1 | /* |
2 | * Copyright (c) 2007-2015, Cameron Rich |
3 | * |
4 | * All rights reserved. |
5 | * |
6 | * Redistribution and use in source and binary forms, with or without |
7 | * modification, are permitted provided that the following conditions are met: |
8 | * |
9 | * * Redistributions of source code must retain the above copyright notice, |
10 | * this list of conditions and the following disclaimer. |
11 | * * Redistributions in binary form must reproduce the above copyright notice, |
12 | * this list of conditions and the following disclaimer in the documentation |
13 | * and/or other materials provided with the distribution. |
14 | * * Neither the name of the axTLS project nor the names of its contributors |
15 | * may be used to endorse or promote products derived from this software |
16 | * without specific prior written permission. |
17 | * |
18 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
19 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
20 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
21 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR |
22 | * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
23 | * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
24 | * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
25 | * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF |
26 | * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
27 | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
28 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
29 | */ |
30 | |
31 | /** |
32 | * Some misc. routines to help things out |
33 | */ |
34 | |
35 | #include <stdlib.h> |
36 | #include <string.h> |
37 | #include <stdarg.h> |
38 | #include <stdio.h> |
39 | #include "os_port.h" |
40 | #include "crypto_misc.h" |
41 | #ifdef CONFIG_WIN32_USE_CRYPTO_LIB |
42 | #include "wincrypt.h" |
43 | #endif |
44 | |
45 | #if !defined(WIN32) && defined(CONFIG_USE_DEV_URANDOM) |
46 | static int rng_fd = -1; |
47 | #elif defined(CONFIG_WIN32_USE_CRYPTO_LIB) |
48 | static HCRYPTPROV gCryptProv; |
49 | #endif |
50 | |
51 | #if (!defined(CONFIG_USE_DEV_URANDOM) && !defined(CONFIG_WIN32_USE_CRYPTO_LIB)) |
52 | /* change to processor registers as appropriate */ |
53 | #define ENTROPY_POOL_SIZE 32 |
54 | #define ENTROPY_COUNTER1 ((((uint64_t)tv.tv_sec)<<32) | tv.tv_usec) |
55 | #define ENTROPY_COUNTER2 rand() |
56 | static uint8_t entropy_pool[ENTROPY_POOL_SIZE]; |
57 | #endif |
58 | |
59 | const char * const unsupported_str = "Error: Feature not supported\n" ; |
60 | |
61 | #ifndef CONFIG_SSL_SKELETON_MODE |
62 | /** |
63 | * Retrieve a file and put it into memory |
64 | * @return The size of the file, or -1 on failure. |
65 | */ |
66 | int get_file(const char *filename, uint8_t **buf) |
67 | { |
68 | int total_bytes = 0; |
69 | int bytes_read = 0; |
70 | int filesize; |
71 | FILE *stream = fopen(filename, "rb" ); |
72 | |
73 | if (stream == NULL) |
74 | { |
75 | #ifdef CONFIG_SSL_FULL_MODE |
76 | printf("file '%s' does not exist\n" , filename); TTY_FLUSH(); |
77 | #endif |
78 | return -1; |
79 | } |
80 | |
81 | /* Win CE doesn't support stat() */ |
82 | fseek(stream, 0, SEEK_END); |
83 | filesize = ftell(stream); |
84 | *buf = (uint8_t *)malloc(filesize); |
85 | fseek(stream, 0, SEEK_SET); |
86 | |
87 | do |
88 | { |
89 | bytes_read = fread(*buf+total_bytes, 1, filesize-total_bytes, stream); |
90 | total_bytes += bytes_read; |
91 | } while (total_bytes < filesize && bytes_read > 0); |
92 | |
93 | fclose(stream); |
94 | return filesize; |
95 | } |
96 | #endif |
97 | |
98 | /** |
99 | * Initialise the Random Number Generator engine. |
100 | * - On Win32 use the platform SDK's crypto engine. |
101 | * - On Linux use /dev/urandom |
102 | * - If none of these work then use a custom RNG. |
103 | */ |
104 | EXP_FUNC void STDCALL RNG_initialize() |
105 | { |
106 | #if !defined(WIN32) && defined(CONFIG_USE_DEV_URANDOM) |
107 | rng_fd = open("/dev/urandom" , O_RDONLY); |
108 | #elif defined(WIN32) && defined(CONFIG_WIN32_USE_CRYPTO_LIB) |
109 | if (!CryptAcquireContext(&gCryptProv, |
