123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481 |
- // pwdbased.h - originally written and placed in the public domain by Wei Dai
- // Cutover to KeyDerivationFunction interface by Uri Blumenthal
- // Marcel Raad and Jeffrey Walton in March 2018.
- /// \file pwdbased.h
- /// \brief Password based key derivation functions
- #ifndef CRYPTOPP_PWDBASED_H
- #define CRYPTOPP_PWDBASED_H
- #include "cryptlib.h"
- #include "hrtimer.h"
- #include "integer.h"
- #include "argnames.h"
- #include "algparam.h"
- #include "hmac.h"
- NAMESPACE_BEGIN(CryptoPP)
- // ******************** PBKDF1 ********************
- /// \brief PBKDF1 from PKCS #5
- /// \tparam T a HashTransformation class
- /// \sa PasswordBasedKeyDerivationFunction, <A
- /// HREF="https://www.cryptopp.com/wiki/PKCS5_PBKDF1">PKCS5_PBKDF1</A>
- /// on the Crypto++ wiki
- /// \since Crypto++ 2.0
- template <class T>
- class PKCS5_PBKDF1 : public PasswordBasedKeyDerivationFunction
- {
- public:
- virtual ~PKCS5_PBKDF1() {}
- static std::string StaticAlgorithmName () {
- const std::string name(std::string("PBKDF1(") +
- std::string(T::StaticAlgorithmName()) + std::string(")"));
- return name;
- }
- // KeyDerivationFunction interface
- std::string AlgorithmName() const {
- return StaticAlgorithmName();
- }
- // KeyDerivationFunction interface
- size_t MaxDerivedKeyLength() const {
- return static_cast<size_t>(T::DIGESTSIZE);
- }
- // KeyDerivationFunction interface
- size_t GetValidDerivedLength(size_t keylength) const;
- // KeyDerivationFunction interface
- virtual size_t DeriveKey(byte *derived, size_t derivedLen, const byte *secret, size_t secretLen,
- const NameValuePairs& params = g_nullNameValuePairs) const;
- /// \brief Derive a key from a secret seed
- /// \param derived the derived output buffer
- /// \param derivedLen the size of the derived buffer, in bytes
- /// \param purpose a purpose byte
- /// \param secret the seed input buffer
- /// \param secretLen the size of the secret buffer, in bytes
- /// \param salt the salt input buffer
- /// \param saltLen the size of the salt buffer, in bytes
- /// \param iterations the number of iterations
- /// \param timeInSeconds the in seconds
- /// \return the number of iterations performed
- /// \throw InvalidDerivedKeyLength if <tt>derivedLen</tt> is invalid for the scheme
- /// \details DeriveKey() provides a standard interface to derive a key from
- /// a seed and other parameters. Each class that derives from KeyDerivationFunction
- /// provides an overload that accepts most parameters used by the derivation function.
- /// \details If <tt>timeInSeconds</tt> is <tt>> 0.0</tt> then DeriveKey will run for
- /// the specified amount of time. If <tt>timeInSeconds</tt> is <tt>0.0</tt> then DeriveKey
- /// will run for the specified number of iterations.
- /// \details PKCS #5 says PBKDF1 should only take 8-byte salts. This implementation
- /// allows salts of any length.
