Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(67)

Side by Side Diff: content/child/webcrypto/openssl/pbkdf2_openssl.cc

Issue 797723006: Implement PBKDF2 (except for generateKey) using BoringSSL (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@pbkdf2
Patch Set: Rebased Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <openssl/err.h> 5 #include "base/numerics/safe_math.h"
6 #include <openssl/hkdf.h>
7
8 #include "base/logging.h"
9 #include "base/stl_util.h"
10 #include "content/child/webcrypto/algorithm_implementation.h" 6 #include "content/child/webcrypto/algorithm_implementation.h"
11 #include "content/child/webcrypto/crypto_data.h" 7 #include "content/child/webcrypto/crypto_data.h"
12 #include "content/child/webcrypto/openssl/key_openssl.h" 8 #include "content/child/webcrypto/openssl/key_openssl.h"
13 #include "content/child/webcrypto/openssl/util_openssl.h" 9 #include "content/child/webcrypto/openssl/util_openssl.h"
14 #include "content/child/webcrypto/status.h" 10 #include "content/child/webcrypto/status.h"
15 #include "content/child/webcrypto/webcrypto_util.h" 11 #include "content/child/webcrypto/webcrypto_util.h"
16 #include "crypto/openssl_util.h" 12 #include "crypto/openssl_util.h"
17 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" 13 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
18 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" 14 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h"
19 15
20 namespace content { 16 namespace content {
21 17
22 namespace webcrypto { 18 namespace webcrypto {
23 19
24 namespace { 20 namespace {
25 21
26 const blink::WebCryptoKeyUsageMask kValidUsages = 22 const blink::WebCryptoKeyUsageMask kAllKeyUsages =
27 blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits; 23 blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits;
28 24
29 class HkdfImplementation : public AlgorithmImplementation { 25 class Pbkdf2Implementation : public AlgorithmImplementation {
30 public: 26 public:
31 HkdfImplementation() {} 27 Pbkdf2Implementation() {}
32 28
33 Status VerifyKeyUsagesBeforeImportKey( 29 Status VerifyKeyUsagesBeforeImportKey(
34 blink::WebCryptoKeyFormat format, 30 blink::WebCryptoKeyFormat format,
35 blink::WebCryptoKeyUsageMask usages) const override { 31 blink::WebCryptoKeyUsageMask usages) const override {
36 if (format != blink::WebCryptoKeyFormatRaw) 32 switch (format) {
37 return Status::ErrorUnsupportedImportKeyFormat(); 33 case blink::WebCryptoKeyFormatRaw:
38 return CheckKeyCreationUsages(kValidUsages, usages, false); 34 return CheckKeyCreationUsages(kAllKeyUsages, usages, false);
35 default:
36 return Status::ErrorUnsupportedImportKeyFormat();
37 }
39 } 38 }
40 39
41 Status ImportKeyRaw(const CryptoData& key_data, 40 Status ImportKeyRaw(const CryptoData& key_data,
42 const blink::WebCryptoAlgorithm& algorithm, 41 const blink::WebCryptoAlgorithm& algorithm,
43 bool extractable, 42 bool extractable,
44 blink::WebCryptoKeyUsageMask usages, 43 blink::WebCryptoKeyUsageMask usages,
45 blink::WebCryptoKey* key) const override { 44 blink::WebCryptoKey* key) const override {
46 return CreateWebCryptoSecretKey( 45 const blink::WebCryptoKeyAlgorithm key_algorithm =
47 key_data, blink::WebCryptoKeyAlgorithm::createWithoutParams( 46 blink::WebCryptoKeyAlgorithm::createWithoutParams(
48 blink::WebCryptoAlgorithmIdHkdf), 47 blink::WebCryptoAlgorithmIdPbkdf2);
49 extractable, usages, key); 48
49 return CreateWebCryptoSecretKey(key_data, key_algorithm, extractable,
50 usages, key);
50 } 51 }
51 52
52 Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm, 53 Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm,
53 const blink::WebCryptoKey& base_key, 54 const blink::WebCryptoKey& base_key,
54 bool has_optional_length_bits, 55 bool has_optional_length_bits,
55 unsigned int optional_length_bits, 56 unsigned int optional_length_bits,
56 std::vector<uint8_t>* derived_bytes) const override { 57 std::vector<uint8_t>* derived_bytes) const override {
57 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); 58 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
59
58 if (!has_optional_length_bits) 60 if (!has_optional_length_bits)
59 return Status::ErrorHkdfDeriveBitsLengthNotSpecified(); 61 return Status::ErrorPbkdf2DeriveBitsLengthNotSpecified();
60 62
61 const blink::WebCryptoHkdfParams* params = algorithm.hkdfParams(); 63 if (optional_length_bits % 8)
64 return Status::ErrorPbkdf2InvalidLength();
62 65
63 const EVP_MD* digest_algorithm = GetDigest(params->hash().id()); 66 const blink::WebCryptoPbkdf2Params* params = algorithm.pbkdf2Params();
67
68 const blink::WebCryptoAlgorithm& hash = params->hash();
69 const EVP_MD* digest_algorithm = GetDigest(hash.id());
64 if (!digest_algorithm) 70 if (!digest_algorithm)
65 return Status::ErrorUnsupported(); 71 return Status::ErrorUnsupported();
66 72
67 // Size output to fit length 73 unsigned int keylen_bytes = optional_length_bits / 8;
68 unsigned int derived_bytes_len = NumBitsToBytes(optional_length_bits); 74 derived_bytes->resize(keylen_bytes);
69 derived_bytes->resize(derived_bytes_len);
70 75
71 // Algorithm dispatch checks that the algorithm in |base_key| matches 76 const std::vector<uint8_t>& password =
72 // |algorithm|.
