2015-10-08 20:58:55 +03:00
|
|
|
/**
|
|
|
|
* WinPR: Windows Portable Runtime
|
|
|
|
*
|
|
|
|
* Copyright 2015 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2022-02-16 12:08:00 +03:00
|
|
|
#include <winpr/config.h>
|
2015-10-08 20:58:55 +03:00
|
|
|
|
|
|
|
#include <winpr/crt.h>
|
|
|
|
|
|
|
|
#include <winpr/crypto.h>
|
|
|
|
|
|
|
|
#ifdef WITH_OPENSSL
|
|
|
|
#include <openssl/md4.h>
|
|
|
|
#include <openssl/md5.h>
|
|
|
|
#include <openssl/sha.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/hmac.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef WITH_MBEDTLS
|
|
|
|
#include <mbedtls/md4.h>
|
|
|
|
#include <mbedtls/md5.h>
|
|
|
|
#include <mbedtls/sha1.h>
|
|
|
|
#include <mbedtls/md.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/**
|
|
|
|
* HMAC
|
|
|
|
*/
|
|
|
|
|
2021-07-28 16:18:03 +03:00
|
|
|
#ifdef WITH_OPENSSL
|
|
|
|
extern const EVP_MD* winpr_openssl_get_evp_md(WINPR_MD_TYPE md);
|
|
|
|
#endif
|
|
|
|
|
2015-10-09 22:23:15 +03:00
|
|
|
#ifdef WITH_OPENSSL
|
2020-02-12 15:27:30 +03:00
|
|
|
const EVP_MD* winpr_openssl_get_evp_md(WINPR_MD_TYPE md)
|
2015-10-08 20:58:55 +03:00
|
|
|
{
|
2020-02-12 15:27:30 +03:00
|
|
|
const char* name = winpr_md_type_to_string(md);
|
|
|
|
if (!name)
|
|
|
|
return NULL;
|
|
|
|
return EVP_get_digestbyname(name);
|
2015-10-08 20:58:55 +03:00
|
|
|
}
|
2015-10-09 22:23:15 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef WITH_MBEDTLS
|
2015-10-08 20:58:55 +03:00
|
|
|
mbedtls_md_type_t winpr_mbedtls_get_md_type(int md)
|
|
|
|
{
|
|
|
|
mbedtls_md_type_t type = MBEDTLS_MD_NONE;
|
|
|
|
|
|
|
|
switch (md)
|
|
|
|
{
|
|
|
|
case WINPR_MD_MD2:
|
|
|
|
type = MBEDTLS_MD_MD2;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_MD4:
|
|
|
|
type = MBEDTLS_MD_MD4;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_MD5:
|
|
|
|
type = MBEDTLS_MD_MD5;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_SHA1:
|
|
|
|
type = MBEDTLS_MD_SHA1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_SHA224:
|
|
|
|
type = MBEDTLS_MD_SHA224;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_SHA256:
|
|
|
|
type = MBEDTLS_MD_SHA256;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_SHA384:
|
|
|
|
type = MBEDTLS_MD_SHA384;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_SHA512:
|
|
|
|
type = MBEDTLS_MD_SHA512;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case WINPR_MD_RIPEMD160:
|
|
|
|
type = MBEDTLS_MD_RIPEMD160;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return type;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-02-12 15:27:30 +03:00
|
|
|
struct hash_map
|
|
|
|
{
|
|
|
|
const char* name;
|
|
|
|
WINPR_MD_TYPE md;
|
|
|
|
};
|
|
|
|
static const struct hash_map hashes[] = { { "md2", WINPR_MD_MD2 },
|
|
|
|
{ "md4", WINPR_MD_MD4 },
|
|
|
|
{ "md5", WINPR_MD_MD5 },
|
|
|
|
{ "sha1", WINPR_MD_SHA1 },
|
|
|
|
{ "sha224", WINPR_MD_SHA224 },
|
|
|
|
{ "sha256", WINPR_MD_SHA256 },
|
|
|
|
{ "sha384", WINPR_MD_SHA384 },
|
|
|
|
{ "sha512", WINPR_MD_SHA512 },
|
|
|
|
{ "sha3_224", WINPR_MD_SHA3_224 },
|
|
|
|
{ "sha3_256", WINPR_MD_SHA3_256 },
|
|
|
|
{ "sha3_384", WINPR_MD_SHA3_384 },
|
|
|
|
{ "sha3_512", WINPR_MD_SHA3_512 },
|
|
|
|
{ "shake128", WINPR_MD_SHAKE128 },
|
|
|
|
{ "shake256", WINPR_MD_SHAKE256 },
|
|
|
|
{ NULL, WINPR_MD_NONE } };
|
|
|
|
|
|
|
|
WINPR_MD_TYPE winpr_md_type_from_string(const char* name)
|
|
|
|
{
|
|
|
|
