diff options
Diffstat (limited to 'src/lib/libcrypto/cms/cms_enc.c')
| -rw-r--r-- | src/lib/libcrypto/cms/cms_enc.c | 181 |
1 files changed, 77 insertions, 104 deletions
diff --git a/src/lib/libcrypto/cms/cms_enc.c b/src/lib/libcrypto/cms/cms_enc.c index 612fce6dde..75e08cdb1d 100644 --- a/src/lib/libcrypto/cms/cms_enc.c +++ b/src/lib/libcrypto/cms/cms_enc.c | |||
| @@ -10,7 +10,7 @@ | |||
| 10 | * are met: | 10 | * are met: |
| 11 | * | 11 | * |
| 12 | * 1. Redistributions of source code must retain the above copyright | 12 | * 1. Redistributions of source code must retain the above copyright |
| 13 | * notice, this list of conditions and the following disclaimer. | 13 | * notice, this list of conditions and the following disclaimer. |
| 14 | * | 14 | * |
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | 15 | * 2. Redistributions in binary form must reproduce the above copyright |
| 16 | * notice, this list of conditions and the following disclaimer in | 16 | * notice, this list of conditions and the following disclaimer in |
| @@ -66,8 +66,9 @@ DECLARE_ASN1_ITEM(CMS_EncryptedData) | |||
| 66 | 66 | ||
| 67 | /* Return BIO based on EncryptedContentInfo and key */ | 67 | /* Return BIO based on EncryptedContentInfo and key */ |
| 68 | 68 | ||
| 69 | BIO *cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) | 69 | BIO * |
| 70 | { | 70 | cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) |
| 71 | { | ||
| 71 | BIO *b; | 72 | BIO *b; |
| 72 | EVP_CIPHER_CTX *ctx; | 73 | EVP_CIPHER_CTX *ctx; |
| 73 | const EVP_CIPHER *ciph; | 74 | const EVP_CIPHER *ciph; |
| @@ -75,87 +76,72 @@ BIO *cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) | |||
| 75 | unsigned char iv[EVP_MAX_IV_LENGTH], *piv = NULL; | 76 | unsigned char iv[EVP_MAX_IV_LENGTH], *piv = NULL; |
| 76 | unsigned char *tkey = NULL; | 77 | unsigned char *tkey = NULL; |
| 77 | size_t tkeylen = 0; | 78 | size_t tkeylen = 0; |
| 78 | |||
| 79 | int ok = 0; | 79 | int ok = 0; |
| 80 | |||
| 81 | int enc, keep_key = 0; | 80 | int enc, keep_key = 0; |
| 82 | 81 | ||
| 83 | enc = ec->cipher ? 1 : 0; | 82 | enc = ec->cipher ? 1 : 0; |
| 84 | 83 | ||
| 85 | b = BIO_new(BIO_f_cipher()); | 84 | b = BIO_new(BIO_f_cipher()); |
| 86 | if (!b) | 85 | if (!b) { |
| 87 | { | ||
| 88 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 86 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 89 | ERR_R_MALLOC_FAILURE); | 87 | ERR_R_MALLOC_FAILURE); |
| 90 | return NULL; | 88 | return NULL; |
| 91 | } | 89 | } |
| 92 | 90 | ||
| 93 | BIO_get_cipher_ctx(b, &ctx); | 91 | BIO_get_cipher_ctx(b, &ctx); |
| 94 | 92 | ||
| 95 | if (enc) | 93 | if (enc) { |
| 96 | { | ||
| 97 | ciph = ec->cipher; | 94 | ciph = ec->cipher; |
| 98 | /* If not keeping key set cipher to NULL so subsequent calls | 95 | /* If not keeping key set cipher to NULL so subsequent calls |
| 99 | * decrypt. | 96 | * decrypt. |
| 100 | */ | 97 | */ |
| 101 | if (ec->key) | 98 | if (ec->key) |
| 102 | ec->cipher = NULL; | 99 | ec->cipher = NULL; |
| 103 | } | 100 | } else { |
| 104 | else | ||
| 105 | { | ||
| 106 | ciph = EVP_get_cipherbyobj(calg->algorithm); | 101 | ciph = EVP_get_cipherbyobj(calg->algorithm); |
| 107 | 102 | ||
| 108 | if (!ciph) | 103 | if (!ciph) { |
| 109 | { | ||
| 110 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 104 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 111 | CMS_R_UNKNOWN_CIPHER); | 105 | CMS_R_UNKNOWN_CIPHER); |
| 112 | goto err; | 106 | goto err; |
| 113 | } | ||
