mirror of
				https://github.com/postgres/postgres.git
				synced 2025-10-29 22:49:41 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			303 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			303 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * pgp-s2k.c
 | |
|  *	  OpenPGP string2key functions.
 | |
|  *
 | |
|  * Copyright (c) 2005 Marko Kreen
 | |
|  * All rights reserved.
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without
 | |
|  * modification, are permitted provided that the following conditions
 | |
|  * are met:
 | |
|  * 1. Redistributions of source code must retain the above copyright
 | |
|  *	  notice, this list of conditions and the following disclaimer.
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright
 | |
|  *	  notice, this list of conditions and the following disclaimer in the
 | |
|  *	  documentation and/or other materials provided with the distribution.
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | |
|  * ARE DISCLAIMED.	IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | |
|  * SUCH DAMAGE.
 | |
|  *
 | |
|  * $PostgreSQL: pgsql/contrib/pgcrypto/pgp-s2k.c,v 1.4 2005/10/15 02:49:06 momjian Exp $
 | |
|  */
 | |
| 
 | |
| #include "postgres.h"
 | |
| 
 | |
| #include "px.h"
 | |
| #include "mbuf.h"
 | |
| #include "pgp.h"
 | |
| 
 | |
| static int
 | |
| calc_s2k_simple(PGP_S2K * s2k, PX_MD * md, const uint8 *key,
 | |
| 				unsigned key_len)
 | |
| {
 | |
| 	unsigned	md_bs,
 | |
| 				md_rlen;
 | |
| 	uint8		buf[PGP_MAX_DIGEST];
 | |
| 	unsigned	preload;
 | |
| 	unsigned	remain;
 | |
| 	uint8	   *dst = s2k->key;
 | |
| 
 | |
| 	md_bs = px_md_block_size(md);
 | |
| 	md_rlen = px_md_result_size(md);
 | |
| 
 | |
| 	remain = s2k->key_len;
 | |
| 	preload = 0;
 | |
| 	while (remain > 0)
 | |
| 	{
 | |
| 		px_md_reset(md);
 | |
| 
 | |
| 		if (preload)
 | |
| 		{
 | |
| 			memset(buf, 0, preload);
 | |
| 			px_md_update(md, buf, preload);
 | |
| 		}
 | |
| 		preload++;
 | |
| 
 | |
| 		px_md_update(md, key, key_len);
 | |
| 		px_md_finish(md, buf);
 | |
| 
 | |
| 		if (remain > md_rlen)
 | |
| 		{
 | |
| 			memcpy(dst, buf, md_rlen);
 | |
| 			dst += md_rlen;
 | |
| 			remain -= md_rlen;
 | |
| 		}
 | |
| 		else
 | |
| 		{
 | |
| 			memcpy(dst, buf, remain);
 | |
| 			remain = 0;
 | |
| 		}
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| calc_s2k_salted(PGP_S2K * s2k, PX_MD * md, const uint8 *key, unsigned key_len)
 | |
| {
 | |
| 	unsigned	md_bs,
 | |
| 				md_rlen;
 | |
| 	uint8		buf[PGP_MAX_DIGEST];
 | |
| 	unsigned	preload = 0;
 | |
| 	uint8	   *dst;
 | |
| 	unsigned	remain;
 | |
| 
 | |
| 	md_bs = px_md_block_size(md);
 | |
| 	md_rlen = px_md_result_size(md);
 | |
| 
 | |
| 	dst = s2k->key;
 | |
| 	remain = s2k->key_len;
 | |
| 	while (remain > 0)
 | |
| 	{
 | |
| 		px_md_reset(md);
 | |
| 
 | |
| 		if (preload > 0)
 | |
| 		{
 | |
| 			memset(buf, 0, preload);
 | |
| 			px_md_update(md, buf, preload);
 | |
| 		}
 | |
| 		preload++;
 | |
| 
 | |
| 		px_md_update(md, s2k->salt, PGP_S2K_SALT);
 | |
| 		px_md_update(md, key, key_len);
 | |
| 		px_md_finish(md, buf);
 | |
| 
 | |
| 		if (remain > md_rlen)
 | |
| 		{
 | |
| 			memcpy(dst, buf, md_rlen);
 | |
| 			remain -= md_rlen;
 | |
| 			dst += md_rlen;
 | |
| 		}
 | |
| 		else
 | |
| 		{
 | |
| 			memcpy(dst, buf, remain);
 | |
| 			remain = 0;
 | |
| 		}
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| calc_s2k_iter_salted(PGP_S2K * s2k, PX_MD * md, const uint8 *key,
 | |
| 					 unsigned key_len)
 | |
| {
 | |
| 	unsigned	md_bs,
 | |
| 				md_rlen;
 | |
| 	uint8		buf[PGP_MAX_DIGEST];
 | |
| 	uint8	   *dst;
 | |
| 	unsigned	preload = 0;
 | |
| 	unsigned	remain,
 | |
| 				c,
 | |
| 				cval,
 | |
| 				curcnt,
 | |
| 				count;
 | |
| 
 | |
| 	cval = s2k->iter;
 | |
| 	count = ((unsigned) 16 + (cval & 15)) << ((cval >> 4) + 6);
 | |
| 
