,
256*b077aed3SPierre Pronchery       (void(*)(void))kdf_pbkdf2_settable_ctx_params },
257*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_SET_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_set_ctx_params },
258*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS,
259*b077aed3SPierre Pronchery       (void(*)(void))kdf_pbkdf2_gettable_ctx_params },
260*b077aed3SPierre Pronchery     { OSSL_FUNC_KDF_GET_CTX_PARAMS, (void(*)(void))kdf_pbkdf2_get_ctx_params },
261*b077aed3SPierre Pronchery     { 0, NULL }
262*b077aed3SPierre Pronchery };
263*b077aed3SPierre Pronchery 
264*b077aed3SPierre Pronchery /*
265*b077aed3SPierre Pronchery  * This is an implementation of PKCS#5 v2.0 password based encryption key
266*b077aed3SPierre Pronchery  * derivation function PBKDF2. SHA1 version verified against test vectors
267*b077aed3SPierre Pronchery  * posted by Peter Gutmann to the PKCS-TNG mailing list.
268*b077aed3SPierre Pronchery  *
269*b077aed3SPierre Pronchery  * The constraints specified by SP800-132 have been added i.e.
270*b077aed3SPierre Pronchery  *  - Check the range of the key length.
271*b077aed3SPierre Pronchery  *  - Minimum iteration count of 1000.
272*b077aed3SPierre Pronchery  *  - Randomly-generated portion of the salt shall be at least 128 bits.
273*b077aed3SPierre Pronchery  */
pbkdf2_derive(const char * pass,size_t passlen,const unsigned char * salt,int saltlen,uint64_t iter,const EVP_MD * digest,unsigned char * key,size_t keylen,int lower_bound_checks)274*b077aed3SPierre Pronchery static int pbkdf2_derive(const char *pass, size_t passlen,
275*b077aed3SPierre Pronchery                          const unsigned char *salt, int saltlen, uint64_t iter,
276*b077aed3SPierre Pronchery                          const EVP_MD *digest, unsigned char *key,
277*b077aed3SPierre Pronchery                          size_t keylen, int lower_bound_checks)
278*b077aed3SPierre Pronchery {
279*b077aed3SPierre Pronchery     int ret = 0;
280*b077aed3SPierre Pronchery     unsigned char digtmp[EVP_MAX_MD_SIZE], *p, itmp[4];
281*b077aed3SPierre Pronchery     int cplen, k, tkeylen, mdlen;
282*b077aed3SPierre Pronchery     uint64_t j;
283*b077aed3SPierre Pronchery     unsigned long i = 1;
284*b077aed3SPierre Pronchery     HMAC_CTX *hctx_tpl = NULL, *hctx = NULL;
285*b077aed3SPierre Pronchery 
286*b077aed3SPierre Pronchery     mdlen = EVP_MD_get_size(digest);
287*b077aed3SPierre Pronchery     if (mdlen <= 0)
288*b077aed3SPierre Pronchery         return 0;
289*b077aed3SPierre Pronchery 
290*b077aed3SPierre Pronchery     /*
291*b077aed3SPierre Pronchery      * This check should always be done because keylen / mdlen >= (2^32 - 1)
292*b077aed3SPierre Pronchery      * results in an overflow of the loop counter 'i'.