110 | NULL, NULL, PROV_RSA_FULL, 0)) |
111 | { |
112 | if (GetLastError() == NTE_BAD_KEYSET && |
113 | !CryptAcquireContext(&gCryptProv, |
114 | NULL, |
115 | NULL, |
116 | PROV_RSA_FULL, |
117 | CRYPT_NEWKEYSET)) |
118 | { |
119 | printf("CryptoLib: %x\n" , unsupported_str, GetLastError()); |
120 | exit(1); |
121 | } |
122 | } |
123 | #elif !defined(__ets__) |
124 | /* start of with a stack to copy across */ |
125 | int i; |
126 | memcpy(entropy_pool, &i, ENTROPY_POOL_SIZE); |
127 | rand_r((unsigned int *)entropy_pool); |
128 | #endif |
129 | } |
130 | |
131 | /** |
132 | * If no /dev/urandom, then initialise the RNG with something interesting. |
133 | */ |
134 | EXP_FUNC void STDCALL RNG_custom_init(const uint8_t *seed_buf, int size) |
135 | { |
136 | #if defined(WIN32) || defined(CONFIG_WIN32_USE_CRYPTO_LIB) |
137 | int i; |
138 | |
139 | for (i = 0; i < ENTROPY_POOL_SIZE && i < size; i++) |
140 | entropy_pool[i] ^= seed_buf[i]; |
141 | #endif |
142 | } |
143 | |
144 | /** |
145 | * Terminate the RNG engine. |
146 | */ |
147 | EXP_FUNC void STDCALL RNG_terminate(void) |
148 | { |
149 | #if !defined(WIN32) && defined(CONFIG_USE_DEV_URANDOM) |
150 | close(rng_fd); |
151 | #elif defined(CONFIG_WIN32_USE_CRYPTO_LIB) |
152 | CryptReleaseContext(gCryptProv, 0); |
153 | #endif |
154 | } |
155 | |
156 | /** |
157 | * Set a series of bytes with a random number. Individual bytes can be 0 |
158 | */ |
159 | EXP_FUNC int STDCALL get_random(int num_rand_bytes, uint8_t *rand_data) |
160 | { |
161 | #ifdef __ets__ |
162 | // see http://esp8266-re.foogod.com/wiki/Random_Number_Generator |
163 | #define WDEV_HWRNG ((volatile uint32_t*)0x3ff20e44) |
164 | while (num_rand_bytes--) { |
165 | *rand_data++ = *WDEV_HWRNG; |
166 | } |
167 | #elif !defined(WIN32) && defined(CONFIG_USE_DEV_URANDOM) |
168 | /* use the Linux default - read from /dev/urandom */ |
169 | if (read(rng_fd, rand_data, num_rand_bytes) < 0) |
170 | return -1; |
171 | #elif defined(WIN32) && defined(CONFIG_WIN32_USE_CRYPTO_LIB) |
172 | /* use Microsoft Crypto Libraries */ |
173 | CryptGenRandom(gCryptProv, num_rand_bytes, rand_data); |
174 | #else /* nothing else to use, so use a custom RNG */ |
175 | /* The method we use when we've got nothing better. Use RC4, time |
176 | and a couple of random seeds to generate a random sequence */ |
177 | AES_CTX rng_ctx; |
178 | struct timeval tv; |
179 | MD5_CTX rng_digest_ctx; |
180 | uint8_t digest[MD5_SIZE]; |
181 | uint64_t *ep; |
182 | int i; |
183 | |
184 | /* A proper implementation would use counters etc for entropy */ |
185 | gettimeofday(&tv, NULL); |
186 | ep = (uint64_t *)entropy_pool; |
187 | ep[0] ^= ENTROPY_COUNTER1; |
188 | ep[1] ^= ENTROPY_COUNTER2; |
189 | |
190 | /* use a digested version of the entropy pool as a key */ |
191 | MD5_Init(&rng_digest_ctx); |
192 | MD5_Update(&rng_digest_ctx, entropy_pool, ENTROPY_POOL_SIZE); |
193 | MD5_Final(digest, &rng_digest_ctx); |
194 | |
195 | /* come up with the random sequence */ |
196 | AES_set_key(&rng_ctx, digest, (const uint8_t *)ep, AES_MODE_128); /* use as a key */ |
197 | memcpy(rand_data, entropy_pool, num_rand_bytes < ENTROPY_POOL_SIZE ? |
198 | num_rand_bytes : ENTROPY_POOL_SIZE); |
199 | AES_cbc_encrypt(&rng_ctx, rand_data, rand_data, num_rand_bytes); |
200 | |
201 | /* move things along */ |
202 | for (i = ENTROPY_POOL_SIZE-1; i >= MD5_SIZE ; i--) |
203 | entropy_pool[i] = entropy_pool[i-MD5_SIZE]; |
204 | |
205 | /* insert the digest at the start of the entropy pool */ |
206 | memcpy(entropy_pool, digest, MD5_SIZE); |
207 | #endif |
208 | return 0; |
209 | } |
210 | |
211 | /** |
212 | * Set a series of bytes with a random number. Individual bytes are not zero. |
213 | */ |
214 | int get_random_NZ(int num_rand_bytes, uint8_t *rand_data) |
215 | { |
216 | int i; |
217 | if (get_random(num_rand_bytes, rand_data)) |
218 | return -1; |
219 | |
220 | for (i = 0; i < num_rand_bytes; i++) |
221 | { |
222 | while (rand_data[i] == 0) /* can't be 0 */ |
223 | rand_data[i] = (uint8_t)(rand()); |
224 | } |
225 | |
226 | return 0; |
