- Microsoft's HMAC had problems with secrets longer than 16B, therefore we implemented our own

- Key generation finished
- Additional memory sanitization
This commit is contained in:
Simon Rozman 2016-08-10 16:10:40 +02:00
parent fb0fa0de31
commit 6b4f597f27
2 changed files with 286 additions and 157 deletions

View File

@ -260,7 +260,8 @@ namespace eap
/// ///
/// \sa [The Transport Layer Security (TLS) Protocol Version 1.2 (8.1. Computing the Master Secret)](https://tools.ietf.org/html/rfc5246#section-8.1) /// \sa [The Transport Layer Security (TLS) Protocol Version 1.2 (8.1. Computing the Master Secret)](https://tools.ietf.org/html/rfc5246#section-8.1)
/// ///
struct master_secret { struct master_secret
{
unsigned char data[48]; unsigned char data[48];
/// ///
@ -305,6 +306,93 @@ namespace eap
}; };
#pragma pack(pop) #pragma pack(pop)
///
/// Our own implementation of HMAC hashing
/// Microsoft's implementation ([MSDN](https://msdn.microsoft.com/en-us/library/windows/desktop/aa382379.aspx)) is flaky.
///
/// \sa [HMAC: Keyed-Hashing for Message Authentication](https://tools.ietf.org/html/rfc2104)
///
class hash_hmac
{
public:
///
/// Construct new HMAC hashing object
///
/// \param[in] cp Handle of the cryptographics provider
/// \param[in] alg Hashing algorithm
/// \param[in] secret HMAC secret
/// \param[in] size_secret \p secret size
///
hash_hmac(
_In_ HCRYPTPROV hProv,
_In_ ALG_ID alg,
_In_bytecount_(size_secret ) const void *secret,
_In_ size_t size_secret);
///
/// Construct new HMAC hashing object using already prepared inner padding
///
/// \param[in] cp Handle of the cryptographics provider
/// \param[in] alg Hashing algorithm
/// \param[in] padding HMAC secret XOR inner padding
///
hash_hmac(
_In_ HCRYPTPROV hProv,
_In_ ALG_ID alg,
_In_ const unsigned char padding[64]);
///
/// Provides access to inner hash object to hash data at will.
///
/// \returns Inner hashing object handle
///
inline operator HCRYPTHASH()
{
return m_hash_inner;
}
///
/// Completes hashing and returns hashed data.
///
/// \param[out] val Calculated hash value
///
template<class _Ty, class _Ax>
inline void calculate(_Out_ std::vector<_Ty, _Ax> &val)
{
// Calculate inner hash.
if (!CryptGetHashParam(m_hash_inner, HP_HASHVAL, val, 0))
throw win_runtime_error(__FUNCTION__ " Error calculating inner hash.");
// Hash inner hash with outer hash.
if (!CryptHashData(m_hash_outer, (const BYTE*)val.data(), (DWORD)(val.size() * sizeof(_Ty)), 0))
throw win_runtime_error(__FUNCTION__ " Error hashing inner hash.");
// Calculate outer hash.