 | |
| 	md_bs = px_md_block_size(md);
 | |
| 	md_rlen = px_md_result_size(md);
 | |
| 
 | |
| 	remain = s2k->key_len;
 | |
| 	dst = s2k->key;
 | |
| 	while (remain > 0)
 | |
| 	{
 | |
| 		px_md_reset(md);
 | |
| 
 | |
| 		if (preload)
 | |
| 		{
 | |
| 			memset(buf, 0, preload);
 | |
| 			px_md_update(md, buf, preload);
 | |
| 		}
 | |
| 		preload++;
 | |
| 
 | |
| 		px_md_update(md, s2k->salt, PGP_S2K_SALT);
 | |
| 		px_md_update(md, key, key_len);
 | |
| 		curcnt = PGP_S2K_SALT + key_len;
 | |
| 
 | |
| 		while (curcnt < count)
 | |
| 		{
 | |
| 			if (curcnt + PGP_S2K_SALT < count)
 | |
| 				c = PGP_S2K_SALT;
 | |
| 			else
 | |
| 				c = count - curcnt;
 | |
| 			px_md_update(md, s2k->salt, c);
 | |
| 			curcnt += c;
 | |
| 
 | |
| 			if (curcnt + key_len < count)
 | |
| 				c = key_len;
 | |
| 			else if (curcnt < count)
 | |
| 				c = count - curcnt;
 | |
| 			else
 | |
| 				break;
 | |
| 			px_md_update(md, key, c);
 | |
| 			curcnt += c;
 | |
| 		}
 | |
| 		px_md_finish(md, buf);
 | |
| 
 | |
| 		if (remain > md_rlen)
 | |
| 		{
 | |
| 			memcpy(dst, buf, md_rlen);
 | |
| 			remain -= md_rlen;
 | |
| 			dst += md_rlen;
 | |
| 		}
 | |
| 		else
 | |
| 		{
 | |
| 			memcpy(dst, buf, remain);
 | |
| 			remain = 0;
 | |
| 		}
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * Decide S2K_ISALTED iteration count
 | |
|  *
 | |
|  * Too small: weak
 | |
|  * Too big: slow
 | |
|  * gpg defaults to 96 => 65536 iters
 | |
|  * let it float a bit: 96 + 32 => 262144 iters
 | |
|  */
 | |
| static int
 | |
| decide_count(unsigned rand_byte)
 | |
| {
 | |
| 	return 96 + (rand_byte & 0x1F);
 | |
| }
 | |
| 
 | |
| int
 | |
| pgp_s2k_fill(PGP_S2K * s2k, int mode, int digest_algo)
 | |
| {
 | |
| 	int			res = 0;
 | |
| 	uint8		tmp;
 | |
| 
 | |
| 	s2k->mode = mode;
 | |
| 	s2k->digest_algo = digest_algo;
 | |
| 
 | |
| 	switch (s2k->mode)
 | |
| 	{
 | |
| 		case 0:
 | |
| 			break;
 | |
| 		case 1:
 | |
| 			res = px_get_pseudo_random_bytes(s2k->salt, PGP_S2K_SALT);
 | |
| 			break;
 | |
| 		case 3:
 | |
| 			res = px_get_pseudo_random_bytes(s2k->salt, PGP_S2K_SALT);
 | |
| 			if (res < 0)
 | |
| 				break;
 | |
| 			res = px_get_pseudo_random_bytes(&tmp, 1);
 | |
| 			if (res < 0)
 | |
| 				break;
 | |
| 			s2k->iter = decide_count(tmp);
 | |
| 			break;
 | |
| 		default:
 | |
| 			res = PXE_PGP_BAD_S2K_MODE;
 | |
| 	}
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| int
 | |
| pgp_s2k_read(PullFilter * src, PGP_S2K * s2k)
 | |
| {
 | |
| 	int			res = 0;
 | |
| 
 | |
| 	GETBYTE(src, s2k->mode);
 | |
| 	GETBYTE(src, s2k->digest_algo);
 | |
| 	switch (s2k->mode)
 | |
| 	{
 | |
| 		case 0:
 | |
| 			break;
 | |
| 		case 1:
 | |
| 			res = pullf_read_fixed(src, 8, s2k->salt);
 | |
| 			break;
 | |
| 		case 3:
 | |
| 			res = pullf_read_fixed(src, 8, s2k->salt);
 | |
| 			if (res < 0)
 | |
| 				break;
 | |
| 			GETBYTE(src, s2k->iter);
 | |
| 			break;
 | |
| 		default:
 | |
| 			res = PXE_PGP_BAD_S2K_MODE;
 | |
| 	}
 | |
| 	return res;
 | |
| }
 | |
| 
 | |
| int
 | |
| pgp_s2k_process(PGP_S2K * s2k, int cipher, const uint8 *key, int key_len)
 | |
| {
 | |
| 	int			res;
 | |
| 	PX_MD	   *md;
 | |
| 
 | |
| 	s2k->key_len = pgp_get_cipher_key_size(cipher);
 | |
| 	if (s2k->key_len <= 0)
 | |
| 		return PXE_PGP_UNSUPPORTED_CIPHER;
 | |
| 
 | |
| 	res = pgp_load_digest(s2k->digest_algo, &md);
 | |
| 	if (res < 0)
 | |
| 		return res;
 | |
| 
 | |
| 	switch (s2k->mode)
 | |
| 	{
 | |
| 		case 0:
 | |
| 			res = calc_s2k_simple(s2k, md, key, key_len);
 | |
| 			break;
 | |
| 		case 1:
 | |
| 			res = calc_s2k_salted(s2k, md, key, key_len);
 | |
| 			break;
 | |
| 		case 3:
 | |
| 			res = calc_s2k_iter_salted(s2k, md, key, key_len);
 | |
| 			break;
 | |
| 		default:
 | |
| 			res = PXE_PGP_BAD_S2K_MODE;
 | |
| 	}
 | |
| 	px_md_free(md);
 | |
| 	return res;
 | |
| }
 |