Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(343)

Side by Side Diff: content/child/webcrypto/openssl/hkdf_openssl.cc

Issue 803173010: Implement HKDF for webcrypto (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include <openssl/err.h>
6 #include <openssl/hkdf.h>
7
8 #include "base/logging.h"
9 #include "base/stl_util.h"
10 #include "content/child/webcrypto/algorithm_implementation.h"
11 #include "content/child/webcrypto/crypto_data.h"
12 #include "content/child/webcrypto/openssl/key_openssl.h"
13 #include "content/child/webcrypto/openssl/util_openssl.h"
14 #include "content/child/webcrypto/status.h"
15 #include "content/child/webcrypto/webcrypto_util.h"
16 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h"
17 #include "third_party/WebKit/public/platform/WebCryptoKeyAlgorithm.h"
18
19 namespace content {
20
21 namespace webcrypto {
22
23 namespace {
24
25 const blink::WebCryptoKeyUsageMask kValidUsages =
26 blink::WebCryptoKeyUsageDeriveKey | blink::WebCryptoKeyUsageDeriveBits;
27
28 class HkdfImplementation : public AlgorithmImplementation {
29 public:
30 HkdfImplementation() {}
31
32 Status VerifyKeyUsagesBeforeImportKey(
33 blink::WebCryptoKeyFormat format,
34 blink::WebCryptoKeyUsageMask usages) const override {
35 if (format != blink::WebCryptoKeyFormatRaw)
36 return Status::ErrorUnsupportedImportKeyFormat();
37 return CheckKeyCreationUsages(kValidUsages, usages, false);
38 }
39
40 Status ImportKeyRaw(const CryptoData& key_data,
41 const blink::WebCryptoAlgorithm& algorithm,
42 bool extractable,
43 blink::WebCryptoKeyUsageMask usages,
44 blink::WebCryptoKey* key) const override {
45 return CreateWebCryptoSecretKey(key_data,
46 blink::WebCryptoKeyAlgorithm::createKdf(
47 blink::WebCryptoAlgorithmIdHkdf),
48 extractable, usages, key);
49 }
50
51 Status DeriveBits(const blink::WebCryptoAlgorithm& algorithm,
52 const blink::WebCryptoKey& base_key,
53 bool has_optional_length_bits,
54 unsigned int optional_length_bits,
55 std::vector<uint8_t>* derived_bytes) const override {
56 if (!has_optional_length_bits)
57 return Status::ErrorHkdfDeriveBitsLengthNotSpecified();
58
59 const blink::WebCryptoHkdfParams* params = algorithm.hkdfParams();
60
61 const EVP_MD* digest_algorithm = GetDigest(params->hash().id());
62 if (!digest_algorithm)
63 return Status::ErrorUnsupported();
64
65 // Size output to fit length
66 unsigned int derived_bytes_len = NumBitsToBytes(optional_length_bits);
67 derived_bytes->resize(derived_bytes_len);
68
69 // Algorithm dispatch checks that the algorithm in |base_key| matches
70 // |algorithm|.
71 const std::vector<uint8_t>& raw_key =
72 SymKeyOpenSsl::Cast(base_key)->raw_key_data();
73 const uint8_t* raw_key_voidp = raw_key.size() ? &raw_key[0] : nullptr;
eroman 2015/01/08 02:39:43 (1) This is called "voidp" however it is not a voi
nharper 2015/01/09 18:35:55 1) it's now raw_key_p 2) I used raw_key.empty() an
74 if (!HKDF(&(*derived_bytes)[0], derived_bytes_len, digest_algorithm,
eroman 2015/01/08 02:39:43 derived_bytes might be empty, so dereferncing elem
nharper 2015/01/09 18:35:55 Good catch on derived_bytes possibly being empty.
75 raw_key_voidp, raw_key.size(), params->salt().data(),
76 params->salt().size(), params->info().data(),
77 params->info().size())) {
78 uint32_t error = ERR_get_error();
79 if (ERR_GET_LIB(error) == ERR_LIB_HKDF &&
80 ERR_GET_REASON(error) == HKDF_R_OUTPUT_TOO_LARGE)
81 return Status::ErrorHkdfLengthTooLong();
82 return Status::OperationError();
83 }
84
85 TruncateToBitLength(optional_length_bits, derived_bytes);
86 return Status::Success();
87 }
88
89 Status SerializeKeyForClone(
90 const blink::WebCryptoKey& key,
91 blink::WebVector<uint8_t>* key_data) const override {
92 key_data->assign(SymKeyOpenSsl::Cast(key)->serialized_key_data());
93 return Status::Success();
94 }
95
96 Status DeserializeKeyForClone(const blink::WebCryptoKeyAlgorithm& algorithm,
97 blink::WebCryptoKeyType type,
98 bool extractable,
99 blink::WebCryptoKeyUsageMask usages,
100 const CryptoData& key_data,
101 blink::WebCryptoKey* key) const override {
102 return CreateWebCryptoSecretKey(key_data, algorithm, extractable, usages,
103 key);
104 }
105 };
106
107 } // namespace
108
109 AlgorithmImplementation* CreatePlatformHkdfImplementation() {
110 return new HkdfImplementation;
111 }
112
113 } // namespace webcrypto
114
115 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698