|
Packit Service |
084de1 |
/*
|
|
Packit Service |
084de1 |
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
Packit Service |
084de1 |
* Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
|
|
Packit Service |
084de1 |
*
|
|
Packit Service |
084de1 |
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
Packit Service |
084de1 |
* this file except in compliance with the License. You can obtain a copy
|
|
Packit Service |
084de1 |
* in the file LICENSE in the source distribution or at
|
|
Packit Service |
084de1 |
* https://www.openssl.org/source/license.html
|
|
Packit Service |
084de1 |
*/
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
/*
|
|
Packit Service |
084de1 |
* Refer to https://csrc.nist.gov/publications/detail/sp/800-56c/rev-1/final
|
|
Packit Service |
084de1 |
* Section 4.1.
|
|
Packit Service |
084de1 |
*
|
|
Packit Service |
084de1 |
* The Single Step KDF algorithm is given by:
|
|
Packit Service |
084de1 |
*
|
|
Packit Service |
084de1 |
* Result(0) = empty bit string (i.e., the null string).
|
|
Packit Service |
084de1 |
* For i = 1 to reps, do the following:
|
|
Packit Service |
084de1 |
* Increment counter by 1.
|
|
Packit Service |
084de1 |
* Result(i) = Result(i – 1) || H(counter || Z || FixedInfo).
|
|
Packit Service |
084de1 |
* DKM = LeftmostBits(Result(reps), L))
|
|
Packit Service |
084de1 |
*
|
|
Packit Service |
084de1 |
* NOTES:
|
|
Packit Service |
084de1 |
* Z is a shared secret required to produce the derived key material.
|
|
Packit Service |
084de1 |
* counter is a 4 byte buffer.
|
|
Packit Service |
084de1 |
* FixedInfo is a bit string containing context specific data.
|
|
Packit Service |
084de1 |
* DKM is the output derived key material.
|
|
Packit Service |
084de1 |
* L is the required size of the DKM.
|
|
Packit Service |
084de1 |
* reps = [L / H_outputBits]
|
|
Packit Service |
084de1 |
* H(x) is the auxiliary function that can be either a hash, HMAC or KMAC.
|
|
Packit Service |
084de1 |
* This backported version supports only a hash.
|
|
Packit Service |
084de1 |
* H_outputBits is the length of the output of the auxiliary function H(x).
|
|
Packit Service |
084de1 |
*
|
|
Packit Service |
084de1 |
* Currently there is not a comprehensive list of test vectors for this
|
|
Packit Service |
084de1 |
* algorithm, especially for H(x) = HMAC and H(x) = KMAC.
|
|
Packit Service |
084de1 |
* Test vectors for H(x) = Hash are indirectly used by CAVS KAS tests.
|
|
Packit Service |
084de1 |
*/
|
|
Packit Service |
084de1 |
#include <stdlib.h>
|
|
Packit Service |
084de1 |
#include <stdarg.h>
|
|
Packit Service |
084de1 |
#include <string.h>
|
|
Packit Service |
084de1 |
#include <openssl/hmac.h>
|
|
Packit Service |
084de1 |
#include <openssl/evp.h>
|
|
Packit Service |
084de1 |
#include <openssl/kdf.h>
|
|
Packit Service |
084de1 |
#include "internal/cryptlib.h"
|
|
Packit Service |
084de1 |
#include "crypto/evp.h"
|
|
Packit Service |
084de1 |
#include "kdf_local.h"
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
struct evp_kdf_impl_st {
|
|
Packit Service |
084de1 |
const EVP_MD *md; /* H(x) = hash */
|
|
Packit Service |
084de1 |
unsigned char *secret;
|
|
Packit Service |
084de1 |
size_t secret_len;
|
|
Packit Service |
084de1 |
unsigned char *info;
|
|
Packit Service |
084de1 |
size_t info_len;
|
|
Packit Service |
084de1 |
};
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
#define SSKDF_MAX_INLEN (1<<30)
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
/*
|
|
Packit Service |
084de1 |
* Refer to https://csrc.nist.gov/publications/detail/sp/800-56c/rev-1/final
|
|
Packit Service |
084de1 |
* Section 4. One-Step Key Derivation using H(x) = hash(x)
|
|
Packit Service |
084de1 |
*/
|
|
Packit Service |
084de1 |
static int SSKDF_hash_kdm(const EVP_MD *kdf_md,
|
|
Packit Service |
084de1 |
const unsigned char *z, size_t z_len,
|
|
Packit Service |
084de1 |
const unsigned char *info, size_t info_len,
|
|
Packit Service |
084de1 |
unsigned char *derived_key, size_t derived_key_len)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
int ret = 0, hlen;
|
|
Packit Service |
084de1 |
size_t counter, out_len, len = derived_key_len;
|
|
Packit Service |
084de1 |
unsigned char c[4];
|
|
Packit Service |
084de1 |