| 114 | } | 107 | } |
| 108 | } | ||
| 115 | 109 | ||
| 116 | if (EVP_CipherInit_ex(ctx, ciph, NULL, NULL, NULL, enc) <= 0) | 110 | if (EVP_CipherInit_ex(ctx, ciph, NULL, NULL, NULL, enc) <= 0) { |
| 117 | { | ||
| 118 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 111 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 119 | CMS_R_CIPHER_INITIALISATION_ERROR); | 112 | CMS_R_CIPHER_INITIALISATION_ERROR); |
| 120 | goto err; | 113 | goto err; |
| 121 | } | 114 | } |
| 122 | 115 | ||
| 123 | if (enc) | 116 | if (enc) { |
| 124 | { | ||
| 125 | int ivlen; | 117 | int ivlen; |
| 126 | calg->algorithm = OBJ_nid2obj(EVP_CIPHER_CTX_type(ctx)); | 118 | calg->algorithm = OBJ_nid2obj(EVP_CIPHER_CTX_type(ctx)); |
| 127 | /* Generate a random IV if we need one */ | 119 | /* Generate a random IV if we need one */ |
| 128 | ivlen = EVP_CIPHER_CTX_iv_length(ctx); | 120 | ivlen = EVP_CIPHER_CTX_iv_length(ctx); |
| 129 | if (ivlen > 0) | 121 | if (ivlen > 0) { |
| 130 | { | ||
| 131 | if (RAND_pseudo_bytes(iv, ivlen) <= 0) | 122 | if (RAND_pseudo_bytes(iv, ivlen) <= 0) |
| 132 | goto err; | 123 | goto err; |
| 133 | piv = iv; | 124 | piv = iv; |
| 134 | } | ||
| 135 | } | 125 | } |
| 136 | else if (EVP_CIPHER_asn1_to_param(ctx, calg->parameter) <= 0) | 126 | } else if (EVP_CIPHER_asn1_to_param(ctx, calg->parameter) <= 0) { |
| 137 | { | ||
| 138 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 127 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 139 | CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); | 128 | CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); |
| 140 | goto err; | 129 | goto err; |
| 141 | } | 130 | } |
| 142 | tkeylen = EVP_CIPHER_CTX_key_length(ctx); | 131 | tkeylen = EVP_CIPHER_CTX_key_length(ctx); |
| 143 | /* Generate random session key */ | 132 | /* Generate random session key */ |
| 144 | if (!enc || !ec->key) | 133 | if (!enc || !ec->key) { |
| 145 | { | ||
| 146 | tkey = malloc(tkeylen); | 134 | tkey = malloc(tkeylen); |
| 147 | if (!tkey) | 135 | if (!tkey) { |
| 148 | { | ||
| 149 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 136 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 150 | ERR_R_MALLOC_FAILURE); | 137 | ERR_R_MALLOC_FAILURE); |
| 151 | goto err; | 138 | goto err; |
| 152 | } | 139 | } |
| 153 | if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0) | 140 | if (EVP_CIPHER_CTX_rand_key(ctx, tkey) <= 0) |
| 154 | goto err; | 141 | goto err; |
| 155 | } | 142 | } |
| 156 | 143 | ||
| 157 | if (!ec->key) | 144 | if (!ec->key) { |
| 158 | { | ||
| 159 | ec->key = tkey; | 145 | ec->key = tkey; |
| 160 | ec->keylen = tkeylen; | 146 | ec->keylen = tkeylen; |
| 161 | tkey = NULL; | 147 | tkey = NULL; |
| @@ -163,25 +149,20 @@ BIO *cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) | |||
| 163 | keep_key = 1; | 149 | keep_key = 1; |
| 164 | else | 150 | else |
| 165 | ERR_clear_error(); | 151 | ERR_clear_error(); |
| 166 | |||
| 167 | } | ||
| 168 | 152 | ||
| 169 | if (ec->keylen != tkeylen) | 153 | } |
| 170 | { | 154 | |
| 155 | if (ec->keylen != tkeylen) { | ||
| 171 | /* If necessary set key length */ | 156 | /* If necessary set key length */ |
| 172 | if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) | 157 | if (EVP_CIPHER_CTX_set_key_length(ctx, ec->keylen) <= 0) { |
| 173 | { | ||
| 174 | /* Only reveal failure if debugging so we don't | 158 | /* Only reveal failure if debugging so we don't |
