mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-05 16:00:05 +01:00
343 lines
6.7 KiB
C
343 lines
6.7 KiB
C
/*
|
|
* OPENSSL crypto backend implementation
|
|
*
|
|
* Copyright (C) 2010-2017, Red Hat, Inc. All rights reserved.
|
|
* Copyright (C) 2010-2017, Milan Broz
|
|
*
|
|
* This file is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This file is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this file; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* In addition, as a special exception, the copyright holders give
|
|
* permission to link the code of portions of this program with the
|
|
* OpenSSL library under certain conditions as described in each
|
|
* individual source file, and distribute linked combinations
|
|
* including the two.
|
|
*
|
|
* You must obey the GNU Lesser General Public License in all respects
|
|
* for all of the code used other than OpenSSL.
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/hmac.h>
|
|
#include <openssl/rand.h>
|
|
#include "crypto_backend.h"
|
|
|
|
static int crypto_backend_initialised = 0;
|
|
|
|
struct crypt_hash {
|
|
EVP_MD_CTX *md;
|
|
const EVP_MD *hash_id;
|
|
int hash_len;
|
|
};
|
|
|
|
struct crypt_hmac {
|
|
HMAC_CTX *md;
|
|
const EVP_MD *hash_id;
|
|
int hash_len;
|
|
};
|
|
|
|
/*
|
|
* Compatible wrappers for OpenSSL < 1.1.0
|
|
*/
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
|
|
static void openssl_backend_init(void)
|
|
{
|
|
OpenSSL_add_all_algorithms();
|
|
}
|
|
|
|
static const char *openssl_backend_version(void)
|
|
{
|
|
return SSLeay_version(SSLEAY_VERSION);
|
|
}
|
|
|
|
static EVP_MD_CTX *EVP_MD_CTX_new(void)
|
|
{
|
|
EVP_MD_CTX *md = malloc(sizeof(*md));
|
|
|
|
if (md)
|
|
EVP_MD_CTX_init(md);
|
|
|
|
return md;
|
|
}
|
|
|
|
static void EVP_MD_CTX_free(EVP_MD_CTX *md)
|
|
{
|
|
EVP_MD_CTX_cleanup(md);
|
|
free(md);
|
|
}
|
|
|
|
static HMAC_CTX *HMAC_CTX_new(void)
|
|
{
|
|
HMAC_CTX *md = malloc(sizeof(*md));
|
|
|
|
if (md)
|
|
HMAC_CTX_init(md);
|
|
|
|
return md;
|
|
}
|
|
|
|
static void HMAC_CTX_free(HMAC_CTX *md)
|
|
{
|
|
HMAC_CTX_cleanup(md);
|
|
free(md);
|
|
}
|
|
#else
|
|
static void openssl_backend_init(void)
|
|
{
|
|
}
|
|
|
|
static const char *openssl_backend_version(void)
|
|
{
|
|
return OpenSSL_version(OPENSSL_VERSION);
|
|
}
|
|
#endif
|
|
|
|
int crypt_backend_init(struct crypt_device *ctx)
|
|
{
|
|
if (crypto_backend_initialised)
|
|
return 0;
|
|
|
|
openssl_backend_init();
|
|
|
|
crypto_backend_initialised = 1;
|
|
return 0;
|
|
}
|
|
|
|
void crypt_backend_destroy(void)
|
|
{
|
|
crypto_backend_initialised = 0;
|
|
}
|
|
|
|
uint32_t crypt_backend_flags(void)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
const char *crypt_backend_version(void)
|
|
{
|
|
return openssl_backend_version();
|
|
}
|
|
|
|
/* HASH */
|
|
int crypt_hash_size(const char *name)
|
|
{
|
|
const EVP_MD *hash_id = EVP_get_digestbyname(name);
|
|
|
|
if (!hash_id)
|
|
return -EINVAL;
|
|
|
|
return EVP_MD_size(hash_id);
|
|
}
|
|
|
|
int crypt_hash_init(struct crypt_hash **ctx, const char *name)
|
|
{
|
|
struct crypt_hash *h;
|
|
|
|
h = malloc(sizeof(*h));
|
|
if (!h)
|
|
return -ENOMEM;
|
|
|
|
h->md = EVP_MD_CTX_new();
|
|
if (!h->md) {
|
|
free(h);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
h->hash_id = EVP_get_digestbyname(name);
|
|
if (!h->hash_id) {
|
|
EVP_MD_CTX_free(h->md);
|
|
free(h);
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (EVP_DigestInit_ex(h->md, h->hash_id, NULL) != 1) {
|
|
EVP_MD_CTX_free(h->md);
|
|
free(h);
|
|
return -EINVAL;
|
|
}
|
|
|
|
h->hash_len = EVP_MD_size(h->hash_id);
|
|
*ctx = h;
|
|
return 0;
|
|
}
|
|
|
|
static int crypt_hash_restart(struct crypt_hash *ctx)
|
|
{
|
|
if (EVP_DigestInit_ex(ctx->md, ctx->hash_id, NULL) != 1)