unsigned char mac[EVP_MAX_MD_SIZE];
|
|
Packit Service |
084de1 |
unsigned char *out = derived_key;
|
|
Packit Service |
084de1 |
EVP_MD_CTX *ctx = NULL, *ctx_init = NULL;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (z_len > SSKDF_MAX_INLEN || info_len > SSKDF_MAX_INLEN
|
|
Packit Service |
084de1 |
|| derived_key_len > SSKDF_MAX_INLEN
|
|
Packit Service |
084de1 |
|| derived_key_len == 0)
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
hlen = EVP_MD_size(kdf_md);
|
|
Packit Service |
084de1 |
if (hlen <= 0)
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
out_len = (size_t)hlen;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
ctx = EVP_MD_CTX_create();
|
|
Packit Service |
084de1 |
ctx_init = EVP_MD_CTX_create();
|
|
Packit Service |
084de1 |
if (ctx == NULL || ctx_init == NULL)
|
|
Packit Service |
084de1 |
goto end;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (!EVP_DigestInit(ctx_init, kdf_md))
|
|
Packit Service |
084de1 |
goto end;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
for (counter = 1;; counter++) {
|
|
Packit Service |
084de1 |
c[0] = (unsigned char)((counter >> 24) & 0xff);
|
|
Packit Service |
084de1 |
c[1] = (unsigned char)((counter >> 16) & 0xff);
|
|
Packit Service |
084de1 |
c[2] = (unsigned char)((counter >> 8) & 0xff);
|
|
Packit Service |
084de1 |
c[3] = (unsigned char)(counter & 0xff);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (!(EVP_MD_CTX_copy_ex(ctx, ctx_init)
|
|
Packit Service |
084de1 |
&& EVP_DigestUpdate(ctx, c, sizeof(c))
|
|
Packit Service |
084de1 |
&& EVP_DigestUpdate(ctx, z, z_len)
|
|
Packit Service |
084de1 |
&& EVP_DigestUpdate(ctx, info, info_len)))
|
|
Packit Service |
084de1 |
goto end;
|
|
Packit Service |
084de1 |
if (len >= out_len) {
|
|
Packit Service |
084de1 |
if (!EVP_DigestFinal_ex(ctx, out, NULL))
|
|
Packit Service |
084de1 |
goto end;
|
|
Packit Service |
084de1 |
out += out_len;
|
|
Packit Service |
084de1 |
len -= out_len;
|
|
Packit Service |
084de1 |
if (len == 0)
|
|
Packit Service |
084de1 |
break;
|
|
Packit Service |
084de1 |
} else {
|
|
Packit Service |
084de1 |
if (!EVP_DigestFinal_ex(ctx, mac, NULL))
|
|
Packit Service |
084de1 |
goto end;
|
|
Packit Service |
084de1 |
memcpy(out, mac, len);
|
|
Packit Service |
084de1 |
break;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
ret = 1;
|
|
Packit Service |
084de1 |
end:
|
|
Packit Service |
084de1 |
EVP_MD_CTX_destroy(ctx);
|
|
Packit Service |
084de1 |
EVP_MD_CTX_destroy(ctx_init);
|
|
Packit Service |
084de1 |
OPENSSL_cleanse(mac, sizeof(mac));
|
|
Packit Service |
084de1 |
return ret;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static EVP_KDF_IMPL *sskdf_new(void)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
EVP_KDF_IMPL *impl;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if ((impl = OPENSSL_zalloc(sizeof(*impl))) == NULL)
|
|
Packit Service |
084de1 |
KDFerr(KDF_F_SSKDF_NEW, ERR_R_MALLOC_FAILURE);
|
|
Packit Service |
084de1 |
return impl;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static void sskdf_reset(EVP_KDF_IMPL *impl)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
OPENSSL_clear_free(impl->secret, impl->secret_len);
|
|
Packit Service |
084de1 |
OPENSSL_clear_free(impl->info, impl->info_len);
|
|
Packit Service |
084de1 |
memset(impl, 0, sizeof(*impl));
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static void sskdf_free(EVP_KDF_IMPL *impl)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
sskdf_reset(impl);
|
|
Packit Service |
084de1 |
OPENSSL_free(impl);
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static int sskdf_set_buffer(va_list args, unsigned char **out, size_t *out_len)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
const unsigned char *p;
|
|
Packit Service |
084de1 |
size_t len;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
p = va_arg(args, const unsigned char *);
|
|
Packit Service |
084de1 |
len = va_arg(args, size_t);
|
|
Packit Service |
084de1 |
OPENSSL_clear_free(*out, *out_len);
|
|
Packit Service |
084de1 |
if (len == 0) {
|
|
Packit Service |
084de1 |
*out = NULL;
|
|
Packit Service |
084de1 |
*out_len = 0;
|
|
Packit Service |
084de1 |
return 1;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
*out = OPENSSL_memdup(p, len);
|
|