- size_t DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *secret, size_t secretLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const;
- protected:
- // KeyDerivationFunction interface
- const Algorithm & GetAlgorithm() const {
- return *this;
- }
- };
- template <class T>
- size_t PKCS5_PBKDF1<T>::GetValidDerivedLength(size_t keylength) const
- {
- if (keylength > MaxDerivedKeyLength())
- return MaxDerivedKeyLength();
- return keylength;
- }
- template <class T>
- size_t PKCS5_PBKDF1<T>::DeriveKey(byte *derived, size_t derivedLen,
- const byte *secret, size_t secretLen, const NameValuePairs& params) const
- {
- CRYPTOPP_ASSERT(secret /*&& secretLen*/);
- CRYPTOPP_ASSERT(derived && derivedLen);
- CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength());
- byte purpose = (byte)params.GetIntValueWithDefault("Purpose", 0);
- unsigned int iterations = (unsigned int)params.GetIntValueWithDefault("Iterations", 1);
- double timeInSeconds = 0.0f;
- (void)params.GetValue("TimeInSeconds", timeInSeconds);
- ConstByteArrayParameter salt;
- (void)params.GetValue(Name::Salt(), salt);
- return DeriveKey(derived, derivedLen, purpose, secret, secretLen, salt.begin(), salt.size(), iterations, timeInSeconds);
- }
- template <class T>
- size_t PKCS5_PBKDF1<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *secret, size_t secretLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const
- {
- CRYPTOPP_ASSERT(secret /*&& secretLen*/);
- CRYPTOPP_ASSERT(derived && derivedLen);
- CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength());
- CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0);
- CRYPTOPP_UNUSED(purpose);
- ThrowIfInvalidDerivedKeyLength(derivedLen);
- // Business logic
- if (!iterations) { iterations = 1; }
- T hash;
- hash.Update(secret, secretLen);
- hash.Update(salt, saltLen);
- SecByteBlock buffer(hash.DigestSize());
- hash.Final(buffer);
- unsigned int i;
- ThreadUserTimer timer;
- if (timeInSeconds)
- timer.StartTimer();
- for (i=1; i<iterations || (timeInSeconds && (i%128!=0 || timer.ElapsedTimeAsDouble() < timeInSeconds)); i++)
- hash.CalculateDigest(buffer, buffer, buffer.size());
- if (derived)
- std::memcpy(derived, buffer, derivedLen);
- return i;
- }
- // ******************** PKCS5_PBKDF2_HMAC ********************
- /// \brief PBKDF2 from PKCS #5
- /// \tparam T a HashTransformation class
- /// \sa PasswordBasedKeyDerivationFunction, <A
- /// HREF="https://www.cryptopp.com/wiki/PKCS5_PBKDF2_HMAC">PKCS5_PBKDF2_HMAC</A>
- /// on the Crypto++ wiki
- /// \since Crypto++ 2.0
- template <class T>
- class PKCS5_PBKDF2_HMAC : public PasswordBasedKeyDerivationFunction
- {
- public:
- virtual ~PKCS5_PBKDF2_HMAC() {}
- static std::string StaticAlgorithmName () {
- const std::string name(std::string("PBKDF2_HMAC(") +
- std::string(T::StaticAlgorithmName()) + std::string(")"));
- return name;
- }
- // KeyDerivationFunction interface
- std::string AlgorithmName() const {
- return StaticAlgorithmName();
- }
- // KeyDerivationFunction interface
- // should multiply by T::DIGESTSIZE, but gets overflow that way
- size_t MaxDerivedKeyLength() const {
- return 0xffffffffU;
- }
- // KeyDerivationFunction interface
- size_t GetValidDerivedLength(size_t keylength) const;
- // KeyDerivationFunction interface
- size_t DeriveKey(byte *derived, size_t derivedLen, const byte *secret, size_t secretLen,
- const NameValuePairs& params = g_nullNameValuePairs) const;
- /// \brief Derive a key from a secret seed
- /// \param derived the derived output buffer
- /// \param derivedLen the size of the derived buffer, in bytes
- /// \param purpose a purpose byte
- /// \param secret the seed input buffer
- /// \param secretLen the size of the secret buffer, in bytes
- /// \param salt the salt input buffer
- /// \param saltLen the size of the salt buffer, in bytes
- /// \param iterations the number of iterations
- /// \param timeInSeconds the in seconds
- /// \return the number of iterations performed
- /// \throw InvalidDerivedKeyLength if <tt>derivedLen</tt> is invalid for the scheme
- /// \details DeriveKey() provides a standard interface to derive a key from
- /// a seed and other parameters. Each class that derives from KeyDerivationFunction
- /// provides an overload that accepts most parameters used by the derivation function.
- /// \details If <tt>timeInSeconds</tt> is <tt>> 0.0</tt> then DeriveKey will run for
- /// the specified amount of time. If <tt>timeInSeconds</tt> is <tt>0.0</tt> then DeriveKey
- /// will run for the specified number of iterations.
