Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | | - |
11 | | - |
12 | | - |
13 | | - |
14 | | - |
15 | | - |
16 | | - |
17 | | - |
18 | | - |
19 | | - |
20 | | - |
21 | | - |
22 | | - |
23 | | - |
24 | | - |
25 | | - |
26 | | - |
27 | | - |
28 | | - |
29 | | - |
30 | | - |
31 | | - |
32 | | - |
33 | | - |
34 | | - |
35 | | - |
36 | | - |
37 | | - |
38 | | - |
39 | | - |
40 | | - |
41 | | - |
42 | | - |
43 | | - |
44 | | - |
45 | | - |
46 | | - |
47 | | - |
48 | | - |
49 | | - |
50 | | - |
51 | | - |
52 | | - |
53 | | - |
54 | | - |
55 | | - |
56 | | - |
57 | | - |
58 | | - |
59 | #include <stdio.h> | - |
60 | #include <stdlib.h> | - |
61 | #include <string.h> | - |
62 | | - |
63 | #include <openssl/err.h> | - |
64 | #include <openssl/evp.h> | - |
65 | #include <openssl/x509.h> | - |
66 | | - |
67 | | - |
68 | | - |
69 | | - |
70 | void | - |
71 | PKCS5_PBE_add(void) | - |
72 | { | - |
73 | } | - |
74 | | - |
75 | int | - |
76 | PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, | - |
77 | ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) | - |
78 | { | - |
79 | EVP_MD_CTX ctx; | - |
80 | unsigned char md_tmp[EVP_MAX_MD_SIZE]; | - |
81 | unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH]; | - |
82 | int i; | - |
83 | PBEPARAM *pbe; | - |
84 | int saltlen, iter; | - |
85 | unsigned char *salt; | - |
86 | const unsigned char *pbuf; | - |
87 | int mdsize; | - |
88 | int rv = 0; | - |
89 | | - |
90 | | - |
91 | if (param == NULL || param->type != V_ASN1_SEQUENCE ||TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
| 0 |
92 | param->value.sequence == NULL) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
93 | EVPerror(EVP_R_DECODE_ERROR); | - |
94 | return 0; never executed: return 0; | 0 |
95 | } | - |
96 | | - |
97 | mdsize = EVP_MD_size(md); | - |
98 | if (mdsize < 0)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
99 | return 0; never executed: return 0; | 0 |
100 | | - |
101 | pbuf = param->value.sequence->data; | - |
102 | if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
103 | EVPerror(EVP_R_DECODE_ERROR); | - |
104 | return 0; never executed: return 0; | 0 |
105 | } | - |
106 | | - |
107 | if (!pbe->iter)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
108 | iter = 1; never executed: iter = 1; | 0 |
109 | else if ((iter = ASN1_INTEGER_get(pbe->iter)) <= 0) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
110 | EVPerror(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS); | - |
111 | return 0; never executed: return 0; | 0 |
112 | } | - |
113 | salt = pbe->salt->data; | - |
114 | saltlen = pbe->salt->length; | - |
115 | | - |
116 | if (!pass)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
117 | passlen = 0; never executed: passlen = 0; | 0 |
118 | else if (passlen == -1)TRUE | never evaluated | FALSE | never evaluated |
| 0 |
119 | passlen = strlen(pass); never executed: passlen = strlen(pass); | 0 |
120 | | - |
121 | EVP_MD_CTX_init(&ctx); | - |
122 | | - |
123 | if (!EVP_DigestInit_ex(&ctx, md, NULL))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
124 | goto err; never executed: goto err; | 0 |
125 | if (!EVP_DigestUpdate(&ctx, pass, passlen))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
126 | goto err; never executed: goto err; | 0 |
127 | if (!EVP_DigestUpdate(&ctx, salt, saltlen))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
128 | goto err; never executed: goto err; | 0 |
129 | if (!EVP_DigestFinal_ex(&ctx, md_tmp, NULL))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
130 | goto err; never executed: goto err; | 0 |
131 | for (i = 1; i < iter; i++) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
132 | if (!EVP_DigestInit_ex(&ctx, md, NULL))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
133 | goto err; never executed: goto err; | 0 |
134 | if (!EVP_DigestUpdate(&ctx, md_tmp, mdsize))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
135 | goto err; never executed: goto err; | 0 |
136 | if (!EVP_DigestFinal_ex (&ctx, md_tmp, NULL))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
137 | goto err; never executed: goto err; | 0 |
138 | } never executed: end of block | 0 |
139 | if ((size_t)EVP_CIPHER_key_length(cipher) > sizeof(md_tmp)) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
140 | EVPerror(EVP_R_BAD_KEY_LENGTH); | - |
141 | goto err; never executed: goto err; | 0 |
142 | } | - |
143 | memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); | - |
144 | if ((size_t)EVP_CIPHER_iv_length(cipher) > 16) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
145 | EVPerror(EVP_R_IV_TOO_LARGE); | - |
146 | goto err; never executed: goto err; | 0 |
147 | } | - |
148 | memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), | - |
149 | EVP_CIPHER_iv_length(cipher)); | - |
150 | if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))TRUE | never evaluated | FALSE | never evaluated |
| 0 |
151 | goto err; never executed: goto err; | 0 |
152 | explicit_bzero(md_tmp, EVP_MAX_MD_SIZE); | - |
153 | explicit_bzero(key, EVP_MAX_KEY_LENGTH); | - |
154 | explicit_bzero(iv, EVP_MAX_IV_LENGTH); | - |
155 | rv = 1; | - |
156 | err: code before this statement never executed: err: | 0 |
157 | EVP_MD_CTX_cleanup(&ctx); | - |
158 | PBEPARAM_free(pbe); | - |
159 | return rv; never executed: return rv; | 0 |
160 | } | - |
| | |