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int crypt_hash_write(struct crypt_hash *ctx, const char *buffer, size_t length)
|
|
{
|
|
if (EVP_DigestUpdate(ctx->md, buffer, length) != 1)
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int crypt_hash_final(struct crypt_hash *ctx, char *buffer, size_t length)
|
|
{
|
|
unsigned char tmp[EVP_MAX_MD_SIZE];
|
|
unsigned int tmp_len = 0;
|
|
|
|
if (length > (size_t)ctx->hash_len)
|
|
return -EINVAL;
|
|
|
|
if (EVP_DigestFinal_ex(ctx->md, tmp, &tmp_len) != 1)
|
|
return -EINVAL;
|
|
|
|
memcpy(buffer, tmp, length);
|
|
crypt_backend_memzero(tmp, sizeof(tmp));
|
|
|
|
if (tmp_len < length)
|
|
return -EINVAL;
|
|
|
|
if (crypt_hash_restart(ctx))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int crypt_hash_destroy(struct crypt_hash *ctx)
|
|
{
|
|
EVP_MD_CTX_free(ctx->md);
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
free(ctx);
|
|
return 0;
|
|
}
|
|
|
|
/* HMAC */
|
|
int crypt_hmac_size(const char *name)
|
|
{
|
|
return crypt_hash_size(name);
|
|
}
|
|
|
|
int crypt_hmac_init(struct crypt_hmac **ctx, const char *name,
|
|
const void *buffer, size_t length)
|
|
{
|
|
struct crypt_hmac *h;
|
|
|
|
h = malloc(sizeof(*h));
|
|
if (!h)
|
|
return -ENOMEM;
|
|
|
|
h->md = HMAC_CTX_new();
|
|
if (!h->md) {
|
|
free(h);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
h->hash_id = EVP_get_digestbyname(name);
|
|
if (!h->hash_id) {
|
|
HMAC_CTX_free(h->md);
|
|
free(h);
|
|
return -EINVAL;
|
|
}
|
|
|
|
HMAC_Init_ex(h->md, buffer, length, h->hash_id, NULL);
|
|
|
|
h->hash_len = EVP_MD_size(h->hash_id);
|
|
*ctx = h;
|
|
return 0;
|
|
}
|
|
|
|
static void crypt_hmac_restart(struct crypt_hmac *ctx)
|
|
{
|
|
HMAC_Init_ex(ctx->md, NULL, 0, ctx->hash_id, NULL);
|
|
}
|
|
|
|
int crypt_hmac_write(struct crypt_hmac *ctx, const char *buffer, size_t length)
|
|
{
|
|
HMAC_Update(ctx->md, (const unsigned char *)buffer, length);
|
|
return 0;
|
|
}
|
|
|
|
int crypt_hmac_final(struct crypt_hmac *ctx, char *buffer, size_t length)
|
|
{
|
|
unsigned char tmp[EVP_MAX_MD_SIZE];
|
|
unsigned int tmp_len = 0;
|
|
|
|
if (length > (size_t)ctx->hash_len)
|
|
return -EINVAL;
|
|
|
|
HMAC_Final(ctx->md, tmp, &tmp_len);
|
|
|
|
memcpy(buffer, tmp, length);
|
|
crypt_backend_memzero(tmp, sizeof(tmp));
|
|
|
|
if (tmp_len < length)
|
|
return -EINVAL;
|
|
|
|
crypt_hmac_restart(ctx);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int crypt_hmac_destroy(struct crypt_hmac *ctx)
|
|
{
|
|
HMAC_CTX_free(ctx->md);
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
free(ctx);
|
|
return 0;
|
|
}
|
|
|
|
/* RNG */
|
|
int crypt_backend_rng(char *buffer, size_t length, int quality, int fips)
|
|
{
|
|
if (fips)
|
|
return -EINVAL;
|
|
|
|
if (RAND_bytes((unsigned char *)buffer, length) != 1)
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* PBKDF */
|
|
int crypt_pbkdf(const char *kdf, const char *hash,
|
|
const char *password, size_t password_length,
|
|
const char *salt, size_t salt_length,
|
|
char *key, size_t key_length,
|
|
uint32_t iterations, uint32_t memory, uint32_t parallel)
|
|
|
|
{
|
|
const EVP_MD *hash_id;
|
|
|
|
if (!kdf)
|
|
return -EINVAL;
|
|
|
|
if (!strcmp(kdf, "pbkdf2")) {
|
|
hash_id = EVP_get_digestbyname(hash);
|
|
if (!hash_id)
|
|
return -EINVAL;
|
|
|
|
if (!PKCS5_PBKDF2_HMAC(password, (int)password_length,
|
|
(unsigned char *)salt, (int)salt_length,
|
|
(int)iterations, hash_id, (int)key_length, (unsigned char *)key))
|
|
return -EINVAL;
|
|
return 0;
|
|
#if USE_INTERNAL_ARGON2
|
|
} else if (!strncmp(kdf, "argon2", 6)) {
|
|
return argon2(kdf, password, password_length, salt, salt_length,
|
|
key, key_length, iterations, memory, parallel);
|
|
#endif
|
|
}
|
|
|
|
return -EINVAL;
|
|
}
|