OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/chromeos/login/auth/key.h" | |
6 | |
7 #include "base/base64.h" | |
8 #include "base/logging.h" | |
9 #include "base/memory/scoped_ptr.h" | |
10 #include "base/strings/string_number_conversions.h" | |
11 #include "base/strings/string_util.h" | |
12 #include "crypto/sha2.h" | |
13 #include "crypto/symmetric_key.h" | |
14 | |
15 namespace chromeos { | |
16 | |
17 namespace { | |
18 | |
19 // Parameters for the transformation to KEY_TYPE_SALTED_AES256_1234. | |
20 const int kNumIterations = 1234; | |
21 const int kKeySizeInBits = 256; | |
22 | |
23 } // namespace | |
24 | |
25 Key::Key() : key_type_(KEY_TYPE_PASSWORD_PLAIN) { | |
26 } | |
27 | |
28 Key::Key(const Key& other) : key_type_(other.key_type_), | |
29 salt_(other.salt_), | |
30 secret_(other.secret_), | |
31 label_(other.label_) { | |
32 } | |
33 | |
34 Key::Key(const std::string& plain_text_password) | |
35 : key_type_(KEY_TYPE_PASSWORD_PLAIN), | |
36 secret_(plain_text_password) { | |
37 } | |
38 | |
39 Key::Key(KeyType key_type, const std::string& salt, const std::string& secret) | |
40 : key_type_(key_type), | |
41 salt_(salt), | |
42 secret_(secret) { | |
43 | |
44 } | |
45 | |
46 Key::~Key() { | |
47 } | |
48 | |
49 bool Key::operator==(const Key& other) const { | |
50 return other.key_type_ == key_type_ && | |
51 other.salt_ == salt_ && | |
52 other.secret_ == secret_ && | |
53 other.label_ == label_; | |
54 } | |
55 | |
56 Key::KeyType Key::GetKeyType() const { | |
57 return key_type_; | |
58 } | |
59 | |
60 const std::string& Key::GetSecret() const { | |
61 return secret_; | |
62 } | |
63 | |
64 const std::string& Key::GetLabel() const { | |
65 return label_; | |
66 } | |
67 | |
68 void Key::SetLabel(const std::string& label) { | |
69 label_ = label; | |
70 } | |
71 | |
72 void Key::ClearSecret() { | |
73 secret_.clear(); | |
74 } | |
75 | |
76 void Key::Transform(KeyType target_key_type, const std::string& salt) { | |
77 if (key_type_ != KEY_TYPE_PASSWORD_PLAIN) { | |
78 NOTREACHED(); | |
79 return; | |
80 } | |
81 | |
82 switch (target_key_type) { | |
83 case KEY_TYPE_SALTED_SHA256_TOP_HALF: { | |
84 // TODO(stevenjb/nkostylev): Handle empty salt gracefully. | |
85 CHECK(!salt.empty()); | |
86 char hash[crypto::kSHA256Length]; | |
87 crypto::SHA256HashString(salt + secret_, &hash, sizeof(hash)); | |
88 | |
89 // Keep only the first half of the hash for 'weak' hashing so that the | |
90 // plain text secret cannot be reconstructed even if the hashing is | |
91 // reversed. | |
92 secret_ = StringToLowerASCII(base::HexEncode( | |
93 reinterpret_cast<const void*>(hash), sizeof(hash) / 2)); | |
94 break; | |
95 } case KEY_TYPE_SALTED_PBKDF2_AES256_1234: { | |
96 scoped_ptr<crypto::SymmetricKey> key( | |
97 crypto::SymmetricKey::DeriveKeyFromPassword(crypto::SymmetricKey::AES, | |
98 secret_, | |
99 salt, | |
100 kNumIterations, | |
101 kKeySizeInBits)); | |
102 std::string raw_secret; | |
103 key->GetRawKey(&raw_secret); | |
104 base::Base64Encode(raw_secret, &secret_); | |
105 break; | |
106 } default: | |
107 // The resulting key will be sent to cryptohomed. It should always be | |
108 // hashed. If hashing fails, crash instead of sending a plain-text key. | |
109 CHECK(false); | |
110 return; | |
111 } | |
112 | |
113 key_type_ = target_key_type; | |
114 salt_ = salt; | |
115 } | |
116 | |
117 } // namespace chromeos | |
OLD | NEW |