| 175 | * leak information which may be useful in MMA. | 159 | * leak information which may be useful in MMA. |
| 176 | */ | 160 | */ |
| 177 | if (enc || ec->debug) | 161 | if (enc || ec->debug) { |
| 178 | { | ||
| 179 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 162 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 180 | CMS_R_INVALID_KEY_LENGTH); | 163 | CMS_R_INVALID_KEY_LENGTH); |
| 181 | goto err; | 164 | goto err; |
| 182 | } | 165 | } else { |
| 183 | else | ||
| 184 | { | ||
| 185 | /* Use random key */ | 166 | /* Use random key */ |
| 186 | OPENSSL_cleanse(ec->key, ec->keylen); | 167 | OPENSSL_cleanse(ec->key, ec->keylen); |
| 187 | free(ec->key); | 168 | free(ec->key); |
| @@ -189,106 +170,98 @@ BIO *cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) | |||
| 189 | ec->keylen = tkeylen; | 170 | ec->keylen = tkeylen; |
| 190 | tkey = NULL; | 171 | tkey = NULL; |
| 191 | ERR_clear_error(); | 172 | ERR_clear_error(); |
| 192 | } | ||
| 193 | } | 173 | } |
| 194 | } | 174 | } |
| 175 | } | ||
| 195 | 176 | ||
| 196 | if (EVP_CipherInit_ex(ctx, NULL, NULL, ec->key, piv, enc) <= 0) | 177 | if (EVP_CipherInit_ex(ctx, NULL, NULL, ec->key, piv, enc) <= 0) { |
| 197 | { | ||
| 198 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 178 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 199 | CMS_R_CIPHER_INITIALISATION_ERROR); | 179 | CMS_R_CIPHER_INITIALISATION_ERROR); |
| 200 | goto err; | 180 | goto err; |
| 201 | } | 181 | } |
| 202 | 182 | ||
| 203 | if (piv) | 183 | if (piv) { |
| 204 | { | ||
| 205 | calg->parameter = ASN1_TYPE_new(); | 184 | calg->parameter = ASN1_TYPE_new(); |
| 206 | if (!calg->parameter) | 185 | if (!calg->parameter) { |
| 207 | { | ||
| 208 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 186 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 209 | ERR_R_MALLOC_FAILURE); | 187 | ERR_R_MALLOC_FAILURE); |
| 210 | goto err; | 188 | goto err; |
| 211 | } | 189 | } |
| 212 | if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) | 190 | if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) { |
| 213 | { | ||
| 214 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, | 191 | CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, |
| 215 | CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); | 192 | CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); |
| 216 | goto err; | 193 | goto err; |
| 217 | } | ||
| 218 | } | 194 | } |
| 195 | } | ||
| 219 | ok = 1; | 196 | ok = 1; |
| 220 | 197 | ||
| 221 | err: | 198 | err: |
| 222 | if (ec->key && !keep_key) | 199 | if (ec->key && !keep_key) { |
| 223 | { | ||
| 224 | OPENSSL_cleanse(ec->key, ec->keylen); | 200 | OPENSSL_cleanse(ec->key, ec->keylen); |
| 225 | free(ec->key); | 201 | free(ec->key); |
| 226 | ec->key = NULL; | 202 | ec->key = NULL; |
| 227 | } | 203 | } |
| 228 | if (tkey) | 204 | if (tkey) { |
| 229 | { | ||
| 230 | OPENSSL_cleanse(tkey, tkeylen); | 205 | OPENSSL_cleanse(tkey, tkeylen); |
| 231 | free(tkey); | 206 | free(tkey); |
| 232 | } | 207 | } |
| 233 | if (ok) | 208 | if (ok) |
| 234 | return b; | 209 | return b; |
| 235 | BIO_free(b); | 210 | BIO_free(b); |
| 236 | return NULL; | 211 | return NULL; |
| 237 | } | 212 | } |
| 238 | 213 | ||
| 239 | int cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, | 214 | int |
| 240 | const EVP_CIPHER *cipher, | 215 | cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, |
| 241 | const unsigned char *key, size_t keylen) | 216 | const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) |
