mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-03 20:22:59 -05:00 
			
		
		
		
	This commit also updates corresponding test suites. Signed-off-by: Valerio Setti <valerio.setti@nordicsemi.no>
		
			
				
	
	
		
			187 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			187 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/**
 | 
						|
 * \file pkcs12.h
 | 
						|
 *
 | 
						|
 * \brief PKCS#12 Personal Information Exchange Syntax
 | 
						|
 */
 | 
						|
/*
 | 
						|
 *  Copyright The Mbed TLS Contributors
 | 
						|
 *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
 | 
						|
 */
 | 
						|
#ifndef MBEDTLS_PKCS12_H
 | 
						|
#define MBEDTLS_PKCS12_H
 | 
						|
 | 
						|
#include "mbedtls/build_info.h"
 | 
						|
 | 
						|
#include "mbedtls/md.h"
 | 
						|
#include "mbedtls/cipher.h"
 | 
						|
#include "mbedtls/asn1.h"
 | 
						|
 | 
						|
#include <stddef.h>
 | 
						|
 | 
						|
/** Bad input parameters to function. */
 | 
						|
#define MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA                 -0x1F80
 | 
						|
/** Feature not available, e.g. unsupported encryption scheme. */
 | 
						|
#define MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE            -0x1F00
 | 
						|
/** PBE ASN.1 data not as expected. */
 | 
						|
#define MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT             -0x1E80
 | 
						|
/** Given private key password does not allow for correct decryption. */
 | 
						|
#define MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH              -0x1E00
 | 
						|
 | 
						|
#define MBEDTLS_PKCS12_DERIVE_KEY       1   /**< encryption/decryption key */
 | 
						|
#define MBEDTLS_PKCS12_DERIVE_IV        2   /**< initialization vector     */
 | 
						|
#define MBEDTLS_PKCS12_DERIVE_MAC_KEY   3   /**< integrity / MAC key       */
 | 
						|
 | 
						|
#define MBEDTLS_PKCS12_PBE_DECRYPT      MBEDTLS_DECRYPT
 | 
						|
#define MBEDTLS_PKCS12_PBE_ENCRYPT      MBEDTLS_ENCRYPT
 | 
						|
 | 
						|
#ifdef __cplusplus
 | 
						|
extern "C" {
 | 
						|
#endif
 | 
						|
 | 
						|
#if defined(MBEDTLS_ASN1_PARSE_C) && defined(MBEDTLS_CIPHER_C)
 | 
						|
 | 
						|
#if !defined(MBEDTLS_DEPRECATED_REMOVED)
 | 
						|
/**
 | 
						|
 * \brief            PKCS12 Password Based function (encryption / decryption)
 | 
						|
 *                   for cipher-based and mbedtls_md-based PBE's
 | 
						|
 *
 | 
						|
 * \note             When encrypting, #MBEDTLS_CIPHER_PADDING_PKCS7 must
 | 
						|
 *                   be enabled at compile time.
 | 
						|
 *
 | 
						|
 * \deprecated       This function is deprecated and will be removed in a
 | 
						|
 *                   future version of the library.
 | 
						|
 *                   Please use mbedtls_pkcs12_pbe_ext() instead.
 | 
						|
 *
 | 
						|
 * \warning          When decrypting:
 | 
						|
 *                   - if #MBEDTLS_CIPHER_PADDING_PKCS7 is enabled at compile
 | 
						|
 *                     time, this function validates the CBC padding and returns
 | 
						|
 *                     #MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH if the padding is
 | 
						|
 *                     invalid. Note that this can help active adversaries
 | 
						|
 *                     attempting to brute-forcing the password. Note also that
 | 
						|
 *                     there is no guarantee that an invalid password will be
 | 
						|
 *                     detected (the chances of a valid padding with a random
 | 
						|
 *                     password are about 1/255).
 | 
						|
 *                   - if #MBEDTLS_CIPHER_PADDING_PKCS7 is disabled at compile
 | 
						|
 *                     time, this function does not validate the CBC padding.
 | 
						|
 *
 | 
						|
 * \param pbe_params an ASN1 buffer containing the pkcs-12 PbeParams structure
 | 
						|
 * \param mode       either #MBEDTLS_PKCS12_PBE_ENCRYPT or
 | 
						|
 *                   #MBEDTLS_PKCS12_PBE_DECRYPT
 | 
						|
 * \param cipher_type the cipher used
 | 
						|
 * \param md_type    the mbedtls_md used
 | 
						|
 * \param pwd        Latin1-encoded password used. This may only be \c NULL when
 | 
						|
 *                   \p pwdlen is 0. No null terminator should be used.
 | 
						|
 * \param pwdlen     length of the password (may be 0)
 | 
						|
 * \param data       the input data
 | 
						|
 * \param len        data length
 | 
						|
 * \param output     Output buffer.
 | 
						|
 *                   On success, it contains the encrypted or decrypted data,
 | 
						|
 *                   possibly followed by the CBC padding.
 | 
						|
 *                   On failure, the content is indeterminate.
 | 
						|
 *                   For decryption, there must be enough room for \p len
 | 
						|
 *                   bytes.
 | 
						|
 *                   For encryption, there must be enough room for
 | 
						|
 *                   \p len + 1 bytes, rounded up to the block size of
 | 
						|
 *                   the block cipher identified by \p pbe_params.
 | 
						|
 *
 | 
						|
 * \return           0 if successful, or a MBEDTLS_ERR_XXX code
 | 
						|
 */
 | 
						|
int MBEDTLS_DEPRECATED mbedtls_pkcs12_pbe(mbedtls_asn1_buf *pbe_params, int mode,
 | 
						|
                                          mbedtls_cipher_type_t cipher_type,
 | 
						|
                                          mbedtls_md_type_t md_type,
 | 
						|
                                          const unsigned char *pwd,  size_t pwdlen,
 | 
						|
                                          const unsigned char *data, size_t len,