73 const std::vector<uint8_t>& raw_key =
74 SymKeyOpenSsl::Cast(base_key)->raw_key_data(); 77 SymKeyOpenSsl::Cast(base_key)->raw_key_data();
75 const uint8_t* raw_key_ptr = raw_key.empty() ? NULL : &raw_key.front();
76 uint8_t* derived_bytes_ptr =
77 derived_bytes->empty() ? NULL : &derived_bytes->front();
78 if (!HKDF(derived_bytes_ptr, derived_bytes_len, digest_algorithm,
79 raw_key_ptr, raw_key.size(), params->salt().data(),
80 params->salt().size(), params->info().data(),
81 params->info().size())) {
82 uint32_t error = ERR_get_error();
83 if (ERR_GET_LIB(error) == ERR_LIB_HKDF &&
84 ERR_GET_REASON(error) == HKDF_R_OUTPUT_TOO_LARGE) {
85 return Status::ErrorHkdfLengthTooLong();
86 }
87 return Status::OperationError();
88 }
89 78
90 TruncateToBitLength(optional_length_bits, derived_bytes); 79 base::CheckedNumeric<int> password_size = password.size();
eroman 2015/01/14 20:44:58 Can you add a comment that BoringSSL expects the s
xun.sun 2015/01/15 17:21:17 Done.
80 if (!password_size.IsValid())
81 return Status::ErrorDataTooLarge();
82
83 int result = PKCS5_PBKDF2_HMAC(
84 reinterpret_cast<const char*>(password.data()),
85 password_size.ValueOrDie(), params->salt().data(),
86 params->salt().size(), params->iterations(), digest_algorithm,
davidben 2015/01/14 23:42:30 Note: you'll probably end up spinning indefinitely
davidben 2015/01/14 23:43:03 (Sorry, not indefinitely but for a rather long tim
eroman 2015/01/15 01:32:07 I don't believe it is a problem that needs to be s
87 keylen_bytes, derived_bytes->data());
davidben 2015/01/14 23:42:30 Is std::vector::data something we can rely on in a
eroman 2015/01/15 01:32:06 Yeah I raised this earlier as well. Other code in
xun.sun 2015/01/15 17:21:17 Acknowledged.
88
89 if (result == 1)
davidben 2015/01/14 23:42:30 Style nit: PKCS5_PBKDF2_HMAC has been fixed to ret
xun.sun 2015/01/15 17:21:17 Done.
90 return Status::Success();
91 return Status::OperationError();
92 }
93
94 Status GetKeyLength(const blink::WebCryptoAlgorithm& key_length_algorithm,
eroman 2015/01/14 20:44:58 nit: For consistency with hdkf_openssl.cc, can you
xun.sun 2015/01/15 17:21:17 Done.
95 bool* has_length_bits,
96 unsigned int* length_bits) const override {
97 *has_length_bits = false;
91 return Status::Success(); 98 return Status::Success();
92 } 99 }
93 100
94 Status SerializeKeyForClone( 101 Status SerializeKeyForClone(
95 const blink::WebCryptoKey& key, 102 const blink::WebCryptoKey& key,
96 blink::WebVector<uint8_t>* key_data) const override { 103 blink::WebVector<uint8_t>* key_data) const override {
97 key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data()); 104 key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data());
98 return Status::Success(); 105 return Status::Success();
99 } 106 }
100 107
101 Status DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm, 108 Status DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm,
102 blink::WebCryptoKeyType type, 109 blink::WebCryptoKeyType type,
103 bool extractable, 110 bool extractable,
104 blink::WebCryptoKeyUsageMask usages, 111 blink::WebCryptoKeyUsageMask usages,
105 const CryptoData& key_data, 112 const CryptoData& key_data,
106 blink::WebCryptoKey* key) const override { 113 blink::WebCryptoKey* key) const override {
107 return CreateWebCryptoSecretKey(key_data, algorithm, extractable, usages, 114 return CreateWebCryptoSecretKey(key_data, algorithm, extractable, usages,
108 key); 115 key);
109 } 116 }
110
111 Status GetKeyLength(const blink::WebCryptoAlgorithm& key_length_algorithm,
112 bool* has_length_bits,
113 unsigned int* length_bits) const override {
114 *has_length_bits = false;
115 return Status::Success();
116 }
117 }; 117 };
118 118
119 } // namespace 119 } // namespace
120 120
121 AlgorithmImplementation* CreatePlatformHkdfImplementation() { 121 AlgorithmImplementation* CreatePlatformPbkdf2Implementation() {
122 return new HkdfImplementation; 122 return new Pbkdf2Implementation;
123 } 123 }
124 124
125 } // namespace webcrypto 125 } // namespace webcrypto
126 126
127 } // namespace content 127 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698