- size_t DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *secret, size_t secretLen,
- const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const;
- protected:
- // KeyDerivationFunction interface
- const Algorithm & GetAlgorithm() const {
- return *this;
- }
- };
- template <class T>
- size_t PKCS5_PBKDF2_HMAC<T>::GetValidDerivedLength(size_t keylength) const
- {
- if (keylength > MaxDerivedKeyLength())
- return MaxDerivedKeyLength();
- return keylength;
- }
- template <class T>
- size_t PKCS5_PBKDF2_HMAC<T>::DeriveKey(byte *derived, size_t derivedLen,
- const byte *secret, size_t secretLen, const NameValuePairs& params) const
- {
- CRYPTOPP_ASSERT(secret /*&& secretLen*/);
- CRYPTOPP_ASSERT(derived && derivedLen);
- CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength());
- byte purpose = (byte)params.GetIntValueWithDefault("Purpose", 0);
- unsigned int iterations = (unsigned int)params.GetIntValueWithDefault("Iterations", 1);
- double timeInSeconds = 0.0f;
- (void)params.GetValue("TimeInSeconds", timeInSeconds);
- ConstByteArrayParameter salt;
- (void)params.GetValue(Name::Salt(), salt);
- return DeriveKey(derived, derivedLen, purpose, secret, secretLen, salt.begin(), salt.size(), iterations, timeInSeconds);
- }
- template <class T>
- size_t PKCS5_PBKDF2_HMAC<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *secret, size_t secretLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const
- {
- CRYPTOPP_ASSERT(secret /*&& secretLen*/);
- CRYPTOPP_ASSERT(derived && derivedLen);
- CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength());
- CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0);
- CRYPTOPP_UNUSED(purpose);
- ThrowIfInvalidDerivedKeyLength(derivedLen);
- // Business logic
- if (!iterations) { iterations = 1; }
- // DigestSize check due to https://github.com/weidai11/cryptopp/issues/855
- HMAC<T> hmac(secret, secretLen);
- if (hmac.DigestSize() == 0)
- throw InvalidArgument("PKCS5_PBKDF2_HMAC: DigestSize cannot be 0");
- SecByteBlock buffer(hmac.DigestSize());
- ThreadUserTimer timer;
- unsigned int i=1;
- while (derivedLen > 0)
- {
- hmac.Update(salt, saltLen);
- unsigned int j;
- for (j=0; j<4; j++)
- {
- byte b = byte(i >> ((3-j)*8));
- hmac.Update(&b, 1);
- }
- hmac.Final(buffer);
- #if CRYPTOPP_MSC_VERSION
- const size_t segmentLen = STDMIN(derivedLen, buffer.size());
- memcpy_s(derived, segmentLen, buffer, segmentLen);
- #else
- const size_t segmentLen = STDMIN(derivedLen, buffer.size());
- std::memcpy(derived, buffer, segmentLen);
- #endif
- if (timeInSeconds)
- {
- timeInSeconds = timeInSeconds / ((derivedLen + buffer.size() - 1) / buffer.size());
- timer.StartTimer();
- }
- for (j=1; j<iterations || (timeInSeconds && (j%128!=0 || timer.ElapsedTimeAsDouble() < timeInSeconds)); j++)
- {
- hmac.CalculateDigest(buffer, buffer, buffer.size());
- xorbuf(derived, buffer, segmentLen);
- }
- if (timeInSeconds)
- {
- iterations = j;
- timeInSeconds = 0;
- }
- derived += segmentLen;
- derivedLen -= segmentLen;
- i++;
- }
- return iterations;
- }
- // ******************** PKCS12_PBKDF ********************
- /// \brief PBKDF from PKCS #12, appendix B
- /// \tparam T a HashTransformation class
- /// \sa PasswordBasedKeyDerivationFunction, <A
- /// HREF="https://www.cryptopp.com/wiki/PKCS12_PBKDF">PKCS12_PBKDF</A>
- /// on the Crypto++ wiki
- /// \since Crypto++ 2.0
- template <class T>
- class PKCS12_PBKDF : public PasswordBasedKeyDerivationFunction
- {
- public:
- virtual ~PKCS12_PBKDF() {}
- static std::string StaticAlgorithmName () {
- const std::string name(std::string("PBKDF_PKCS12(") +
- std::string(T::StaticAlgorithmName()) + std::string(")"));
- return name;
- }
- // KeyDerivationFunction interface
- std::string AlgorithmName() const {
- return StaticAlgorithmName();
- }
- // TODO - check this
- size_t MaxDerivedKeyLength() const {
- return static_cast<size_t>(-1);
- }
- // KeyDerivationFunction interface
- size_t GetValidDerivedLength(size_t keylength) const;
- // KeyDerivationFunction interface
- size_t DeriveKey(byte *derived, size_t derivedLen, const byte *secret, size_t secretLen,
- const NameValuePairs& params = g_nullNameValuePairs) const;
- /// \brief Derive a key from a secret seed
- /// \param derived the derived output buffer
- /// \param derivedLen the size of the derived buffer, in bytes
- /// \param purpose a purpose byte
- /// \param secret the seed input buffer
- /// \param secretLen the size of the secret buffer, in bytes
- /// \param salt the salt input buffer
- /// \param saltLen the size of the salt buffer, in bytes
- /// \param iterations the number of iterations
- /// \param timeInSeconds the in seconds
- /// \return the number of iterations performed
- /// \throw InvalidDerivedKeyLength if <tt>derivedLen</tt> is invalid for the scheme
- /// \details DeriveKey() provides a standard interface to derive a key from
- /// a seed and other parameters. Each class that derives from KeyDerivationFunction
- /// provides an overload that accepts most parameters used by the derivation function.