const struct hash_map* cur = hashes;
|
|
|
|
while (cur->name)
|
|
|
|
{
|
|
|
|
if (_stricmp(cur->name, name) == 0)
|
|
|
|
return cur->md;
|
|
|
|
cur++;
|
|
|
|
}
|
|
|
|
return WINPR_MD_NONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char* winpr_md_type_to_string(WINPR_MD_TYPE md)
|
|
|
|
{
|
|
|
|
const struct hash_map* cur = hashes;
|
|
|
|
while (cur->name)
|
|
|
|
{
|
|
|
|
if (cur->md == md)
|
|
|
|
return cur->name;
|
|
|
|
cur++;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
WINPR_HMAC_CTX* winpr_HMAC_New(void)
|
2015-10-08 20:58:55 +03:00
|
|
|
{
|
2016-11-21 19:28:54 +03:00
|
|
|
WINPR_HMAC_CTX* ctx = NULL;
|
2015-10-08 20:58:55 +03:00
|
|
|
#if defined(WITH_OPENSSL)
|
2016-11-24 16:53:19 +03:00
|
|
|
HMAC_CTX* hmac = NULL;
|
2017-03-19 23:58:24 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
if (!(hmac = (HMAC_CTX*)calloc(1, sizeof(HMAC_CTX))))
|
2016-11-21 19:28:54 +03:00
|
|
|
return NULL;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
HMAC_CTX_init(hmac);
|
|
|
|
#else
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!(hmac = HMAC_CTX_new()))
|
|
|
|
return NULL;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
#endif
|
2019-11-06 17:24:51 +03:00
|
|
|
ctx = (WINPR_HMAC_CTX*)hmac;
|
2016-11-24 16:53:19 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
|
|
|
mbedtls_md_context_t* hmac;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
if (!(hmac = (mbedtls_md_context_t*)calloc(1, sizeof(mbedtls_md_context_t))))
|
2016-11-24 16:53:19 +03:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
mbedtls_md_init(hmac);
|
2019-11-06 17:24:51 +03:00
|
|
|
ctx = (WINPR_HMAC_CTX*)hmac;
|
2016-11-24 16:53:19 +03:00
|
|
|
#endif
|
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL winpr_HMAC_Init(WINPR_HMAC_CTX* ctx, WINPR_MD_TYPE md, const BYTE* key, size_t keylen)
|
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
HMAC_CTX* hmac = (HMAC_CTX*)ctx;
|
2016-11-24 16:53:19 +03:00
|
|
|
const EVP_MD* evp = winpr_openssl_get_evp_md(md);
|
|
|
|
|
|
|
|
if (!evp || !hmac)
|
|
|
|
return FALSE;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2021-06-16 15:43:07 +03:00
|
|
|
if (keylen > INT_MAX)
|
|
|
|
return FALSE;
|
2018-05-01 16:43:36 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10000000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2021-06-16 15:43:07 +03:00
|
|
|
HMAC_Init_ex(hmac, key, (int)keylen, evp, NULL); /* no return value on OpenSSL 0.9.x */
|
2016-11-24 16:53:19 +03:00
|
|
|
return TRUE;
|
2016-11-21 19:28:54 +03:00
|
|
|
#else
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2021-06-16 15:43:07 +03:00
|
|
|
if (HMAC_Init_ex(hmac, key, (int)keylen, evp, NULL) == 1)
|
2016-11-24 16:53:19 +03:00
|
|
|
return TRUE;
|
2015-10-13 16:54:59 +03:00
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2015-10-08 20:58:55 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* hmac = (mbedtls_md_context_t*)ctx;
|
2015-10-08 20:58:55 +03:00
|
|
|
mbedtls_md_type_t md_type = winpr_mbedtls_get_md_type(md);
|
2016-11-21 19:28:54 +03:00
|
|
|
const mbedtls_md_info_t* md_info = mbedtls_md_info_from_type(md_type);
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (!md_info || !hmac)
|
|
|
|
return FALSE;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (hmac->md_info != md_info)
|
2016-11-21 19:28:54 +03:00
|
|
|
{
|
2016-11-24 16:53:19 +03:00
|
|
|
mbedtls_md_free(hmac); /* can be called at any time after mbedtls_md_init */
