Webserver+3d print

Dependents:   Nucleo

Revision:
0:8918a71cdbe9
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cyclone_crypto/pkcs5.c	Sat Feb 04 18:15:49 2017 +0000
@@ -0,0 +1,220 @@
+/**
+ * @file pkcs5.c
+ * @brief PKCS #5 (Password-Based Cryptography Standard)
+ *
+ * @section License
+ *
+ * Copyright (C) 2010-2017 Oryx Embedded SARL. All rights reserved.
+ *
+ * This file is part of CycloneCrypto Open.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU General Public License
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
+ *
+ * @author Oryx Embedded SARL (www.oryx-embedded.com)
+ * @version 1.7.6
+ **/
+
+//Switch to the appropriate trace level
+#define TRACE_LEVEL CRYPTO_TRACE_LEVEL
+
+//Dependencies
+#include <string.h>
+#include "crypto.h"
+#include "pkcs5.h"
+#include "hmac.h"
+
+//Check crypto library configuration
+#if (PKCS5_SUPPORT == ENABLED)
+
+//PKCS #5 OID (1.2.840.113549.1.5)
+const uint8_t PKCS5_OID[8] = {0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05};
+//PBKDF2 OID (1.2.840.113549.1.5.12)
+const uint8_t PBKDF2_OID[9] = {0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C};
+
+
+/**
+ * @brief PBKDF1 key derivation function
+ *
+ * PBKDF1 applies a hash function, which shall be MD2, MD5 or SHA-1, to derive
+ * keys. The length of the derived key is bounded by the length of the hash
+ * function output, which is 16 octets for MD2 and MD5 and 20 octets for SHA-1
+ *
+ * @param[in] hash Underlying hash function (MD2, MD5 or SHA-1)
+ * @param[in] p Password, an octet string
+ * @param[in] pLen Length in octets of password
+ * @param[in] s Salt, an octet string
+ * @param[in] sLen Length in octets of salt
+ * @param[in] c Iteration count
+ * @param[out] dk Derived key
+ * @param[in] dkLen Intended length in octets of the derived key
+ * @return Error code
+ **/
+
+error_t pbkdf1(const HashAlgo *hash, const uint8_t *p, size_t pLen,
+   const uint8_t *s, size_t sLen, uint_t c, uint8_t *dk, size_t dkLen)
+{
+   uint_t i;
+   uint8_t *t;
+   HashContext *context;
+
+   //Check input parameters
+   if(c < 1 || dkLen > hash->digestSize)
+      return ERROR_INVALID_PARAMETER;
+
+   //Allocate a memory buffer to hold the hash context
+   context = cryptoAllocMem(hash->contextSize);
+   //Allocate a temporary buffer
+   t = cryptoAllocMem(hash->digestSize);
+
+   //Failed to allocate memory?
+   if(!context || !t)
+   {
+      //Free previously allocated memory
+      cryptoFreeMem(context);
+      cryptoFreeMem(t);
+
+      //Report an error
+      return ERROR_OUT_OF_MEMORY;
+   }
+
+   //Apply the hash function to the concatenation of P and S
+   hash->init(context);
+   hash->update(context, p, pLen);
+   hash->update(context, s, sLen);
+   hash->final(context, t);
+
+   //Iterate as many times as required
+   for(i = 1; i < c; i++)
+   {
+      //Apply the hash function to T(i - 1)
+      hash->init(context);
+      hash->update(context, t, hash->digestSize);
+      hash->final(context, t);
+   }
+
+   //Output the derived key DK
+   memcpy(dk, t, dkLen);
+
+   //Free previously allocated memory
+   cryptoFreeMem(context);
+   cryptoFreeMem(t);
+
+   //Successful processing
+   return NO_ERROR;
+}
+
+
+/**
+ * @brief PBKDF2 key derivation function
+ *
+ * PBKDF2 applies a pseudorandom function to derive keys. The
+ * length of the derived key is essentially unbounded
+ *
+ * @param[in] hash Hash algorithm used by the underlying PRF
+ * @param[in] p Password, an octet string
+ * @param[in] pLen Length in octets of password
+ * @param[in] s Salt, an octet string
+ * @param[in] sLen Length in octets of salt
+ * @param[in] c Iteration count
+ * @param[out] dk Derived key
+ * @param[in] dkLen Intended length in octets of the derived key
+ * @return Error code
+ **/
+
+error_t pbkdf2(const HashAlgo *hash, const uint8_t *p, size_t pLen,
+   const uint8_t *s, size_t sLen, uint_t c, uint8_t *dk, size_t dkLen)
+{
+   uint_t i;
+   uint_t j;
+   uint_t k;
+   uint8_t *u;
+   uint8_t *t;
+   HmacContext *context;
+   uint8_t a[4];
+
+   //Iteration count must be a positive integer
+   if(c < 1)
+      return ERROR_INVALID_PARAMETER;
+
+   //Allocate a memory buffer to hold the HMAC context
+   context = cryptoAllocMem(sizeof(HmacContext));
+   //Allocate temporary buffers
+   u = cryptoAllocMem(hash->digestSize);
+   t = cryptoAllocMem(hash->digestSize);
+
+   //Failed to allocate memory?
+   if(!context || !u || !t)
+   {
+      //Free previously allocated memory
+      cryptoFreeMem(context);
+      cryptoFreeMem(u);
+      cryptoFreeMem(t);
+
+      //Report an error
+      return ERROR_OUT_OF_MEMORY;
+   }
+
+   //For each block of the derived key apply the function F
+   for(i = 1; dkLen > 0; i++)
+   {
+      //Calculate the 4-octet encoding of the integer i (MSB first)
+      a[0] = (i >> 24) & 0xFF;
+      a[1] = (i >> 16) & 0xFF;
+      a[2] = (i >> 8) & 0xFF;
+      a[3] = i & 0xFF;
+
+      //Compute U1 = PRF(P, S || INT(i))
+      hmacInit(context, hash, p, pLen);
+      hmacUpdate(context, s, sLen);
+      hmacUpdate(context, a, 4);
+      hmacFinal(context, u);
+
+      //Save the resulting HMAC value
+      memcpy(t, u, hash->digestSize);
+
+      //Iterate as many times as required
+      for(j = 1; j < c; j++)
+      {
+         //Compute U(j) = PRF(P, U(j-1))
+         hmacInit(context, hash, p, pLen);
+         hmacUpdate(context, u, hash->digestSize);
+         hmacFinal(context, u);
+
+         //Compute T = U(1) xor U(2) xor ... xor U(c)
+         for(k = 0; k < hash->digestSize; k++)
+            t[k] ^= u[k];
+      }
+
+      //Number of octets in the current block
+      k = MIN(dkLen, hash->digestSize);
+      //Save the resulting block
+      memcpy(dk, t, k);
+
+      //Point to the next block
+      dk += k;
+      dkLen -= k;
+   }
+
+   //Free previously allocated memory
+   cryptoFreeMem(context);
+   cryptoFreeMem(u);
+   cryptoFreeMem(t);
+
+   //Successful processing
+   return NO_ERROR;
+}
+
+#endif
+