summaryrefslogtreecommitdiffstats
path: root/crypto/pkcs12
diff options
context:
space:
mode:
authorDmitry Belyavskiy <beldmit@gmail.com>2020-09-03 16:47:19 +0300
committerDmitry Belyavskiy <beldmit@gmail.com>2020-09-08 09:14:05 +0300
commitea0add4a822749d620714a4660eedd86a91e8e1b (patch)
treef4f1bf6b93cc0160e56a91d0d7af302507ff668c /crypto/pkcs12
parent08497fc64f688a91d421de74a8498aff33573485 (diff)
New GOST PKCS12 standard support
Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/12780)
Diffstat (limited to 'crypto/pkcs12')
-rw-r--r--crypto/pkcs12/p12_decr.c50
1 files changed, 45 insertions, 5 deletions
diff --git a/crypto/pkcs12/p12_decr.c b/crypto/pkcs12/p12_decr.c
index b9d13d9cf5..32e5597e06 100644
--- a/crypto/pkcs12/p12_decr.c
+++ b/crypto/pkcs12/p12_decr.c
@@ -24,13 +24,14 @@ unsigned char *PKCS12_pbe_crypt(const X509_ALGOR *algor,
unsigned char *out = NULL;
int outlen, i;
EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new();
+ int max_out_len, mac_len = 0;
if (ctx == NULL) {
PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT, ERR_R_MALLOC_FAILURE);
goto err;
}
- /* Decrypt data */
+ /* Process data */
if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
algor->parameter, ctx, en_de)) {
PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,
@@ -38,8 +39,37 @@ unsigned char *PKCS12_pbe_crypt(const X509_ALGOR *algor,
goto err;
}
- if ((out = OPENSSL_malloc(inlen + EVP_CIPHER_CTX_block_size(ctx)))
- == NULL) {
+ /*
+ * GOST algorithm specifics:
+ * OMAC algorithm calculate and encrypt MAC of the encrypted objects
+ * It's appended to encrypted text on encrypting
+ * MAC should be processed on decrypting separately from plain text
+ */
+ max_out_len = inlen + EVP_CIPHER_CTX_block_size(ctx);
+ if (EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ctx)) & EVP_CIPH_FLAG_CIPHER_WITH_MAC) {
+ if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_TLS1_AAD, 0, &mac_len) < 0) {
+ PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT, ERR_R_INTERNAL_ERROR);
+ goto err;
+ }
+
+ if (EVP_CIPHER_CTX_encrypting(ctx)) {
+ max_out_len += mac_len;
+ } else {
+ if (inlen < mac_len) {
+ PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT,
+ PKCS12_R_UNSUPPORTED_PKCS12_MODE);
+ goto err;
+ }
+ inlen -= mac_len;
+ if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG,
+ (int)mac_len, (unsigned char *)in+inlen) < 0) {
+ PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT, ERR_R_INTERNAL_ERROR);
+ goto err;
+ }
+ }
+ }
+
+ if ((out = OPENSSL_malloc(max_out_len)) == NULL) {
PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT, ERR_R_MALLOC_FAILURE);
goto err;
}
@@ -60,6 +90,16 @@ unsigned char *PKCS12_pbe_crypt(const X509_ALGOR *algor,
goto err;
}
outlen += i;
+ if (EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(ctx)) & EVP_CIPH_FLAG_CIPHER_WITH_MAC) {
+ if (EVP_CIPHER_CTX_encrypting(ctx)) {
+ if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG,
+ (int)mac_len, out+outlen) < 0) {
+ PKCS12err(PKCS12_F_PKCS12_PBE_CRYPT, ERR_R_INTERNAL_ERROR);
+ goto err;
+ }
+ outlen += mac_len;
+ }
+ }
if (datalen)
*datalen = outlen;
if (data)
@@ -79,10 +119,10 @@ void *PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it,
const char *pass, int passlen,
const ASN1_OCTET_STRING *oct, int zbuf)
{
- unsigned char *out;
+ unsigned char *out = NULL;
const unsigned char *p;
void *ret;
- int outlen;
+ int outlen = 0;
if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
&out, &outlen, 0)) {