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mbedtls_md_setup(hmac, md_info, 1) != 0)
|
|
|
|
return FALSE;
|
2016-11-21 19:28:54 +03:00
|
|
|
}
|
2016-11-24 16:53:19 +03:00
|
|
|
|
|
|
|
if (mbedtls_md_hmac_starts(hmac, key, keylen) == 0)
|
|
|
|
return TRUE;
|
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
return FALSE;
|
2015-10-08 20:58:55 +03:00
|
|
|
}
|
|
|
|
|
2016-02-24 23:45:09 +03:00
|
|
|
BOOL winpr_HMAC_Update(WINPR_HMAC_CTX* ctx, const BYTE* input, size_t ilen)
|
2015-10-08 20:58:55 +03:00
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
HMAC_CTX* hmac = (HMAC_CTX*)ctx;
|
2018-05-01 16:43:36 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10000000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2016-11-24 16:53:19 +03:00
|
|
|
HMAC_Update(hmac, input, ilen); /* no return value on OpenSSL 0.9.x */
|
|
|
|
return TRUE;
|
2015-10-13 16:54:59 +03:00
|
|
|
#else
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (HMAC_Update(hmac, input, ilen) == 1)
|
|
|
|
return TRUE;
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2015-10-08 20:58:55 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* mdctx = (mbedtls_md_context_t*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mbedtls_md_hmac_update(mdctx, input, ilen) == 0)
|
|
|
|
return TRUE;
|
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
return FALSE;
|
2015-10-08 20:58:55 +03:00
|
|
|
}
|
|
|
|
|
2016-02-24 23:45:09 +03:00
|
|
|
BOOL winpr_HMAC_Final(WINPR_HMAC_CTX* ctx, BYTE* output, size_t olen)
|
2015-10-08 20:58:55 +03:00
|
|
|
{
|
2016-11-25 13:50:28 +03:00
|
|
|
#if defined(WITH_OPENSSL)
|
|
|
|
HMAC_CTX* hmac;
|
|
|
|
#elif defined(WITH_MBEDTLS)
|
|
|
|
mbedtls_md_context_t* mdctx;
|
|
|
|
#endif
|
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (!ctx)
|
2016-02-26 11:28:54 +03:00
|
|
|
return FALSE;
|
2016-11-24 16:53:19 +03:00
|
|
|
|
2015-10-08 20:58:55 +03:00
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
hmac = (HMAC_CTX*)ctx;
|
2018-05-01 16:43:36 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10000000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2016-11-24 16:53:19 +03:00
|
|
|
HMAC_Final(hmac, output, NULL); /* no return value on OpenSSL 0.9.x */
|
|
|
|
return TRUE;
|
2015-10-13 16:54:59 +03:00
|
|
|
#else
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (HMAC_Final(hmac, output, NULL) == 1)
|
|
|
|
return TRUE;
|
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mdctx = (mbedtls_md_context_t*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mbedtls_md_hmac_finish(mdctx, output) == 0)
|
|
|
|
return TRUE;
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
void winpr_HMAC_Free(WINPR_HMAC_CTX* ctx)
|
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
HMAC_CTX* hmac = (HMAC_CTX*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (hmac)
|
|
|
|
{
|
2017-03-19 23:58:24 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2016-11-24 16:53:19 +03:00
|
|
|
HMAC_CTX_cleanup(hmac);
|
|
|
|
free(hmac);
|
2016-11-21 19:28:54 +03:00
|
|
|
#else
|
2016-11-24 16:53:19 +03:00
|
|
|
HMAC_CTX_free(hmac);
|
2016-11-21 19:28:54 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
}
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2015-10-08 20:58:55 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* hmac = (mbedtls_md_context_t*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (hmac)
