OLD | NEW |
---|---|
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <openssl/err.h> | 5 #include "base/numerics/safe_math.h" |
6 #include <openssl/hkdf.h> | |
7 | |
8 #include "base/logging.h" | |
9 #include "base/stl_util.h" | |
10 #include "content/child/webcrypto/algorithm_implementation.h" | 6 #include "content/child/webcrypto/algorithm_implementation.h" |
11 #include "content/child/webcrypto/crypto_data.h" | 7 #include "content/child/webcrypto/crypto_data.h" |
12 #include "content/child/webcrypto/openssl/key_openssl.h" | 8 #include "content/child/webcrypto/openssl/key_openssl.h" |
13 #include "content/child/webcrypto/openssl/util_openssl.h" | 9 #include "content/child/webcrypto/openssl/util_openssl.h" |
14 #include "content/child/webcrypto/status.h" | 10 #include "content/child/webcrypto/status.h" |
15 #include "content/child/webcrypto/webcrypto_util.h" | 11 #include "content/child/webcrypto/webcrypto_util.h" |
16 #include "crypto/openssl_util.h" | 12 #include "crypto/openssl_util.h" |
17 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" | 13 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" |
18 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" | 14 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" |
19 | 15 |
20 namespace content { | 16 namespace content { |
21 | 17 |
22 namespace webcrypto { | 18 namespace webcrypto { |
23 | 19 |
24 namespace { | 20 namespace { |
25 | 21 |
26 const blink::WebCryptoKeyUsageMask kValidUsages = | 22 const blink::WebCryptoKeyUsageMask kAllKeyUsages = |
27 blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits; | 23 blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits; |
28 | 24 |
29 class HkdfImplementation : public AlgorithmImplementation { | 25 class Pbkdf2Implementation : public AlgorithmImplementation { |
30 public: | 26 public: |
31 HkdfImplementation() {} | 27 Pbkdf2Implementation() {} |
32 | 28 |
33 Status VerifyKeyUsagesBeforeImportKey( | 29 Status VerifyKeyUsagesBeforeImportKey( |
34 blink::WebCryptoKeyFormat format, | 30 blink::WebCryptoKeyFormat format, |
35 blink::WebCryptoKeyUsageMask usages) const override { | 31 blink::WebCryptoKeyUsageMask usages) const override { |
36 if (format != blink::WebCryptoKeyFormatRaw) | 32 switch (format) { |
37 return Status::ErrorUnsupportedImportKeyFormat(); | 33 case blink::WebCryptoKeyFormatRaw: |
38 return CheckKeyCreationUsages(kValidUsages, usages, false); | 34 return CheckKeyCreationUsages(kAllKeyUsages, usages, false); |
35 default: | |
36 return Status::ErrorUnsupportedImportKeyFormat(); | |
37 } | |
39 } | 38 } |
40 | 39 |
41 Status ImportKeyRaw(const CryptoData& key_data, | 40 Status ImportKeyRaw(const CryptoData& key_data, |
42 const blink::WebCryptoAlgorithm& algorithm, | 41 const blink::WebCryptoAlgorithm& algorithm, |
43 bool extractable, | 42 bool extractable, |
44 blink::WebCryptoKeyUsageMask usages, | 43 blink::WebCryptoKeyUsageMask usages, |
45 blink::WebCryptoKey* key) const override { | 44 blink::WebCryptoKey* key) const override { |
46 return CreateWebCryptoSecretKey( | 45 const blink::WebCryptoKeyAlgorithm key_algorithm = |
47 key_data, blink::WebCryptoKeyAlgorithm::createWithoutParams( | 46 blink::WebCryptoKeyAlgorithm::createWithoutParams( |
48 blink::WebCryptoAlgorithmIdHkdf), | 47 blink::WebCryptoAlgorithmIdPbkdf2); |
49 extractable, usages, key); | 48 |
49 return CreateWebCryptoSecretKey(key_data, key_algorithm, extractable, | |
50 usages, key); | |
50 } | 51 } |
51 | 52 |
52 Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm, | 53 Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm, |
53 const blink::WebCryptoKey& base_key, | 54 const blink::WebCryptoKey& base_key, |
54 bool has_optional_length_bits, | 55 bool has_optional_length_bits, |
55 unsigned int optional_length_bits, | 56 unsigned int optional_length_bits, |
56 std::vector<uint8_t>* derived_bytes) const override { | 57 std::vector<uint8_t>* derived_bytes) const override { |
57 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); | 58 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
59 | |
58 if (!has_optional_length_bits) | 60 if (!has_optional_length_bits) |
59 return Status::ErrorHkdfDeriveBitsLengthNotSpecified(); | 61 return Status::ErrorPbkdf2DeriveBitsLengthNotSpecified(); |
60 | 62 |
61 const blink::WebCryptoHkdfParams* params = algorithm.hkdfParams(); | 63 if (optional_length_bits % 8) |
64 return Status::ErrorPbkdf2InvalidLength(); | |
62 | 65 |
63 const EVP_MD* digest_algorithm = GetDigest(params->hash().id()); | 66 const blink::WebCryptoPbkdf2Params* params = algorithm.pbkdf2Params(); |
67 | |
68 const blink::WebCryptoAlgorithm& hash = params->hash(); | |
69 const EVP_MD* digest_algorithm = GetDigest(hash.id()); | |
64 if (!digest_algorithm) | 70 if (!digest_algorithm) |
65 return Status::ErrorUnsupported(); | 71 return Status::ErrorUnsupported(); |
