/* ==================================================================== * Copyright (c) 2016 The GmSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the GmSSL Project. * (http://gmssl.org/)" * * 4. The name "GmSSL Project" must not be used to endorse or promote * products derived from this software without prior written * permission. For written permission, please contact * guanzhi1980@gmail.com. * * 5. Products derived from this software may not be called "GmSSL" * nor may "GmSSL" appear in their names without prior written * permission of the GmSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the GmSSL Project * (http://gmssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES * LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== */ #include #include #include #include #include #include #include "saf_lcl.h" /* 7.3.31 */ int SAF_GenerateKeyWithEPK( void *hSymmKeyObj, unsigned char *pucPublicKey, unsigned int uiPublicKeyLen, unsigned char *pucSymmKey, unsigned int *puiSymmKeyLen, void **phKeyHandle) { int ret = SAR_UnknownErr; SAF_KEY *hkey = NULL; SAF_SYMMKEYOBJ *obj = (SAF_SYMMKEYOBJ *)hSymmKeyObj; const EVP_CIPHER *cipher; unsigned char keybuf[32]; EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *pkctx = NULL; size_t outlen; if (!hSymmKeyObj || !pucPublicKey || !pucSymmKey || !puiSymmKeyLen || !phKeyHandle) { SAFerr(SAF_F_SAF_GENERATEKEYWITHEPK, ERR_R_PASSED_NULL_PARAMETER); return SAR_IndataErr; } if (uiPublicKeyLen <= 0 || uiPublicKeyLen > INT_MAX) { SAFerr(SAF_F_SAF_GENERATEKEYWITHEPK, SAF_R_INVALID_INPUT_LENGTH); return SAR_IndataLenErr; } outlen = (size_t)*puiSymmKeyLen; if (!(cipher = EVP_get_cipherbysgd(obj->uiCryptoAlgID, 0)) //fixme: feedbitlen || !RAND_bytes(keybuf, EVP_CIPHER_key_length(cipher)) || !(pkey = d2i_PUBKEY(NULL, (const unsigned char **)&pucPublicKey, (long)uiPublicKeyLen)) || !(pkctx = EVP_PKEY_CTX_new(pkey, NULL)) || !EVP_PKEY_encrypt_init(pkctx) || !EVP_PKEY_encrypt(pkctx, pucSymmKey, &outlen, keybuf, (size_t)EVP_CIPHER_key_length(cipher))) { SAFerr(SAF_F_SAF_GENERATEKEYWITHEPK, SAF_R_ENCRYPT_KEY_FAILURE); goto end; } // init EVP_CIPHER_CTX if (!(hkey = OPENSSL_zalloc(sizeof(*hkey)))) { SAFerr(SAF_F_SAF_GENERATEKEYWITHEPK, ERR_R_MALLOC_FAILURE); goto end; } *puiSymmKeyLen = (unsigned int)outlen; ret = SAR_Ok; end: EVP_PKEY_free(pkey); EVP_PKEY_CTX_free(pkctx); return ret; } /* 65 typedef struct { 66 SAF_APP *app; 67 unsigned char *pucContainerName; 68 unsigned int uiContainerLen; 69 unsigned char *pucIV; 70 unsigned int uiIVLen; 71 unsigned int uiEncOrDec; 72 unsigned int uiCryptoAlgID; 73 } SAF_SYMMKEYOBJ; 74 75 typedef struct { 76 SAF_SYMMKEYOBJ *hSymmKeyObj; 77 unsigned char key[64]; 78 int keylen; 79 EVP_CIPHER_CTX *cipher_ctx; 80 CMAC_CTX *cmac_ctx; 81 } SAF_KEY; */ SAF_KEY *SAF_KEY_new(const SAF_SYMMKEYOBJ *hSymmKeyObj) { SAF_KEY *ret = NULL; SAF_KEY *key = NULL; if (!(key = OPENSSL_zalloc(sizeof(*key))) || !(key->hSymmKeyObj = SAF_SYMMKEYOBJ_dup(hSymmKeyObj))) { SAFerr(SAF_F_SAF_KEY_NEW, ERR_R_MALLOC_FAILURE); goto end; } ret = key; key = NULL; end: SAF_KEY_free(key); return ret; } void SAF_KEY_free(SAF_KEY *key) { if (key) { SAF_SYMMKEYOBJ_free(key->hSymmKeyObj); } OPENSSL_clear_free(key, sizeof(*key)); } SAF_SYMMKEYOBJ *SAF_SYMMKEYOBJ_dup(const SAF_SYMMKEYOBJ *a) { SAF_SYMMKEYOBJ *ret = NULL; SAF_SYMMKEYOBJ *obj = NULL; if (!(obj = OPENSSL_zalloc(sizeof(*obj))) || !(obj->pucContainerName = OPENSSL_memdup(a->pucContainerName, a->uiContainerLen)) || !(obj->pucIV = OPENSSL_memdup(a->pucIV, a->uiIVLen))) { SAFerr(SAF_F_SAF_SYMMKEYOBJ_DUP, ERR_R_MALLOC_FAILURE); goto end; } obj->uiContainerLen = a->uiContainerLen; obj->uiIVLen = a->uiIVLen; obj->uiEncOrDec = a->uiEncOrDec; obj->uiCryptoAlgID = a->uiCryptoAlgID; ret = obj; obj = NULL; end: SAF_SYMMKEYOBJ_free(obj); return ret; } void SAF_SYMMKEYOBJ_free(SAF_SYMMKEYOBJ *obj) { if (obj) { OPENSSL_free(obj->pucContainerName); OPENSSL_free(obj->pucIV); OPENSSL_free(obj); } } /* 7.3.32 */ int SAF_ImportEncedKey( void *hSymmKeyObj, unsigned char *pucSymmKey, unsigned int uiSymmKeyLen, void **phKeyHandle) { SAF_KEY *hkey = NULL; SAF_SYMMKEYOBJ *hobj = (SAF_SYMMKEYOBJ *)hSymmKeyObj; EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *pctx = NULL; char key_id[1024]; /* snprintf(key_id, sizeof(key_id), "%s.enc", hobj->pucContainerName); */ if (!(pkey = ENGINE_load_private_key(hobj->app->engine, key_id, NULL, NULL)) || !(pctx = EVP_PKEY_CTX_new(pkey, hobj->app->engine)) || EVP_PKEY_decrypt_init(pctx) <= 0 || EVP_PKEY_decrypt(pctx, hkey->key, &hkey->keylen, pucSymmKey, uiSymmKeyLen) <= 0) { goto end; } end: return 0; } /* 7.3.37 */ int SAF_DestroyKeyHandle( void *hKeyHandle) { SAF_KEY *hkey = (SAF_KEY *)hKeyHandle; OPENSSL_clear_free(hkey, hkey->keylen); return SAR_OK; }