if (!CryptGetHashParam(m_hash_outer, HP_HASHVAL, val, 0))
throw win_runtime_error(__FUNCTION__ " Error calculating outer hash.");
}
///
/// Helper method to pre-derive inner padding for frequent reuse
///
/// \param[in] cp Handle of the cryptographics provider
/// \param[in] alg Hashing algorithm
/// \param[in] secret HMAC secret
/// \param[in] size_secret \p secret size
/// \param[out] padding HMAC secret XOR inner padding
///
static void inner_padding(
_In_ HCRYPTPROV hProv,
_In_ ALG_ID alg,
_In_bytecount_(size_secret ) const void *secret,
_In_ size_t size_secret,
_Out_ unsigned char padding[64]);
protected:
winstd::crypt_hash m_hash_inner; ///< Inner hashing object
winstd::crypt_hash m_hash_outer; ///< Outer hashing object
};
public: public:
/// ///
/// Constructs an EAP method /// Constructs an EAP method
@ -535,29 +623,7 @@ namespace eap
/// ///
/// \returns Generated pseudo-random data (\p size bytes) /// \returns Generated pseudo-random data (\p size bytes)
/// ///
std::vector<unsigned char> prf( sanitizing_blob prf(
_In_bytecount_(size_secret ) const void *secret,
_In_ size_t size_secret,
_In_bytecount_(size_lblseed) const void *lblseed,
_In_ size_t size_lblseed,
_In_ size_t size);
///
/// Calculates pseudo-random P_hash data defined in RFC 5246
///
/// \sa [The Transport Layer Security (TLS) Protocol Version 1.2 (Chapter 5: HMAC and the Pseudorandom Function)](https://tools.ietf.org/html/rfc5246#section-5)
///
/// \param[in] alg Hashing algorithm to use (CALG_MD5 or CALG_SHA1)
/// \param[in] secret Hashing secret key
/// \param[in] size_secret \p secret size
/// \param[in] seed Hashing seed
/// \param[in] size_seed \p seed size
/// \param[in] size Minimum number of bytes of pseudo-random data required
///
/// \returns Generated pseudo-random data (\p size or longer)
///
std::vector<unsigned char> p_hash(
_In_ ALG_ID alg,
_In_bytecount_(size_secret) const void *secret, _In_bytecount_(size_secret) const void *secret,
_In_ size_t size_secret, _In_ size_t size_secret,
_In_bytecount_(size_seed) const void *seed, _In_bytecount_(size_seed) const void *seed,
@ -565,31 +631,38 @@ namespace eap
_In_ size_t size); _In_ size_t size);
/// ///
/// Creates HMAC key /// Creates a key
/// ///
/// \param[in] secret Hashing secret /// \param[in] alg Key algorithm
/// \param[in] secret Raw key data
/// \param[in] size_secret \p secret size /// \param[in] size_secret \p secret size
/// ///
/// \returns Key /// \returns Key
/// ///
inline HCRYPTKEY create_hmac_key( inline HCRYPTKEY create_key(
_In_ ALG_ID alg,
_In_bytecount_(size_secret) const void *secret, _In_bytecount_(size_secret) const void *secret,
_In_ size_t size_secret) _In_ size_t size_secret)
{ {
assert(size_secret <= 0xffffffff);
// Prepare exported key BLOB. // Prepare exported key BLOB.
static const PUBLICKEYSTRUC s_key_data_struct = { struct key_blob_prefix {
PUBLICKEYSTRUC header;
DWORD size;
} const prefix = {
{
PLAINTEXTKEYBLOB, PLAINTEXTKEYBLOB,
CUR_BLOB_VERSION, CUR_BLOB_VERSION,
0, 0,
CALG_RC4, alg,
},
(DWORD)size_secret,
}; };
std::vector<unsigned char> key_blob; sanitizing_blob key_blob;
key_blob.reserve(sizeof(PUBLICKEYSTRUC) + sizeof(DWORD) + size_secret); key_blob.reserve(sizeof(key_blob_prefix) + size_secret);
key_blob.assign((const unsigned char*)&s_key_data_struct, (const unsigned char*)(&s_key_data_struct + 1)); key_blob.assign((const unsigned char*)&prefix, (const unsigned char*)(&prefix + 1));
assert(size_secret <= 0xffffffff); key_blob.insert(key_blob.end(), (const unsigned char*)secret, (const unsigned char*)secret + size_secret);
DWORD _size_secret = (DWORD)size_secret;
key_blob.insert(key_blob.end(), (const unsigned char*)&_size_secret, (const unsigned char*)(&_size_secret + 1));
key_blob.insert(key_blob.end(), (const unsigned char*)secret, (const unsigned char*)secret + _size_secret);
// Import the key. // Import the key.