| 242 | { | 217 | { |
| 243 | ec->cipher = cipher; | 218 | ec->cipher = cipher; |
| 244 | if (key) | 219 | if (key) { |
| 245 | { | ||
| 246 | ec->key = malloc(keylen); | 220 | ec->key = malloc(keylen); |
| 247 | if (!ec->key) | 221 | if (!ec->key) |
| 248 | return 0; | 222 | return 0; |
| 249 | memcpy(ec->key, key, keylen); | 223 | memcpy(ec->key, key, keylen); |
| 250 | } | 224 | } |
| 251 | ec->keylen = keylen; | 225 | ec->keylen = keylen; |
| 252 | if (cipher) | 226 | if (cipher) |
| 253 | ec->contentType = OBJ_nid2obj(NID_pkcs7_data); | 227 | ec->contentType = OBJ_nid2obj(NID_pkcs7_data); |
| 254 | return 1; | 228 | return 1; |
| 255 | } | 229 | } |
| 256 | 230 | ||
| 257 | int CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, | 231 | int |
| 258 | const unsigned char *key, size_t keylen) | 232 | CMS_EncryptedData_set1_key(CMS_ContentInfo *cms, const EVP_CIPHER *ciph, |
| 259 | { | 233 | const unsigned char *key, size_t keylen) |
| 234 | { | ||
| 260 | CMS_EncryptedContentInfo *ec; | 235 | CMS_EncryptedContentInfo *ec; |
| 261 | if (!key || !keylen) | 236 | |
| 262 | { | 237 | if (!key || !keylen) { |
| 263 | CMSerr(CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY, CMS_R_NO_KEY); | 238 | CMSerr(CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY, CMS_R_NO_KEY); |
| 264 | return 0; | 239 | return 0; |
| 265 | } | 240 | } |
| 266 | if (ciph) | 241 | if (ciph) { |
| 267 | { | ||
| 268 | cms->d.encryptedData = M_ASN1_new_of(CMS_EncryptedData); | 242 | cms->d.encryptedData = M_ASN1_new_of(CMS_EncryptedData); |
| 269 | if (!cms->d.encryptedData) | 243 | if (!cms->d.encryptedData) { |
| 270 | { | ||
| 271 | CMSerr(CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY, | 244 | CMSerr(CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY, |
| 272 | ERR_R_MALLOC_FAILURE); | 245 | ERR_R_MALLOC_FAILURE); |
| 273 | return 0; | 246 | return 0; |
| 274 | } | 247 | } |
| 275 | cms->contentType = OBJ_nid2obj(NID_pkcs7_encrypted); | 248 | cms->contentType = OBJ_nid2obj(NID_pkcs7_encrypted); |
| 276 | cms->d.encryptedData->version = 0; | 249 | cms->d.encryptedData->version = 0; |
| 277 | } | 250 | } else if (OBJ_obj2nid(cms->contentType) != NID_pkcs7_encrypted) { |
| 278 | else if (OBJ_obj2nid(cms->contentType) != NID_pkcs7_encrypted) | ||
| 279 | { | ||
| 280 | CMSerr(CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY, | 251 | CMSerr(CMS_F_CMS_ENCRYPTEDDATA_SET1_KEY, |
| 281 | CMS_R_NOT_ENCRYPTED_DATA); | 252 | CMS_R_NOT_ENCRYPTED_DATA); |
| 282 | return 0; | 253 | return 0; |
| 283 | } | 254 | } |
| 284 | ec = cms->d.encryptedData->encryptedContentInfo; | 255 | ec = cms->d.encryptedData->encryptedContentInfo; |
| 285 | return cms_EncryptedContent_init(ec, ciph, key, keylen); | 256 | return cms_EncryptedContent_init(ec, ciph, key, keylen); |
| 286 | } | 257 | } |
| 287 | 258 | ||
| 288 | BIO *cms_EncryptedData_init_bio(CMS_ContentInfo *cms) | 259 | BIO * |
| 289 | { | 260 | cms_EncryptedData_init_bio(CMS_ContentInfo *cms) |
| 261 | { | ||
| 290 | CMS_EncryptedData *enc = cms->d.encryptedData; | 262 | CMS_EncryptedData *enc = cms->d.encryptedData; |
| 263 | |||
| 291 | if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs) | 264 | if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs) |
| 292 | enc->version = 2; | 265 | enc->version = 2; |
| 293 | return cms_EncryptedContent_init_bio(enc->encryptedContentInfo); | 266 | return cms_EncryptedContent_init_bio(enc->encryptedContentInfo); |
| 294 | } | 267 | } |