|
|
|
|
{
|
|
|
|
mbedtls_md_free(hmac);
|
|
|
|
free(hmac);
|
|
|
|
}
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2015-10-08 20:58:55 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
BOOL winpr_HMAC(WINPR_MD_TYPE md, const BYTE* key, size_t keylen, const BYTE* input, size_t ilen,
|
|
|
|
BYTE* output, size_t olen)
|
2015-10-08 20:58:55 +03:00
|
|
|
{
|
2016-11-24 16:53:19 +03:00
|
|
|
BOOL result = FALSE;
|
2017-11-17 14:41:18 +03:00
|
|
|
WINPR_HMAC_CTX* ctx = winpr_HMAC_New();
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!ctx)
|
2016-02-24 23:45:09 +03:00
|
|
|
return FALSE;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (!winpr_HMAC_Init(ctx, md, key, keylen))
|
|
|
|
goto out;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!winpr_HMAC_Update(ctx, input, ilen))
|
2016-11-24 16:53:19 +03:00
|
|
|
goto out;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!winpr_HMAC_Final(ctx, output, olen))
|
2016-11-24 16:53:19 +03:00
|
|
|
goto out;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
result = TRUE;
|
|
|
|
out:
|
|
|
|
winpr_HMAC_Free(ctx);
|
|
|
|
return result;
|
2015-10-08 20:58:55 +03:00
|
|
|
}
|
|
|
|
|
2015-10-09 22:23:15 +03:00
|
|
|
/**
|
|
|
|
* Generic Digest API
|
|
|
|
*/
|
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
WINPR_DIGEST_CTX* winpr_Digest_New(void)
|
2015-10-09 22:23:15 +03:00
|
|
|
{
|
2016-11-21 19:28:54 +03:00
|
|
|
WINPR_DIGEST_CTX* ctx = NULL;
|
2015-10-09 22:23:15 +03:00
|
|
|
#if defined(WITH_OPENSSL)
|
2016-11-21 19:28:54 +03:00
|
|
|
EVP_MD_CTX* mdctx;
|
2017-03-19 23:58:24 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2016-11-21 19:28:54 +03:00
|
|
|
mdctx = EVP_MD_CTX_create();
|
|
|
|
#else
|
|
|
|
mdctx = EVP_MD_CTX_new();
|
|
|
|
#endif
|
2019-11-06 17:24:51 +03:00
|
|
|
ctx = (WINPR_DIGEST_CTX*)mdctx;
|
2015-10-09 22:23:15 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2016-11-21 19:28:54 +03:00
|
|
|
mbedtls_md_context_t* mdctx;
|
2019-11-06 17:24:51 +03:00
|
|
|
mdctx = (mbedtls_md_context_t*)calloc(1, sizeof(mbedtls_md_context_t));
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mdctx)
|
|
|
|
mbedtls_md_init(mdctx);
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
ctx = (WINPR_DIGEST_CTX*)mdctx;
|
2016-11-24 16:53:19 +03:00
|
|
|
#endif
|
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(WITH_OPENSSL)
|
2018-02-14 14:44:12 +03:00
|
|
|
static BOOL winpr_Digest_Init_Internal(WINPR_DIGEST_CTX* ctx, const EVP_MD* evp)
|
2017-04-08 00:54:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
EVP_MD_CTX* mdctx = (EVP_MD_CTX*)ctx;
|
2016-11-24 16:53:19 +03:00
|
|
|
|
|
|
|
if (!mdctx || !evp)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (EVP_DigestInit_ex(mdctx, evp, NULL) != 1)
|
|
|
|
return FALSE;
|
|
|
|
|
2017-04-08 00:54:08 +03:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2018-02-14 14:44:12 +03:00
|
|
|
static BOOL winpr_Digest_Init_Internal(WINPR_DIGEST_CTX* ctx, WINPR_MD_TYPE md)
|
2017-04-08 00:54:08 +03:00
|
|
|
{
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* mdctx = (mbedtls_md_context_t*)ctx;
|
2015-10-09 22:23:15 +03:00
|
|
|
mbedtls_md_type_t md_type = winpr_mbedtls_get_md_type(md);
|
2016-11-21 19:28:54 +03:00
|
|
|
const mbedtls_md_info_t* md_info = mbedtls_md_info_from_type(md_type);
|
2015-10-13 16:43:26 +03:00
|
|
|
|
|
|
|
if (!md_info)
|
2016-11-24 16:53:19 +03:00
|
|
|