winstd::crypt_key key; winstd::crypt_key key;
@ -598,26 +671,6 @@ namespace eap
return key.detach(); return key.detach();
} }
///
/// Creates HMAC hash
///
/// \param[in] key HMAC key
/// \param[in] info Additional HMAC parameters
///
/// \returns Hash
///
inline HCRYPTHASH create_hmac_hash(
_In_ HCRYPTKEY key,
_In_ const HMAC_INFO info)
{
winstd::crypt_hash hash;
if (!hash.create(m_cp, CALG_HMAC, key, 0))
throw winstd::win_runtime_error(__FUNCTION__ " Error creating HMAC hash.");
if (!CryptSetHashParam(hash, HP_HMAC_INFO, (const BYTE*)&info, 0))
throw winstd::win_runtime_error(__FUNCTION__ " Error setting HMAC hash parameters.");
return hash.detach();
}
public: public:
config_method_tls &m_cfg; ///< EAP-TLS method configuration config_method_tls &m_cfg; ///< EAP-TLS method configuration
credentials_tls &m_cred; ///< EAP-TLS user credentials credentials_tls &m_cred; ///< EAP-TLS user credentials
@ -633,9 +686,9 @@ namespace eap
packet m_packet_res; ///< Response packet packet m_packet_res; ///< Response packet
winstd::crypt_prov m_cp; ///< Cryptography provider winstd::crypt_prov m_cp; ///< Cryptography provider
winstd::crypt_key m_key_hmac; ///< Symmetric key for HMAC calculation sanitizing_blob m_padding_hmac_client; ///< Padding (key) for HMAC calculation
winstd::crypt_key m_key_encrypt; ///< Key for encrypting messages winstd::crypt_key m_key_client; ///< Key for encrypting messages
winstd::crypt_key m_key_decrypt; ///< Key for decrypting messages winstd::crypt_key m_key_server; ///< Key for decrypting messages
random m_random_client; ///< Client random random m_random_client; ///< Client random
random m_random_server; ///< Server random random m_random_server; ///< Server random

View File

@ -178,6 +178,79 @@ void eap::method_tls::master_secret::clear()
} }
//////////////////////////////////////////////////////////////////////
// eap::method_tls::hash_hmac
//////////////////////////////////////////////////////////////////////
eap::method_tls::hash_hmac::hash_hmac(
_In_ HCRYPTPROV hProv,
_In_ ALG_ID alg,
_In_bytecount_(size_secret ) const void *secret,
_In_ size_t size_secret)
{
// Prepare padding.
sanitizing_blob padding(64);
inner_padding(hProv, alg, secret, size_secret, padding.data());
// Continue with the other constructor.
this->hash_hmac::hash_hmac(hProv, alg, padding.data());
}
eap::method_tls::hash_hmac::hash_hmac(
_In_ HCRYPTPROV hProv,
_In_ ALG_ID alg,
_In_ const unsigned char padding[64])
{
// Create inner hash.
if (!m_hash_inner.create(hProv, alg))
throw win_runtime_error(__FUNCTION__ " Error creating inner hash.");
// Initialize it with the inner padding.
if (!CryptHashData(m_hash_inner, padding, 64, 0))
throw win_runtime_error(__FUNCTION__ " Error hashing secret XOR inner padding.");
// Convert inner padding to outer padding for final calculation.
unsigned char padding_out[64];
for (size_t i = 0; i < 64; i++)
padding_out[i] = padding[i] ^ (0x36 ^ 0x5c);
// Create outer hash.
if (!m_hash_outer.create(hProv, alg))
throw win_runtime_error(__FUNCTION__ " Error creating outer hash.");
// Initialize it with the outer padding.
if (!CryptHashData(m_hash_outer, padding_out, 64, 0))
throw win_runtime_error(__FUNCTION__ " Error hashing secret XOR inner padding.");
}
void eap::method_tls::hash_hmac::inner_padding(
_In_ HCRYPTPROV hProv,
_In_ ALG_ID alg,
_In_bytecount_(size_secret ) const void *secret,
_In_ size_t size_secret,
_Out_ unsigned char padding[64])
{
if (size_secret > 64) {
// If the secret is longer than padding, use secret's hash instead.
crypt_hash hash;
if (!hash.create(hProv, alg))
throw win_runtime_error(__FUNCTION__ " Error creating hash.");
if (!CryptHashData(hash, (const BYTE*)secret, (DWORD)size_secret, 0))
throw win_runtime_error(__FUNCTION__ " Error hashing.");
DWORD size_hash = 64;
if (!CryptGetHashParam(hash, HP_HASHVAL, padding, &size_hash, 0))
throw win_runtime_error(__FUNCTION__ " Error finishing hash.");
size_secret = size_hash;
} else
memcpy(padding, secret, size_secret);
for (size_t i = 0; i < size_secret; i++)
padding[i] ^= 0x36;
memset(padding + size_secret, 0x36, 64 - size_secret);
}
////////////////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////////////////
// eap::method_tls // eap::method_tls
////////////////////////////////////////////////////////////////////// //////////////////////////////////////////////////////////////////////
@ -378,9 +451,9 @@ void eap::method_tls::process_request_packet(
// This is the TLS start message: initialize method. // This is the TLS start message: initialize method.
m_phase = phase_client_hello; m_phase = phase_client_hello;
m_packet_res.clear(); m_packet_res.clear();
m_key_hmac.free(); m_padding_hmac_client.clear();
m_key_encrypt.free(); m_key_client.free();
m_key_decrypt.free(); m_key_server.free();
// Generate client randomness. // Generate client randomness.
