1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
|
/*
* Copyright 2015-2018 Yubico AB
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "pkcs5.h"
#ifdef _WIN32_BCRYPT
#include <windows.h>
#include <bcrypt.h>
#else
#include <openssl/evp.h>
#endif
bool pkcs5_pbkdf2_hmac(const uint8_t *password, size_t cb_password,
const uint8_t *salt, size_t cb_salt, uint64_t iterations,
hash_t hash, uint8_t *key, size_t cb_key) {
bool res = false;
#ifdef _WIN32_BCRYPT
NTSTATUS status = 0;
LPCWSTR alg = NULL;
BCRYPT_ALG_HANDLE hAlg = 0;
if (!(alg = get_hash(hash))) {
goto cleanup;
}
if (!BCRYPT_SUCCESS(
status = BCryptOpenAlgorithmProvider(&hAlg, alg, NULL,
BCRYPT_ALG_HANDLE_HMAC_FLAG))) {
goto cleanup;
}
if (!BCRYPT_SUCCESS(
status =
BCryptDeriveKeyPBKDF2(hAlg, (PUCHAR) password, (ULONG) cb_password,
(PUCHAR) salt, (ULONG) cb_salt, iterations, key,
(ULONG) cb_key, 0))) {
goto cleanup;
}
res = true;
cleanup:
if (hAlg) {
BCryptCloseAlgorithmProvider(hAlg, 0);
}
#else
const EVP_MD *md = NULL;
if (!(md = get_hash(hash))) {
return false;
}
/* for some reason openssl always returns 1 for PBKDF2 */
if (1 != PKCS5_PBKDF2_HMAC((const char *) password, cb_password, salt,
cb_salt, iterations, md, cb_key, key)) {
return false;
}
res = true;
#endif
return res;
}
|