66 | 72 |
67 // Size output to fit length | 73 unsigned int keylen_bytes = optional_length_bits / 8; |
68 unsigned int derived_bytes_len = NumBitsToBytes(optional_length_bits); | 74 derived_bytes->resize(keylen_bytes); |
69 derived_bytes->resize(derived_bytes_len); | |
70 | 75 |
71 // Algorithm dispatch checks that the algorithm in |base_key| matches | 76 const std::vector<uint8_t>& password = |
72 // |algorithm|. | |
73 const std::vector<uint8_t>& raw_key = | |
74 SymKeyOpenSsl::Cast(base_key)->raw_key_data(); | 77 SymKeyOpenSsl::Cast(base_key)->raw_key_data(); |
75 const uint8_t* raw_key_ptr = raw_key.empty() ? NULL : &raw_key.front(); | |
76 uint8_t* derived_bytes_ptr = | |
77 derived_bytes->empty() ? NULL : &derived_bytes->front(); | |
78 if (!HKDF(derived_bytes_ptr, derived_bytes_len, digest_algorithm, | |
79 raw_key_ptr, raw_key.size(), params->salt().data(), | |
80 params->salt().size(), params->info().data(), | |
81 params->info().size())) { | |
82 uint32_t error = ERR_get_error(); | |
83 if (ERR_GET_LIB(error) == ERR_LIB_HKDF && | |
84 ERR_GET_REASON(error) == HKDF_R_OUTPUT_TOO_LARGE) { | |
85 return Status::ErrorHkdfLengthTooLong(); | |
86 } | |
87 return Status::OperationError(); | |
88 } | |
89 | 78 |
90 TruncateToBitLength(optional_length_bits, derived_bytes); | 79 base::CheckedNumeric<int> password_size = password.size(); |
eroman
2015/01/14 20:44:58
Can you add a comment that BoringSSL expects the s
xun.sun
2015/01/15 17:21:17
Done.
| |
80 if (!password_size.IsValid()) | |
81 return Status::ErrorDataTooLarge(); | |
82 | |
83 int result = PKCS5_PBKDF2_HMAC( | |
84 reinterpret_cast<const char*>(password.data()), | |
85 password_size.ValueOrDie(), params->salt().data(), | |
86 params->salt().size(), params->iterations(), digest_algorithm, | |
davidben
2015/01/14 23:42:30
Note: you'll probably end up spinning indefinitely
davidben
2015/01/14 23:43:03
(Sorry, not indefinitely but for a rather long tim
eroman
2015/01/15 01:32:07
I don't believe it is a problem that needs to be s
| |
87 keylen_bytes, derived_bytes->data()); | |
davidben
2015/01/14 23:42:30
Is std::vector::data something we can rely on in a
eroman
2015/01/15 01:32:06
Yeah I raised this earlier as well. Other code in
xun.sun
2015/01/15 17:21:17
Acknowledged.
| |
88 | |
89 if (result == 1) | |
davidben
2015/01/14 23:42:30
Style nit: PKCS5_PBKDF2_HMAC has been fixed to ret
xun.sun
2015/01/15 17:21:17
Done.
| |
90 return Status::Success(); | |
91 return Status::OperationError(); | |
92 } | |
93 | |
94 Status GetKeyLength(const blink::WebCryptoAlgorithm& key_length_algorithm, | |
eroman
2015/01/14 20:44:58
nit: For consistency with hdkf_openssl.cc, can you
xun.sun
2015/01/15 17:21:17
Done.
| |
95 bool* has_length_bits, | |
96 unsigned int* length_bits) const override { | |
97 *has_length_bits = false; | |
91 return Status::Success(); | 98 return Status::Success(); |
92 } | 99 } |
93 | 100 |
94 Status SerializeKeyForClone( | 101 Status SerializeKeyForClone( |
95 const blink::WebCryptoKey& key, | 102 const blink::WebCryptoKey& key, |
96 blink::WebVector<uint8_t>* key_data) const override { | 103 blink::WebVector<uint8_t>* key_data) const override { |
97 key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data()); | 104 key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data()); |
98 return Status::Success(); | 105 return Status::Success(); |
99 } | 106 } |
100 | 107 |
101 Status DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, | 108 Status DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, |
102 blink::WebCryptoKeyType type, | 109 blink::WebCryptoKeyType type, |
103 bool extractable, | 110 bool extractable, |
104 blink::WebCryptoKeyUsageMask usages, | 111 blink::WebCryptoKeyUsageMask usages, |
105 const CryptoData& key_data, | 112 const CryptoData& key_data, |
106 blink::WebCryptoKey* key) const override { | 113 blink::WebCryptoKey* key) const override { |
107 return CreateWebCryptoSecretKey(key_data, algorithm, extractable, usages, | 114 return CreateWebCryptoSecretKey(key_data, algorithm, extractable, usages, |
108 key); | 115 key); |
109 } | 116 } |
110 | |
111 Status GetKeyLength(const blink::WebCryptoAlgorithm& key_length_algorithm, | |
112 bool* has_length_bits, | |
113 unsigned int* length_bits) const override { | |
114 *has_length_bits = false; | |
115 return Status::Success(); | |
116 } | |
117 }; | 117 }; |
118 | 118 |
119 } // namespace | 119 } // namespace |
120 | 120 |
121 AlgorithmImplementation* CreatePlatformHkdfImplementation() { | 121 AlgorithmImplementation* CreatePlatformPbkdf2Implementation() { |
122 return new HkdfImplementation; | 122 return new Pbkdf2Implementation; |
123 } | 123 } |
124 | 124 |
125 } // namespace webcrypto | 125 } // namespace webcrypto |
126 | 126 |
127 } // namespace content | 127 } // namespace content |
OLD | NEW |