Webserver+3d print
Diff: cyclone_crypto/pkcs5.c
- Revision:
- 0:8918a71cdbe9
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/cyclone_crypto/pkcs5.c Sat Feb 04 18:15:49 2017 +0000 @@ -0,0 +1,220 @@ +/** + * @file pkcs5.c + * @brief PKCS #5 (Password-Based Cryptography Standard) + * + * @section License + * + * Copyright (C) 2010-2017 Oryx Embedded SARL. All rights reserved. + * + * This file is part of CycloneCrypto Open. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software Foundation, + * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. + * + * @author Oryx Embedded SARL (www.oryx-embedded.com) + * @version 1.7.6 + **/ + +//Switch to the appropriate trace level +#define TRACE_LEVEL CRYPTO_TRACE_LEVEL + +//Dependencies +#include <string.h> +#include "crypto.h" +#include "pkcs5.h" +#include "hmac.h" + +//Check crypto library configuration +#if (PKCS5_SUPPORT == ENABLED) + +//PKCS #5 OID (1.2.840.113549.1.5) +const uint8_t PKCS5_OID[8] = {0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05}; +//PBKDF2 OID (1.2.840.113549.1.5.12) +const uint8_t PBKDF2_OID[9] = {0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x05, 0x0C}; + + +/** + * @brief PBKDF1 key derivation function + * + * PBKDF1 applies a hash function, which shall be MD2, MD5 or SHA-1, to derive + * keys. The length of the derived key is bounded by the length of the hash + * function output, which is 16 octets for MD2 and MD5 and 20 octets for SHA-1 + * + * @param[in] hash Underlying hash function (MD2, MD5 or SHA-1) + * @param[in] p Password, an octet string + * @param[in] pLen Length in octets of password + * @param[in] s Salt, an octet string + * @param[in] sLen Length in octets of salt + * @param[in] c Iteration count + * @param[out] dk Derived key + * @param[in] dkLen Intended length in octets of the derived key + * @return Error code + **/ + +error_t pbkdf1(const HashAlgo *hash, const uint8_t *p, size_t pLen, + const uint8_t *s, size_t sLen, uint_t c, uint8_t *dk, size_t dkLen) +{ + uint_t i; + uint8_t *t; + HashContext *context; + + //Check input parameters + if(c < 1 || dkLen > hash->digestSize) + return ERROR_INVALID_PARAMETER; + + //Allocate a memory buffer to hold the hash context + context = cryptoAllocMem(hash->contextSize); + //Allocate a temporary buffer + t = cryptoAllocMem(hash->digestSize); + + //Failed to allocate memory? + if(!context || !t) + { + //Free previously allocated memory + cryptoFreeMem(context); + cryptoFreeMem(t); + + //Report an error + return ERROR_OUT_OF_MEMORY; + } + + //Apply the hash function to the concatenation of P and S + hash->init(context); + hash->update(context, p, pLen); + hash->update(context, s, sLen); + hash->final(context, t); + + //Iterate as many times as required + for(i = 1; i < c; i++) + { + //Apply the hash function to T(i - 1) + hash->init(context); + hash->update(context, t, hash->digestSize); + hash->final(context, t); + } + + //Output the derived key DK + memcpy(dk, t, dkLen); + + //Free previously allocated memory + cryptoFreeMem(context); + cryptoFreeMem(t); + + //Successful processing + return NO_ERROR; +} + + +/** + * @brief PBKDF2 key derivation function + * + * PBKDF2 applies a pseudorandom function to derive keys. The + * length of the derived key is essentially unbounded + * + * @param[in] hash Hash algorithm used by the underlying PRF + * @param[in] p Password, an octet string + * @param[in] pLen Length in octets of password + * @param[in] s Salt, an octet string + * @param[in] sLen Length in octets of salt + * @param[in] c Iteration count + * @param[out] dk Derived key + * @param[in] dkLen Intended length in octets of the derived key + * @return Error code + **/ + +error_t pbkdf2(const HashAlgo *hash, const uint8_t *p, size_t pLen, + const uint8_t *s, size_t sLen, uint_t c, uint8_t *dk, size_t dkLen) +{ + uint_t i; + uint_t j; + uint_t k; + uint8_t *u; + uint8_t *t; + HmacContext *context; + uint8_t a[4]; + + //Iteration count must be a positive integer + if(c < 1) + return ERROR_INVALID_PARAMETER; + + //Allocate a memory buffer to hold the HMAC context + context = cryptoAllocMem(sizeof(HmacContext)); + //Allocate temporary buffers + u = cryptoAllocMem(hash->digestSize); + t = cryptoAllocMem(hash->digestSize); + + //Failed to allocate memory? + if(!context || !u || !t) + { + //Free previously allocated memory + cryptoFreeMem(context); + cryptoFreeMem(u); + cryptoFreeMem(t); + + //Report an error + return ERROR_OUT_OF_MEMORY; + } + + //For each block of the derived key apply the function F + for(i = 1; dkLen > 0; i++) + { + //Calculate the 4-octet encoding of the integer i (MSB first) + a[0] = (i >> 24) & 0xFF; + a[1] = (i >> 16) & 0xFF; + a[2] = (i >> 8) & 0xFF; + a[3] = i & 0xFF; + + //Compute U1 = PRF(P, S || INT(i)) + hmacInit(context, hash, p, pLen); + hmacUpdate(context, s, sLen); + hmacUpdate(context, a, 4); + hmacFinal(context, u); + + //Save the resulting HMAC value + memcpy(t, u, hash->digestSize); + + //Iterate as many times as required + for(j = 1; j < c; j++) + { + //Compute U(j) = PRF(P, U(j-1)) + hmacInit(context, hash, p, pLen); + hmacUpdate(context, u, hash->digestSize); + hmacFinal(context, u); + + //Compute T = U(1) xor U(2) xor ... xor U(c) + for(k = 0; k < hash->digestSize; k++) + t[k] ^= u[k]; + } + + //Number of octets in the current block + k = MIN(dkLen, hash->digestSize); + //Save the resulting block + memcpy(dk, t, k); + + //Point to the next block + dk += k; + dkLen -= k; + } + + //Free previously allocated memory + cryptoFreeMem(context); + cryptoFreeMem(u); + cryptoFreeMem(t); + + //Successful processing + return NO_ERROR; +} + +#endif +