pbkdf-nettle.c 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130
  1. /*
  2. * QEMU Crypto PBKDF support (Password-Based Key Derivation Function)
  3. *
  4. * Copyright (c) 2015-2016 Red Hat, Inc.
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, see <http://www.gnu.org/licenses/>.
  18. *
  19. */
  20. #include "qemu/osdep.h"
  21. #include <nettle/pbkdf2.h>
  22. #include <nettle/hmac.h>
  23. #include "qapi/error.h"
  24. #include "crypto/pbkdf.h"
  25. bool qcrypto_pbkdf2_supports(QCryptoHashAlgo hash)
  26. {
  27. switch (hash) {
  28. case QCRYPTO_HASH_ALGO_SHA1:
  29. case QCRYPTO_HASH_ALGO_SHA224:
  30. case QCRYPTO_HASH_ALGO_SHA256:
  31. case QCRYPTO_HASH_ALGO_SHA384:
  32. case QCRYPTO_HASH_ALGO_SHA512:
  33. case QCRYPTO_HASH_ALGO_RIPEMD160:
  34. #ifdef CONFIG_CRYPTO_SM3
  35. case QCRYPTO_HASH_ALGO_SM3:
  36. #endif
  37. return true;
  38. default:
  39. return false;
  40. }
  41. }
  42. int qcrypto_pbkdf2(QCryptoHashAlgo hash,
  43. const uint8_t *key, size_t nkey,
  44. const uint8_t *salt, size_t nsalt,
  45. uint64_t iterations,
  46. uint8_t *out, size_t nout,
  47. Error **errp)
  48. {
  49. union {
  50. struct hmac_md5_ctx md5;
  51. struct hmac_sha1_ctx sha1;
  52. struct hmac_sha224_ctx sha224;
  53. struct hmac_sha256_ctx sha256;
  54. struct hmac_sha384_ctx sha384;
  55. struct hmac_sha512_ctx sha512;
  56. struct hmac_ripemd160_ctx ripemd160;
  57. #ifdef CONFIG_CRYPTO_SM3
  58. struct hmac_sm3_ctx sm3;
  59. #endif
  60. } ctx;
  61. if (iterations > UINT_MAX) {
  62. error_setg_errno(errp, ERANGE,
  63. "PBKDF iterations %llu must be less than %u",
  64. (long long unsigned)iterations, UINT_MAX);
  65. return -1;
  66. }
  67. switch (hash) {
  68. case QCRYPTO_HASH_ALGO_MD5:
  69. hmac_md5_set_key(&ctx.md5, nkey, key);
  70. PBKDF2(&ctx.md5, hmac_md5_update, hmac_md5_digest,
  71. MD5_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  72. break;
  73. case QCRYPTO_HASH_ALGO_SHA1:
  74. hmac_sha1_set_key(&ctx.sha1, nkey, key);
  75. PBKDF2(&ctx.sha1, hmac_sha1_update, hmac_sha1_digest,
  76. SHA1_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  77. break;
  78. case QCRYPTO_HASH_ALGO_SHA224:
  79. hmac_sha224_set_key(&ctx.sha224, nkey, key);
  80. PBKDF2(&ctx.sha224, hmac_sha224_update, hmac_sha224_digest,
  81. SHA224_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  82. break;
  83. case QCRYPTO_HASH_ALGO_SHA256:
  84. hmac_sha256_set_key(&ctx.sha256, nkey, key);
  85. PBKDF2(&ctx.sha256, hmac_sha256_update, hmac_sha256_digest,
  86. SHA256_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  87. break;
  88. case QCRYPTO_HASH_ALGO_SHA384:
  89. hmac_sha384_set_key(&ctx.sha384, nkey, key);
  90. PBKDF2(&ctx.sha384, hmac_sha384_update, hmac_sha384_digest,
  91. SHA384_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  92. break;
  93. case QCRYPTO_HASH_ALGO_SHA512:
  94. hmac_sha512_set_key(&ctx.sha512, nkey, key);
  95. PBKDF2(&ctx.sha512, hmac_sha512_update, hmac_sha512_digest,
  96. SHA512_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  97. break;
  98. case QCRYPTO_HASH_ALGO_RIPEMD160:
  99. hmac_ripemd160_set_key(&ctx.ripemd160, nkey, key);
  100. PBKDF2(&ctx.ripemd160, hmac_ripemd160_update, hmac_ripemd160_digest,
  101. RIPEMD160_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  102. break;
  103. #ifdef CONFIG_CRYPTO_SM3
  104. case QCRYPTO_HASH_ALGO_SM3:
  105. hmac_sm3_set_key(&ctx.sm3, nkey, key);
  106. PBKDF2(&ctx.sm3, hmac_sm3_update, hmac_sm3_digest,
  107. SM3_DIGEST_SIZE, iterations, nsalt, salt, nout, out);
  108. break;
  109. #endif
  110. default:
  111. error_setg_errno(errp, ENOSYS,
  112. "PBKDF does not support hash algorithm %s",
  113. QCryptoHashAlgo_str(hash));
  114. return -1;
  115. }
  116. return 0;
  117. }