return FALSE;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mdctx->md_info != md_info)
|
2016-11-21 19:28:54 +03:00
|
|
|
{
|
2016-11-24 16:53:19 +03:00
|
|
|
mbedtls_md_free(mdctx); /* can be called at any time after mbedtls_md_init */
|
|
|
|
|
|
|
|
if (mbedtls_md_setup(mdctx, md_info, 0) != 0)
|
|
|
|
return FALSE;
|
2016-11-21 19:28:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (mbedtls_md_starts(mdctx) != 0)
|
2016-11-24 16:53:19 +03:00
|
|
|
return FALSE;
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
return TRUE;
|
2015-10-09 22:23:15 +03:00
|
|
|
}
|
2017-04-08 00:54:08 +03:00
|
|
|
#endif
|
|
|
|
|
2017-04-12 22:03:20 +03:00
|
|
|
BOOL winpr_Digest_Init_Allow_FIPS(WINPR_DIGEST_CTX* ctx, WINPR_MD_TYPE md)
|
2017-04-08 00:54:08 +03:00
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
EVP_MD_CTX* mdctx = (EVP_MD_CTX*)ctx;
|
2017-04-12 22:03:20 +03:00
|
|
|
const EVP_MD* evp = winpr_openssl_get_evp_md(md);
|
|
|
|
|
|
|
|
/* Only MD5 is supported for FIPS allow override */
|
|
|
|
if (md != WINPR_MD_MD5)
|
|
|
|
return FALSE;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2017-04-08 00:54:08 +03:00
|
|
|
EVP_MD_CTX_set_flags(mdctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
|
2018-02-14 14:44:12 +03:00
|
|
|
return winpr_Digest_Init_Internal(ctx, evp);
|
2017-04-08 00:54:08 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2017-04-12 22:03:20 +03:00
|
|
|
/* Only MD5 is supported for FIPS allow override */
|
|
|
|
if (md != WINPR_MD_MD5)
|
2017-11-17 14:41:18 +03:00
|
|
|
return FALSE;
|
|
|
|
|
2017-04-12 22:03:20 +03:00
|
|
|
return winpr_Digest_Init_Internal(ctx, md);
|
2017-04-08 00:54:08 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOL winpr_Digest_Init(WINPR_DIGEST_CTX* ctx, WINPR_MD_TYPE md)
|
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2017-04-10 21:06:04 +03:00
|
|
|
const EVP_MD* evp = winpr_openssl_get_evp_md(md);
|
2018-02-14 14:44:12 +03:00
|
|
|
return winpr_Digest_Init_Internal(ctx, evp);
|
2017-04-08 00:54:08 +03:00
|
|
|
#else
|
2017-04-10 22:20:50 +03:00
|
|
|
return winpr_Digest_Init_Internal(ctx, md);
|
2017-04-08 00:54:08 +03:00
|
|
|
#endif
|
|
|
|
}
|
2015-10-09 22:23:15 +03:00
|
|
|
|
2016-02-24 23:45:09 +03:00
|
|
|
BOOL winpr_Digest_Update(WINPR_DIGEST_CTX* ctx, const BYTE* input, size_t ilen)
|
2015-10-09 22:23:15 +03:00
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
EVP_MD_CTX* mdctx = (EVP_MD_CTX*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (EVP_DigestUpdate(mdctx, input, ilen) != 1)
|
2016-02-24 23:45:09 +03:00
|
|
|
return FALSE;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2015-10-09 22:23:15 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* mdctx = (mbedtls_md_context_t*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (mbedtls_md_update(mdctx, input, ilen) != 0)
|
2016-02-24 23:45:09 +03:00
|
|
|
return FALSE;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2015-10-09 22:23:15 +03:00
|
|
|
#endif
|
2016-02-24 23:45:09 +03:00
|
|
|
return TRUE;
|
2015-10-09 22:23:15 +03:00
|
|
|
}
|
|
|
|
|
2016-02-24 23:45:09 +03:00
|
|
|
BOOL winpr_Digest_Final(WINPR_DIGEST_CTX* ctx, BYTE* output, size_t olen)
|
2015-10-09 22:23:15 +03:00
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
EVP_MD_CTX* mdctx = (EVP_MD_CTX*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (EVP_DigestFinal_ex(mdctx, output, NULL) == 1)
|
|
|
|
return TRUE;
