OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/logging.h" | |
6 #include "base/numerics/safe_math.h" | |
7 #include "base/stl_util.h" | |
8 #include "content/child/webcrypto/algorithm_implementation.h" | |
9 #include "content/child/webcrypto/crypto_data.h" | |
10 #include "content/child/webcrypto/jwk.h" | |
11 #include "content/child/webcrypto/openssl/key_openssl.h" | |
12 #include "content/child/webcrypto/openssl/util_openssl.h" | |
13 #include "content/child/webcrypto/status.h" | |
14 #include "content/child/webcrypto/webcrypto_util.h" | |
15 #include "crypto/openssl_util.h" | |
16 #include "crypto/secure_util.h" | |
17 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" | |
18 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h" | |
19 | |
20 namespace content { | |
21 | |
22 namespace webcrypto { | |
23 | |
24 namespace { | |
25 | |
26 const blink::WebCryptoKeyUsageMask kAllKeyUsages = | |
27 blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits; | |
28 class Pbkdf2Implementation : public AlgorithmImplementation { | |
eroman
2015/01/09 02:26:21
style: Add a newline before class definition
xun.sun
2015/01/09 16:08:41
Done.
| |
29 public: | |
30 Pbkdf2Implementation() {} | |
31 | |
32 Status GenerateKey(const blink::WebCryptoAlgorithm& algorithm, | |
33 bool extractable, | |
34 blink::WebCryptoKeyUsageMask usages, | |
35 GenerateKeyResult* result) const override { | |
36 return Status::ErrorUnsupported(); | |
37 } | |
38 | |
39 Status VerifyKeyUsagesBeforeImportKey( | |
40 blink::WebCryptoKeyFormat format, | |
41 blink::WebCryptoKeyUsageMask usages) const override { | |
42 switch (format) { | |
43 case blink::WebCryptoKeyFormatRaw: | |
44 return CheckKeyCreationUsages(kAllKeyUsages, usages, false); | |
45 default: | |
46 return Status::ErrorUnsupportedImportKeyFormat(); | |
47 } | |
48 } | |
49 | |
50 Status ImportKeyRaw(const CryptoData& key_data, | |
51 const blink::WebCryptoAlgorithm& algorithm, | |
52 bool extractable, | |
53 blink::WebCryptoKeyUsageMask usages, | |
54 blink::WebCryptoKey* key) const override { | |
55 const blink::WebCryptoKeyAlgorithm key_algorithm = | |
56 blink::WebCryptoKeyAlgorithm::createPbkdf2(algorithm.id()); | |
57 | |
58 return CreateWebCryptoSecretKey(key_data, key_algorithm, extractable, | |
59 usages, key); | |
60 } | |
61 | |
62 Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm, | |
63 const blink::WebCryptoKey& base_key, | |
64 bool has_optional_length_bits, | |
65 unsigned int optional_length_bits, | |
66 std::vector<uint8_t>* derived_bytes) const override { | |
67 if (!has_optional_length_bits || optional_length_bits % 8) | |
68 return Status::ErrorPbkdf2InvalidLength(); | |
69 | |
70 const blink::WebCryptoPbkdf2Params* params = algorithm.pbkdf2Params(); | |
71 const blink::WebVector<unsigned char>& salt = params->salt(); | |
72 const unsigned long iterations = params->iterations(); | |
eroman
2015/01/09 02:26:21
This should be an unsigned int, will comment on bl
xun.sun
2015/01/09 16:08:41
Done.
| |
73 const blink::WebCryptoAlgorithm& hash = params->hash(); | |
74 | |
75 const EVP_MD* digest_algorithm = GetDigest(hash.id()); | |
76 if (!digest_algorithm) | |
77 return Status::ErrorUnsupported(); | |
78 | |
79 unsigned int dkLen = optional_length_bits / 8; | |
eroman
2015/01/09 02:26:21
(1) dkLen is not chromium style naming.
(20 dk_len
xun.sun
2015/01/09 16:08:41
Done.
| |
80 unsigned int hLen = EVP_MD_size(digest_algorithm); | |
eroman
2015/01/09 02:26:21
style naming throughout here.
xun.sun
2015/01/09 16:08:41
Done.
| |
81 | |
82 unsigned long maxLength = ((1L << 32) - 1) * hLen; | |
eroman
2015/01/09 02:26:21
This doesn't make sense, what is it trying to enfo
xun.sun
2015/01/09 16:08:41
Section 5.2 in https://www.ietf.org/rfc/rfc2898.tx
| |
83 if (dkLen > maxLength) | |
84 return Status::OperationError(); | |
85 | |
86 derived_bytes->resize(dkLen); | |
87 | |
88 const std::vector<uint8_t>& password = | |
89 SymKeyOpenSsl::Cast(base_key)->raw_key_data(); | |
90 | |
91 int result = PKCS5_PBKDF2_HMAC( | |
92 (const char*)password.data(), password.size(), salt.data(), salt.size(), | |
eroman
2015/01/09 02:26:21
(1) use C++ style casts, like static_cast<const ch
xun.sun
2015/01/09 16:08:41
Done.
| |
93 iterations, digest_algorithm, dkLen, derived_bytes->data()); | |
94 if (result == 1) | |
95 return Status::Success(); | |
96 else | |
eroman
2015/01/09 02:26:21
nit: we omit "else" clauses when the "if" above re
xun.sun
2015/01/09 16:08:41
Done.
| |
97 return Status::OperationError(); | |
98 } | |
eroman
2015/01/09 02:26:21
The Serialize methods are needed here as well, sin
xun.sun
2015/01/09 16:08:41
Done.
| |
99 }; | |
100 | |
101 } // namespace | |
102 | |
103 AlgorithmImplementation* CreatePlatformPbkdf2Implementation() { | |
104 return new Pbkdf2Implementation; | |
105 } | |
106 | |
107 } // namespace webcrypto | |
108 | |
109 } // namespace content | |
OLD | NEW |