227 | } |
228 | |
229 | /** |
230 | * Some useful diagnostic routines |
231 | */ |
232 | #if defined(CONFIG_SSL_DIAGNOSTICS) || defined(CONFIG_DEBUG) |
233 | int hex_finish; |
234 | int hex_index; |
235 | |
236 | static void print_hex_init(int finish) |
237 | { |
238 | hex_finish = finish; |
239 | hex_index = 0; |
240 | } |
241 | |
242 | static void print_hex(uint8_t hex) |
243 | { |
244 | static int column; |
245 | |
246 | if (hex_index == 0) |
247 | { |
248 | column = 0; |
249 | } |
250 | |
251 | printf("%02x " , hex); |
252 | if (++column == 8) |
253 | { |
254 | printf(": " ); |
255 | } |
256 | else if (column >= 16) |
257 | { |
258 | printf("\n" ); |
259 | column = 0; |
260 | } |
261 | |
262 | if (++hex_index >= hex_finish && column > 0) |
263 | { |
264 | printf("\n" ); |
265 | } |
266 | } |
267 | |
268 | /** |
269 | * Spit out a blob of data for diagnostics. The data is is a nice column format |
270 | * for easy reading. |
271 | * |
272 | * @param format [in] The string (with possible embedded format characters) |
273 | * @param size [in] The number of numbers to print |
274 | * @param data [in] The start of data to use |
275 | * @param ... [in] Any additional arguments |
276 | */ |
277 | EXP_FUNC void STDCALL print_blob(const char *format, |
278 | const uint8_t *data, int size, ...) |
279 | { |
280 | int i; |
281 | char tmp[80]; |
282 | va_list(ap); |
283 | |
284 | va_start(ap, size); |
285 | snprintf(tmp, sizeof(tmp), "%s\n" , format); |
286 | vprintf(tmp, ap); |
287 | print_hex_init(size); |
288 | for (i = 0; i < size; i++) |
289 | { |
290 | print_hex(data[i]); |
291 | } |
292 | |
293 | va_end(ap); |
294 | TTY_FLUSH(); |
295 | } |
296 | #elif defined(WIN32) |
297 | /* VC6.0 doesn't handle variadic macros */ |
298 | EXP_FUNC void STDCALL print_blob(const char *format, const unsigned char *data, |
299 | int size, ...) {} |
300 | #endif |
301 | |
302 | #if defined(CONFIG_SSL_HAS_PEM) || defined(CONFIG_HTTP_HAS_AUTHORIZATION) |
303 | /* base64 to binary lookup table */ |
304 | static const uint8_t map[128] = |
305 | { |
306 | 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, |
307 | 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, |
308 | 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, |
309 | 255, 255, 255, 255, 255, 255, 255, 62, 255, 255, 255, 63, |
310 | 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 255, 255, |
311 | 255, 254, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, |
312 | 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, |
313 | 19, 20, 21, 22, 23, 24, 25, 255, 255, 255, 255, 255, |
314 | 255, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, |
315 | 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, |
316 | 49, 50, 51, 255, 255, 255, 255, 255 |
317 | }; |
318 | |
319 | EXP_FUNC int STDCALL base64_decode(const char *in, int len, |
320 | uint8_t *out, int *outlen) |
321 | { |
322 | int g, t, x, y, z; |
323 | uint8_t c; |
324 | int ret = -1; |
325 | |
326 | g = 3; |
327 | for (x = y = z = t = 0; x < len; x++) |
328 | { |
329 | if ((c = map[in[x]&0x7F]) == 0xff) |
330 | continue; |
331 | |
332 | if (c == 254) /* this is the end... */ |
333 | { |
334 | c = 0; |
335 | |
336 | if (--g < 0) |
337 | goto error; |
338 | } |
339 | else if (g != 3) /* only allow = at end */ |
340 | goto error; |
341 | |
342 | t = (t<<6) | c; |
343 | |
344 | if (++y == 4) |
345 | { |
346 | out[z++] = (uint8_t)((t>>16)&255); |
347 | |
348 | if (g > 1) |
349 | out[z++] = (uint8_t)((t>>8)&255); |
350 | |
351 | if (g > 2) |
352 | out[z++] = (uint8_t)(t&255); |
353 | |
354 | y = t = 0; |
355 | } |
356 | |
357 | /* check that we don't go past the output buffer */ |
358 | if (z > *outlen) |
359 | goto error; |
360 | } |
361 | |
362 | if (y != 0) |
363 | goto error; |
364 | |
365 | *outlen = z; |
366 | ret = 0; |
367 | |
368 | error: |
369 | #ifdef CONFIG_SSL_FULL_MODE |
370 | if (ret < 0) |
371 | printf("Error: Invalid base64\n" ); TTY_FLUSH(); |
372 | #endif |
373 | TTY_FLUSH(); |
374 | return ret; |
375 | |
376 | } |
377 | #endif |
378 | |
379 | |