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* mdctx = (mbedtls_md_context_t*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mbedtls_md_finish(mdctx, output) == 0)
|
|
|
|
return TRUE;
|
|
|
|
|
2017-11-17 14:41:18 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
void winpr_Digest_Free(WINPR_DIGEST_CTX* ctx)
|
|
|
|
{
|
|
|
|
#if defined(WITH_OPENSSL)
|
2019-11-06 17:24:51 +03:00
|
|
|
EVP_MD_CTX* mdctx = (EVP_MD_CTX*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mdctx)
|
|
|
|
{
|
2017-03-19 23:58:24 +03:00
|
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || defined(LIBRESSL_VERSION_NUMBER)
|
2016-11-24 16:53:19 +03:00
|
|
|
EVP_MD_CTX_destroy(mdctx);
|
2016-11-21 19:28:54 +03:00
|
|
|
#else
|
2016-11-24 16:53:19 +03:00
|
|
|
EVP_MD_CTX_free(mdctx);
|
2016-11-21 19:28:54 +03:00
|
|
|
#endif
|
2016-11-24 16:53:19 +03:00
|
|
|
}
|
2016-11-21 19:28:54 +03:00
|
|
|
|
2015-10-09 22:23:15 +03:00
|
|
|
#elif defined(WITH_MBEDTLS)
|
2019-11-06 17:24:51 +03:00
|
|
|
mbedtls_md_context_t* mdctx = (mbedtls_md_context_t*)ctx;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (mdctx)
|
|
|
|
{
|
|
|
|
mbedtls_md_free(mdctx);
|
|
|
|
free(mdctx);
|
|
|
|
}
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2015-10-09 22:23:15 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2019-11-06 17:24:51 +03:00
|
|
|
BOOL winpr_Digest_Allow_FIPS(WINPR_MD_TYPE md, const BYTE* input, size_t ilen, BYTE* output,
|
|
|
|
size_t olen)
|
2017-04-08 00:54:08 +03:00
|
|
|
{
|
|
|
|
BOOL result = FALSE;
|
2017-11-17 14:41:18 +03:00
|
|
|
WINPR_DIGEST_CTX* ctx = winpr_Digest_New();
|
2017-04-08 00:54:08 +03:00
|
|
|
|
|
|
|
if (!ctx)
|
2017-04-10 22:03:39 +03:00
|
|
|
return FALSE;
|
2017-04-08 00:54:08 +03:00
|
|
|
|
2017-04-12 22:03:20 +03:00
|
|
|
if (!winpr_Digest_Init_Allow_FIPS(ctx, md))
|
2017-04-10 22:03:39 +03:00
|
|
|
goto out;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2017-04-10 22:03:39 +03:00
|
|
|
if (!winpr_Digest_Update(ctx, input, ilen))
|
|
|
|
goto out;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2017-04-10 22:03:39 +03:00
|
|
|
if (!winpr_Digest_Final(ctx, output, olen))
|
|
|
|
goto out;
|
2017-04-08 00:54:08 +03:00
|
|
|
|
2017-04-10 22:03:39 +03:00
|
|
|
result = TRUE;
|
2017-04-08 00:54:08 +03:00
|
|
|
out:
|
2017-04-10 22:03:39 +03:00
|
|
|
winpr_Digest_Free(ctx);
|
|
|
|
return result;
|
2017-04-08 00:54:08 +03:00
|
|
|
}
|
2017-04-10 22:03:39 +03:00
|
|
|
|
2018-02-14 14:44:12 +03:00
|
|
|
BOOL winpr_Digest(WINPR_MD_TYPE md, const BYTE* input, size_t ilen, BYTE* output, size_t olen)
|
2015-10-09 22:23:15 +03:00
|
|
|
{
|
2016-11-24 16:53:19 +03:00
|
|
|
BOOL result = FALSE;
|
2017-11-17 14:41:18 +03:00
|
|
|
WINPR_DIGEST_CTX* ctx = winpr_Digest_New();
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!ctx)
|
2016-02-24 23:45:09 +03:00
|
|
|
return FALSE;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
if (!winpr_Digest_Init(ctx, md))
|
|
|
|
goto out;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!winpr_Digest_Update(ctx, input, ilen))
|
2016-11-24 16:53:19 +03:00
|
|
|
goto out;
|
2017-11-17 14:41:18 +03:00
|
|
|
|
2016-11-21 19:28:54 +03:00
|
|
|
if (!winpr_Digest_Final(ctx, output, olen))
|
2016-11-24 16:53:19 +03:00
|
|
|
goto out;
|
2015-10-13 16:43:26 +03:00
|
|
|
|
2016-11-24 16:53:19 +03:00
|
|
|
result = TRUE;
|
|
|
|
out:
|
|
|
|
winpr_Digest_Free(ctx);
|
|
|
|
return result;
|
2015-10-09 22:23:15 +03:00
|
|
|
}
|