_time32(&m_random_client.time); _time32(&m_random_client.time);
@ -482,7 +555,7 @@ void eap::method_tls::process_request_packet(
throw win_runtime_error(__FUNCTION__ " Error encrypting PMS."); throw win_runtime_error(__FUNCTION__ " Error encrypting PMS.");
// Derive master secret. // Derive master secret.
vector<unsigned char> lblseed, hash; sanitizing_blob lblseed;
const unsigned char s_label[] = "master secret"; const unsigned char s_label[] = "master secret";
lblseed.assign(s_label, s_label + _countof(s_label) - 1); lblseed.assign(s_label, s_label + _countof(s_label) - 1);
lblseed.insert(lblseed.end(), (const unsigned char*)&m_random_client, (const unsigned char*)(&m_random_client + 1)); lblseed.insert(lblseed.end(), (const unsigned char*)&m_random_client, (const unsigned char*)(&m_random_client + 1));
@ -743,7 +816,7 @@ eap::sanitizing_blob eap::method_tls::make_finished()
msg.insert(msg.end(), (unsigned char*)&ssl_header, (unsigned char*)(&ssl_header + 1)); msg.insert(msg.end(), (unsigned char*)&ssl_header, (unsigned char*)(&ssl_header + 1));
// Create label + hash MD5 + hash SHA-1 seed. // Create label + hash MD5 + hash SHA-1 seed.
vector<unsigned char> lblseed, hash; sanitizing_blob lblseed, hash;
const unsigned char s_label[] = "client finished"; const unsigned char s_label[] = "client finished";
lblseed.assign(s_label, s_label + _countof(s_label) - 1); lblseed.assign(s_label, s_label + _countof(s_label) - 1);
if (!CryptGetHashParam(m_hash_handshake_msgs_md5, HP_HASHVAL, hash, 0)) if (!CryptGetHashParam(m_hash_handshake_msgs_md5, HP_HASHVAL, hash, 0))
@ -752,7 +825,7 @@ eap::sanitizing_blob eap::method_tls::make_finished()
if (!CryptGetHashParam(m_hash_handshake_msgs_sha1, HP_HASHVAL, hash, 0)) if (!CryptGetHashParam(m_hash_handshake_msgs_sha1, HP_HASHVAL, hash, 0))
throw win_runtime_error(__FUNCTION__ " Error finishing SHA-1 hash calculation."); throw win_runtime_error(__FUNCTION__ " Error finishing SHA-1 hash calculation.");
lblseed.insert(lblseed.end(), hash.begin(), hash.end()); lblseed.insert(lblseed.end(), hash.begin(), hash.end());
vector<unsigned char> verify(prf(&m_master_secret, sizeof(m_master_secret), lblseed.data(), lblseed.size(), 12)); sanitizing_blob verify(prf(&m_master_secret, sizeof(m_master_secret), lblseed.data(), lblseed.size(), 12));
msg.insert(msg.end(), verify.begin(), verify.end()); msg.insert(msg.end(), verify.begin(), verify.end());
return msg; return msg;
@ -788,32 +861,44 @@ eap::sanitizing_blob eap::method_tls::make_handshake(_In_ const sanitizing_blob
void eap::method_tls::derive_keys() void eap::method_tls::derive_keys()
{ {
vector<unsigned char> lblseed; sanitizing_blob lblseed;
const unsigned char s_label[] = "key expansion"; const unsigned char s_label[] = "key expansion";
lblseed.assign(s_label, s_label + _countof(s_label) - 1); lblseed.assign(s_label, s_label + _countof(s_label) - 1);
lblseed.insert(lblseed.end(), (const unsigned char*)&m_random_server, (const unsigned char*)(&m_random_server + 1)); lblseed.insert(lblseed.end(), (const unsigned char*)&m_random_server, (const unsigned char*)(&m_random_server + 1));
lblseed.insert(lblseed.end(), (const unsigned char*)&m_random_client, (const unsigned char*)(&m_random_client + 1)); lblseed.insert(lblseed.end(), (const unsigned char*)&m_random_client, (const unsigned char*)(&m_random_client + 1));