Packit Service |
084de1 |
if (*out == NULL)
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
*out_len = len;
|
|
Packit Service |
084de1 |
return 1;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static int sskdf_ctrl(EVP_KDF_IMPL *impl, int cmd, va_list args)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
const EVP_MD *md;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
switch (cmd) {
|
|
Packit Service |
084de1 |
case EVP_KDF_CTRL_SET_KEY:
|
|
Packit Service |
084de1 |
return sskdf_set_buffer(args, &impl->secret, &impl->secret_len);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
case EVP_KDF_CTRL_SET_SSKDF_INFO:
|
|
Packit Service |
084de1 |
return sskdf_set_buffer(args, &impl->info, &impl->info_len);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
case EVP_KDF_CTRL_SET_MD:
|
|
Packit Service |
084de1 |
md = va_arg(args, const EVP_MD *);
|
|
Packit Service |
084de1 |
if (md == NULL)
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
impl->md = md;
|
|
Packit Service |
084de1 |
return 1;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
default:
|
|
Packit Service |
084de1 |
return -2;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static int sskdf_ctrl_str(EVP_KDF_IMPL *impl, const char *type,
|
|
Packit Service |
084de1 |
const char *value)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
if (strcmp(type, "secret") == 0 || strcmp(type, "key") == 0)
|
|
Packit Service |
084de1 |
return kdf_str2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_KEY,
|
|
Packit Service |
084de1 |
value);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (strcmp(type, "hexsecret") == 0 || strcmp(type, "hexkey") == 0)
|
|
Packit Service |
084de1 |
return kdf_hex2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_KEY,
|
|
Packit Service |
084de1 |
value);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (strcmp(type, "info") == 0)
|
|
Packit Service |
084de1 |
return kdf_str2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_SSKDF_INFO,
|
|
Packit Service |
084de1 |
value);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (strcmp(type, "hexinfo") == 0)
|
|
Packit Service |
084de1 |
return kdf_hex2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_SSKDF_INFO,
|
|
Packit Service |
084de1 |
value);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (strcmp(type, "digest") == 0)
|
|
Packit Service |
084de1 |
return kdf_md2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_MD, value);
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
return -2;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static size_t sskdf_size(EVP_KDF_IMPL *impl)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
int len;
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
if (impl->md == NULL) {
|
|
Packit Service |
084de1 |
KDFerr(KDF_F_SSKDF_SIZE, KDF_R_MISSING_MESSAGE_DIGEST);
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
len = EVP_MD_size(impl->md);
|
|
Packit Service |
084de1 |
return (len <= 0) ? 0 : (size_t)len;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
static int sskdf_derive(EVP_KDF_IMPL *impl, unsigned char *key, size_t keylen)
|
|
Packit Service |
084de1 |
{
|
|
Packit Service |
084de1 |
if (impl->secret == NULL) {
|
|
Packit Service |
084de1 |
KDFerr(KDF_F_SSKDF_DERIVE, KDF_R_MISSING_SECRET);
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
/* H(x) = hash */
|
|
Packit Service |
084de1 |
if (impl->md == NULL) {
|
|
Packit Service |
084de1 |
KDFerr(KDF_F_SSKDF_DERIVE, KDF_R_MISSING_MESSAGE_DIGEST);
|
|
Packit Service |
084de1 |
return 0;
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
return SSKDF_hash_kdm(impl->md, impl->secret, impl->secret_len,
|
|
Packit Service |
084de1 |
impl->info, impl->info_len, key, keylen);
|
|
Packit Service |
084de1 |
}
|
|
Packit Service |
084de1 |
|
|
Packit Service |
084de1 |
const EVP_KDF_METHOD ss_kdf_meth = {
|
|
Packit Service |
084de1 |
EVP_KDF_SS,
|
|
Packit Service |
084de1 |
sskdf_new,
|
|
Packit Service |
084de1 |
sskdf_free,
|
|
Packit Service |
084de1 |
sskdf_reset,
|
|
Packit Service |
084de1 |
sskdf_ctrl,
|
|
Packit Service |
084de1 |
sskdf_ctrl_str,
|
|
Packit Service |
084de1 |
sskdf_size,
|
|
Packit Service |
084de1 |
sskdf_derive
|
|
Packit Service |
084de1 |
};
|