293*b077aed3SPierre Pronchery      */
294*b077aed3SPierre Pronchery     if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) {
295*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH);
296*b077aed3SPierre Pronchery         return 0;
297*b077aed3SPierre Pronchery     }
298*b077aed3SPierre Pronchery 
299*b077aed3SPierre Pronchery     if (lower_bound_checks) {
300*b077aed3SPierre Pronchery         if ((keylen * 8) < KDF_PBKDF2_MIN_KEY_LEN_BITS) {
301*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, PROV_R_KEY_SIZE_TOO_SMALL);
302*b077aed3SPierre Pronchery             return 0;
303*b077aed3SPierre Pronchery         }
304*b077aed3SPierre Pronchery         if (saltlen < KDF_PBKDF2_MIN_SALT_LEN) {
305*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH);
306*b077aed3SPierre Pronchery             return 0;
307*b077aed3SPierre Pronchery         }
308*b077aed3SPierre Pronchery         if (iter < KDF_PBKDF2_MIN_ITERATIONS) {
309*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_ITERATION_COUNT);
310*b077aed3SPierre Pronchery             return 0;
311*b077aed3SPierre Pronchery         }
312*b077aed3SPierre Pronchery     }
313*b077aed3SPierre Pronchery 
314*b077aed3SPierre Pronchery     hctx_tpl = HMAC_CTX_new();
315*b077aed3SPierre Pronchery     if (hctx_tpl == NULL)
316*b077aed3SPierre Pronchery         return 0;
317*b077aed3SPierre Pronchery     p = key;
318*b077aed3SPierre Pronchery     tkeylen = keylen;
319*b077aed3SPierre Pronchery     if (!HMAC_Init_ex(hctx_tpl, pass, passlen, digest, NULL))
320*b077aed3SPierre Pronchery         goto err;
321*b077aed3SPierre Pronchery     hctx = HMAC_CTX_new();
322*b077aed3SPierre Pronchery     if (hctx == NULL)
323*b077aed3SPierre Pronchery         goto err;
324*b077aed3SPierre Pronchery     while (tkeylen) {
325*b077aed3SPierre Pronchery         if (tkeylen > mdlen)
326*b077aed3SPierre Pronchery             cplen = mdlen;
327*b077aed3SPierre Pronchery         else
328*b077aed3SPierre Pronchery             cplen = tkeylen;
329*b077aed3SPierre Pronchery         /*
330*b077aed3SPierre Pronchery          * We are unlikely to ever use more than 256 blocks (5120 bits!) but
331*b077aed3SPierre Pronchery          * just in case...
332*b077aed3SPierre Pronchery          */
333*b077aed3SPierre Pronchery         itmp[0] = (unsigned char)((i >> 24) & 0xff);
334*b077aed3SPierre Pronchery         itmp[1] = (unsigned char)((i >> 16) & 0xff);
335*b077aed3SPierre Pronchery         itmp[2] = (unsigned char)((i >> 8) & 0xff);
336*b077aed3SPierre Pronchery         itmp[3] = (unsigned char)(i & 0xff);
337*b077aed3SPierre Pronchery         if (!HMAC_CTX_copy(hctx, hctx_tpl))
338*b077aed3SPierre Pronchery             goto err;
339*b077aed3SPierre Pronchery         if (!HMAC_Update(hctx, salt, saltlen)
340*b077aed3SPierre Pronchery                 || !HMAC_Update(hctx, itmp, 4)
341*b077aed3SPierre Pronchery                 || !HMAC_Final(hctx, digtmp, NULL))
342*b077aed3SPierre Pronchery             goto err;
343*b077aed3SPierre Pronchery         memcpy(p, digtmp, cplen);
344*b077aed3SPierre Pronchery         for (j = 1; j < iter; j++) {
345*b077aed3SPierre Pronchery             if (!HMAC_CTX_copy(hctx, hctx_tpl))
346*b077aed3SPierre Pronchery                 goto err;
347*b077aed3SPierre Pronchery             if (!HMAC_Update(hctx, digtmp, mdlen)
348*b077aed3SPierre Pronchery                     || !HMAC_Final(hctx, digtmp, NULL))
349*b077aed3SPierre Pronchery                 goto err;
350*b077aed3SPierre Pronchery             for (k = 0; k < cplen; k++)
351*b077aed3SPierre Pronchery                 p[k] ^= digtmp[k];
352*b077aed3SPierre Pronchery         }
353*b077aed3SPierre Pronchery         tkeylen -= cplen;
354*b077aed3SPierre Pronchery         i++;
355*b077aed3SPierre Pronchery         p += cplen;
356*b077aed3SPierre Pronchery     }
357*b077aed3SPierre Pronchery     ret = 1;
358*b077aed3SPierre Pronchery 
359*b077aed3SPierre Pronchery err:
360*b077aed3SPierre Pronchery     HMAC_CTX_free(hctx);
361*b077aed3SPierre Pronchery     HMAC_CTX_free(hctx_tpl);
362*b077aed3SPierre Pronchery     return ret;
363*b077aed3SPierre Pronchery }
364