vector<unsigned char> key_block(prf(&m_master_secret, sizeof(m_master_secret), lblseed.data(), lblseed.size(), sanitizing_blob key_block(prf(&m_master_secret, sizeof(m_master_secret), lblseed.data(), lblseed.size(),
2*20 + // client_write_MAC_secret & server_write_MAC_secret (SHA1) 2*20 + // client_write_MAC_secret & server_write_MAC_secret (SHA1)
2*24 + // client_write_key & server_write_key (3DES) 2*24 + // client_write_key & server_write_key (3DES)
2* 8)); // client_write_IV & server_write_IV 2* 8)); // client_write_IV & server_write_IV
const unsigned char *_key_block = key_block.data();
const unsigned char *data = key_block.data(); // client_write_MAC_secret
static const BLOBHEADER s_key_struct = { m_padding_hmac_client.resize(64);
OPAQUEKEYBLOB, hash_hmac::inner_padding(m_cp, CALG_SHA1, _key_block, 20, m_padding_hmac_client.data());
CUR_BLOB_VERSION, _key_block += 20;
0,
CALG_RC4
};
vector<unsigned char> key;
key.assign((const unsigned char*)&s_key_struct, (const unsigned char*)(&s_key_struct + 1));
key.insert(key.end(), data, data + 20);
if (!m_key_hmac.import(m_cp, key.data(), (DWORD)key.size(), NULL, 0))
throw win_runtime_error(__FUNCTION__ " Error importing client_write_MAC_secret key.");
// server_write_MAC_secret
// Skip!
_key_block += 20;
// TODO: Derive rest of the keys. // client_write_key
m_key_client = create_key(CALG_3DES, _key_block, 24);
_key_block += 24;
// server_write_key
m_key_server = create_key(CALG_3DES, _key_block, 24);
_key_block += 24;
// client_write_IV
if (!CryptSetKeyParam(m_key_client, KP_IV, _key_block, 0))
throw win_runtime_error(__FUNCTION__ " Error setting client_write_IV.");
_key_block += 8;
// server_write_IV
if (!CryptSetKeyParam(m_key_server, KP_IV, _key_block, 0))
throw win_runtime_error(__FUNCTION__ " Error setting server_write_IV.");
_key_block += 8;
} }
@ -960,7 +1045,7 @@ void eap::method_tls::process_handshake(_In_bytecount_(msg_size) const void *_ms
throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Finished record size incorrect (expected 12B, received %uB).", rec_end - rec)); throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Finished record size incorrect (expected 12B, received %uB).", rec_end - rec));
// Create label + hash MD5 + hash SHA-1 seed. // Create label + hash MD5 + hash SHA-1 seed.
vector<unsigned char> lblseed, hash; sanitizing_blob lblseed, hash;
const unsigned char s_label[] = "server finished"; const unsigned char s_label[] = "server finished";
lblseed.assign(s_label, s_label + _countof(s_label) - 1); lblseed.assign(s_label, s_label + _countof(s_label) - 1);
if (!CryptGetHashParam(m_hash_handshake_msgs_md5, HP_HASHVAL, hash, 0)) if (!CryptGetHashParam(m_hash_handshake_msgs_md5, HP_HASHVAL, hash, 0))
@ -1095,8 +1180,7 @@ void eap::method_tls::verify_server_trust()
void eap::method_tls::encrypt_message(_Inout_ sanitizing_blob &msg) void eap::method_tls::encrypt_message(_Inout_ sanitizing_blob &msg)
{ {
// Create a HMAC hash. // Create a HMAC hash.
static const HMAC_INFO s_hmac_info = { CALG_SHA1 }; hash_hmac hash_hmac(m_cp, CALG_SHA1, m_padding_hmac_client.data());
crypt_hash hash_hmac(create_hmac_hash(m_key_hmac, s_hmac_info));
// Hash sequence number and message. // Hash sequence number and message.