 | 
						|
                                          unsigned char *output);
 | 
						|
#endif /* MBEDTLS_DEPRECATED_REMOVED */
 | 
						|
 | 
						|
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief            PKCS12 Password Based function (encryption / decryption)
 | 
						|
 *                   for cipher-based and mbedtls_md-based PBE's
 | 
						|
 *
 | 
						|
 *
 | 
						|
 * \warning          When decrypting:
 | 
						|
 *                   - This function validates the CBC padding and returns
 | 
						|
 *                     #MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH if the padding is
 | 
						|
 *                     invalid. Note that this can help active adversaries
 | 
						|
 *                     attempting to brute-forcing the password. Note also that
 | 
						|
 *                     there is no guarantee that an invalid password will be
 | 
						|
 *                     detected (the chances of a valid padding with a random
 | 
						|
 *                     password are about 1/255).
 | 
						|
 *
 | 
						|
 * \param pbe_params an ASN1 buffer containing the pkcs-12 PbeParams structure
 | 
						|
 * \param mode       either #MBEDTLS_PKCS12_PBE_ENCRYPT or
 | 
						|
 *                   #MBEDTLS_PKCS12_PBE_DECRYPT
 | 
						|
 * \param cipher_type the cipher used
 | 
						|
 * \param md_type    the mbedtls_md used
 | 
						|
 * \param pwd        Latin1-encoded password used. This may only be \c NULL when
 | 
						|
 *                   \p pwdlen is 0. No null terminator should be used.
 | 
						|
 * \param pwdlen     length of the password (may be 0)
 | 
						|
 * \param data       the input data
 | 
						|
 * \param len        data length
 | 
						|
 * \param output     Output buffer.
 | 
						|
 *                   On success, it contains the encrypted or decrypted data,
 | 
						|
 *                   possibly followed by the CBC padding.
 | 
						|
 *                   On failure, the content is indeterminate.
 | 
						|
 *                   For decryption, there must be enough room for \p len
 | 
						|
 *                   bytes.
 | 
						|
 *                   For encryption, there must be enough room for
 | 
						|
 *                   \p len + 1 bytes, rounded up to the block size of
 | 
						|
 *                   the block cipher identified by \p pbe_params.
 | 
						|
 * \param output_size size of output buffer.
 | 
						|
 *                    This must be big enough to accommodate for output plus
 | 
						|
 *                    padding data.
 | 
						|
 * \param output_len On success, length of actual data written to the output buffer.
 | 
						|
 *
 | 
						|
 * \return           0 if successful, or a MBEDTLS_ERR_XXX code
 | 
						|
 */
 | 
						|
int mbedtls_pkcs12_pbe_ext(mbedtls_asn1_buf *pbe_params, int mode,
 | 
						|
                           mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type,
 | 
						|
                           const unsigned char *pwd,  size_t pwdlen,
 | 
						|
                           const unsigned char *data, size_t len,
 | 
						|
                           unsigned char *output, size_t output_size,
 | 
						|
                           size_t *output_len);
 | 
						|
 | 
						|
#endif /* MBEDTLS_CIPHER_PADDING_PKCS7 */
 | 
						|
 | 
						|
#endif /* MBEDTLS_ASN1_PARSE_C && MBEDTLS_CIPHER_C */
 | 
						|
 | 
						|
/**
 | 
						|
 * \brief            The PKCS#12 derivation function uses a password and a salt
 | 
						|
 *                   to produce pseudo-random bits for a particular "purpose".
 | 
						|
 *
 | 
						|
 *                   Depending on the given id, this function can produce an
 | 
						|
 *                   encryption/decryption key, an initialization vector or an
 | 
						|
 *                   integrity key.
 | 
						|
 *
 | 
						|
 * \param data       buffer to store the derived data in
 | 
						|
 * \param datalen    length of buffer to fill
 | 
						|
 * \param pwd        The password to use. For compliance with PKCS#12 §B.1, this
 | 
						|
 *                   should be a BMPString, i.e. a Unicode string where each
 | 
						|
 *                   character is encoded as 2 bytes in big-endian order, with
 | 
						|
 *                   no byte order mark and with a null terminator (i.e. the
 | 
						|
 *                   last two bytes should be 0x00 0x00).
 | 
						|
 * \param pwdlen     length of the password (may be 0).
 | 
						|
 * \param salt       Salt buffer to use. This may only be \c NULL when
 | 
						|
 *                   \p saltlen is 0.
 | 
						|
 * \param saltlen    length of the salt (may be zero)
 | 
						|
 * \param mbedtls_md mbedtls_md type to use during the derivation
 | 
						|
 * \param id         id that describes the purpose (can be
 | 
						|
 *                   #MBEDTLS_PKCS12_DERIVE_KEY, #MBEDTLS_PKCS12_DERIVE_IV or
 | 
						|
 *                   #MBEDTLS_PKCS12_DERIVE_MAC_KEY)
 | 
						|
 * \param iterations number of iterations
 | 
						|
 *
 | 
						|
 * \return          0 if successful, or a MD, BIGNUM type error.
 | 
						|
 */
 | 
						|
int mbedtls_pkcs12_derivation(unsigned char *data, size_t datalen,
 | 
						|
                              const unsigned char *pwd, size_t pwdlen,
 | 
						|
                              const unsigned char *salt, size_t saltlen,
 | 
						|
                              mbedtls_md_type_t mbedtls_md, int id, int iterations);
 | 
						|
 | 
						|
#ifdef __cplusplus
 | 
						|
}
 | 
						|
#endif
 | 
						|
 | 
						|
#endif /* pkcs12.h */
 |