- /// \details If <tt>timeInSeconds</tt> is <tt>> 0.0</tt> then DeriveKey will run for
- /// the specified amount of time. If <tt>timeInSeconds</tt> is <tt>0.0</tt> then DeriveKey
- /// will run for the specified number of iterations.
- size_t DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *secret, size_t secretLen,
- const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const;
- protected:
- // KeyDerivationFunction interface
- const Algorithm & GetAlgorithm() const {
- return *this;
- }
- };
- template <class T>
- size_t PKCS12_PBKDF<T>::GetValidDerivedLength(size_t keylength) const
- {
- if (keylength > MaxDerivedKeyLength())
- return MaxDerivedKeyLength();
- return keylength;
- }
- template <class T>
- size_t PKCS12_PBKDF<T>::DeriveKey(byte *derived, size_t derivedLen,
- const byte *secret, size_t secretLen, const NameValuePairs& params) const
- {
- CRYPTOPP_ASSERT(secret /*&& secretLen*/);
- CRYPTOPP_ASSERT(derived && derivedLen);
- CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength());
- byte purpose = (byte)params.GetIntValueWithDefault("Purpose", 0);
- unsigned int iterations = (unsigned int)params.GetIntValueWithDefault("Iterations", 1);
- double timeInSeconds = 0.0f;
- (void)params.GetValue("TimeInSeconds", timeInSeconds);
- // NULL or 0 length salt OK
- ConstByteArrayParameter salt;
- (void)params.GetValue(Name::Salt(), salt);
- return DeriveKey(derived, derivedLen, purpose, secret, secretLen, salt.begin(), salt.size(), iterations, timeInSeconds);
- }
- template <class T>
- size_t PKCS12_PBKDF<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *secret, size_t secretLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const
- {
- CRYPTOPP_ASSERT(secret /*&& secretLen*/);
- CRYPTOPP_ASSERT(derived && derivedLen);
- CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength());
- CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0);
- ThrowIfInvalidDerivedKeyLength(derivedLen);
- // Business logic
- if (!iterations) { iterations = 1; }
- const size_t v = T::BLOCKSIZE; // v is in bytes rather than bits as in PKCS #12
- const size_t DLen = v, SLen = RoundUpToMultipleOf(saltLen, v);
- const size_t PLen = RoundUpToMultipleOf(secretLen, v), ILen = SLen + PLen;
- SecByteBlock buffer(DLen + SLen + PLen);
- byte *D = buffer, *S = buffer+DLen, *P = buffer+DLen+SLen, *I = S;
- if (D) // GCC analyzer
- std::memset(D, purpose, DLen);
- size_t i;
- for (i=0; i<SLen; i++)
- S[i] = salt[i % saltLen];
- for (i=0; i<PLen; i++)
- P[i] = secret[i % secretLen];
- T hash;
- SecByteBlock Ai(T::DIGESTSIZE), B(v);
- ThreadUserTimer timer;
- while (derivedLen > 0)
- {
- hash.CalculateDigest(Ai, buffer, buffer.size());
- if (timeInSeconds)
- {
- timeInSeconds = timeInSeconds / ((derivedLen + Ai.size() - 1) / Ai.size());
- timer.StartTimer();
- }
- for (i=1; i<iterations || (timeInSeconds && (i%128!=0 || timer.ElapsedTimeAsDouble() < timeInSeconds)); i++)
- hash.CalculateDigest(Ai, Ai, Ai.size());
- if (timeInSeconds)
- {
- iterations = (unsigned int)i;
- timeInSeconds = 0;
- }
- for (i=0; i<B.size(); i++)
- B[i] = Ai[i % Ai.size()];
- Integer B1(B, B.size());
- ++B1;
- for (i=0; i<ILen; i+=v)
- (Integer(I+i, v) + B1).Encode(I+i, v);
- #if CRYPTOPP_MSC_VERSION
- const size_t segmentLen = STDMIN(derivedLen, Ai.size());
- memcpy_s(derived, segmentLen, Ai, segmentLen);
- #else
- const size_t segmentLen = STDMIN(derivedLen, Ai.size());
- std::memcpy(derived, Ai, segmentLen);
- #endif
- derived += segmentLen;
- derivedLen -= segmentLen;
- }
- return iterations;
- }
- NAMESPACE_END
- #endif
|