unsigned __int64 seq_num = htonll(m_seq_num); unsigned __int64 seq_num = htonll(m_seq_num);
@ -1105,9 +1189,8 @@ void eap::method_tls::encrypt_message(_Inout_ sanitizing_blob &msg)
throw win_runtime_error(__FUNCTION__ " Error hashing data."); throw win_runtime_error(__FUNCTION__ " Error hashing data.");
// Calculate hash. // Calculate hash.
vector<unsigned char> hmac; sanitizing_blob hmac;
if (!CryptGetHashParam(hash_hmac, HP_HASHVAL, hmac, 0)) hash_hmac.calculate(hmac);
throw win_runtime_error(__FUNCTION__ " Error finishing hash calculation.");
// Remove SSL/TLS header (record type, version, message size). // Remove SSL/TLS header (record type, version, message size).
msg.erase(msg.begin(), msg.begin() + 5); msg.erase(msg.begin(), msg.begin() + 5);
@ -1132,7 +1215,7 @@ void eap::method_tls::encrypt_message(_Inout_ sanitizing_blob &msg)
// Encrypt. // Encrypt.
assert(size < 0xffffffff); assert(size < 0xffffffff);
DWORD size2 = (DWORD)size; DWORD size2 = (DWORD)size;
if (!CryptEncrypt(m_key_encrypt, NULL, FALSE, 0, msg.data(), &size2, (DWORD)size)) if (!CryptEncrypt(m_key_client, NULL, FALSE, 0, msg.data(), &size2, (DWORD)size))
throw win_runtime_error(__FUNCTION__ " Error encrypting message."); throw win_runtime_error(__FUNCTION__ " Error encrypting message.");
// Increment sequence number. // Increment sequence number.
@ -1144,7 +1227,7 @@ void eap::method_tls::decrypt_message(_Inout_ sanitizing_blob &msg)
{ {
// Decrypt. // Decrypt.
DWORD size = (DWORD)msg.size(); DWORD size = (DWORD)msg.size();
if (!CryptDecrypt(m_key_decrypt, NULL, FALSE, 0, msg.data(), &size)) if (!CryptDecrypt(m_key_server, NULL, FALSE, 0, msg.data(), &size))
throw win_runtime_error(__FUNCTION__ " Error decrypting message."); throw win_runtime_error(__FUNCTION__ " Error decrypting message.");
// Remove padding. // Remove padding.
@ -1152,81 +1235,74 @@ void eap::method_tls::decrypt_message(_Inout_ sanitizing_blob &msg)
} }
vector<unsigned char> eap::method_tls::prf( eap::sanitizing_blob eap::method_tls::prf(
_In_bytecount_(size_secret ) const void *secret,
_In_ size_t size_secret,
_In_bytecount_(size_lblseed) const void *lblseed,
_In_ size_t size_lblseed,
_In_ size_t size)
{
size_t
L_S1 = (size_secret + 1) / 2,
L_S2 = L_S1;
const void
*S1 = secret,
*S2 = (const unsigned char*)secret + (size_secret - L_S2);
vector<unsigned char>
p_md5 (p_hash(CALG_MD5 , S1, L_S1, lblseed, size_lblseed, size)),
p_sha1(p_hash(CALG_SHA1, S2, L_S2, lblseed, size_lblseed, size)),
p(size);
for (size_t i = 0; i < size; i++)
p[i] = p_md5[i] ^ p_sha1[i];
return p;
}
vector<unsigned char> eap::method_tls::p_hash(
_In_ ALG_ID alg,
_In_bytecount_(size_secret) const void *secret, _In_bytecount_(size_secret) const void *secret,
_In_ size_t size_secret, _In_ size_t size_secret,
_In_bytecount_(size_seed) const void *seed, _In_bytecount_(size_seed) const void *seed,
_In_ size_t size_seed, _In_ size_t size_seed,
_In_ size_t size) _In_ size_t size)
{ {
// HMAC symmetric key creation. // Split secret in two halves.
crypt_key key_hmac(create_hmac_key(secret, size_secret)); size_t
vector<unsigned char> block; size_S1 = (size_secret + 1) / 2,
const HMAC_INFO hmac_info = { alg }; size_S2 = size_S1;
const void
*S1 = secret,
*S2 = (const unsigned char*)secret + (size_secret - size_S2);
vector<unsigned char> data; // Precalculate HMAC padding for speed.
data.reserve(size); sanitizing_blob
hmac_padding1(64),
hmac_padding2(64);
hash_hmac::inner_padding(m_cp, CALG_MD5 , S1, size_S1, hmac_padding1.data());
hash_hmac::inner_padding(m_cp, CALG_SHA1, S2, size_S2, hmac_padding2.data());
// https://tools.ietf.org/html/rfc5246#section-5: // Prepare A for p_hash.
// sanitizing_blob
// P_hash(secret, seed) = HMAC_hash(secret, A(1) + seed) + A1((unsigned char*)seed, (unsigned char*)seed + size_seed),
// HMAC_hash(secret, A(2) + seed) + A2((unsigned char*)seed, (unsigned char*)seed + size_seed);
// HMAC_hash(secret, A(3) + seed) + ...
//
// where + indicates concatenation.
//
// A() is defined as:
//
// A(0) = seed
// A(i) = HMAC_hash(secret, A(i-1))
vector<unsigned char> A((unsigned char*)seed, (unsigned char*)seed + size_seed); sanitizing_blob
while (data.size() < size) { hmac1,
// Hash A. hmac2;
crypt_hash hash_hmac1(create_hmac_hash(key_hmac, hmac_info)); sanitizing_blob data(size);
if (!CryptHashData(hash_hmac1, A.data(), (DWORD)A.size(), 0)) for (size_t i = 0, off1 = 0, off2 = 0; i < size; ) {
throw win_runtime_error(__FUNCTION__ " Error hashing A."); if (off1 >= hmac1.size()) {
if (!CryptGetHashParam(hash_hmac1, HP_HASHVAL, A, 0)) // Rehash A.
throw win_runtime_error(__FUNCTION__ " Error finishing hash A calculation."); hash_hmac hash1(m_cp, CALG_MD5 , hmac_padding1.data());
if (!CryptHashData(hash1, A1.data(), (DWORD)A1.size(), 0))
throw win_runtime_error(__FUNCTION__ " Error hashing A1.");
hash1.calculate(A1);
// Hash A and seed. // Hash A and seed.
crypt_hash hash_hmac2(create_hmac_hash(key_hmac, hmac_info)); hash_hmac hash2(m_cp, CALG_MD5 , hmac_padding1.data());
if (!CryptHashData(hash_hmac2, A.data(), (DWORD)A.size(), 0) || if (!CryptHashData(hash2, A1.data(), (DWORD)A1.size(), 0) ||
!CryptHashData(hash_hmac2, (const BYTE*)seed, (DWORD)size_seed, 0)) !CryptHashData(hash2, (const BYTE*)seed , (DWORD)size_seed, 0))
throw win_runtime_error(__FUNCTION__ " Error hashing seed."); throw win_runtime_error(__FUNCTION__ " Error hashing seed,label or data.");
if (!CryptGetHashParam(hash_hmac2, HP_HASHVAL, block, 0)) hash2.calculate(hmac1);
throw win_runtime_error(__FUNCTION__ " Error finishing hash A+seed calculation."); off1 = 0;
}
// Append to output data. if (off2 >= hmac2.size()) {
data.insert(data.end(), block.begin(), block.end()); // Rehash A.
hash_hmac hash1(m_cp, CALG_SHA1 , hmac_padding2.data());
if (!CryptHashData(hash1, A2.data(), (DWORD)A2.size(), 0))
throw win_runtime_error(__FUNCTION__ " Error hashing A2.");
hash1.calculate(A2);
// Hash A and seed.
hash_hmac hash2(m_cp, CALG_SHA1 , hmac_padding2.data());
if (!CryptHashData(hash2, A2.data(), (DWORD)A2.size(), 0) ||
!CryptHashData(hash2, (const BYTE*)seed , (DWORD)size_seed, 0))
throw win_runtime_error(__FUNCTION__ " Error hashing seed,label or data.");
hash2.calculate(hmac2);
off2 = 0;
}
// XOR combine amount of data we have (and need).
size_t i_end = std::min<size_t>(i + std::min<size_t>(hmac1.size() - off1, hmac2.size() - off2), size);
while (i < i_end)
data[i++] = hmac1[off1++] ^ hmac2[off2++];
} }
return data; return data;