// Copyright 2011 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "crypto/symmetric_key.h" #include #include #include #include #include "base/check_op.h" #include "base/notreached.h" #include "crypto/openssl_util.h" #include "third_party/boringssl/src/include/openssl/evp.h" #include "third_party/boringssl/src/include/openssl/rand.h" namespace crypto { namespace { bool CheckDerivationParameters(SymmetricKey::Algorithm algorithm, size_t key_size_in_bits) { switch (algorithm) { case SymmetricKey::AES: // Check for supported key sizes. Historically, NSS supported AES-192 // while BoringSSL did not and this check aligned their behavior. return key_size_in_bits == 128 || key_size_in_bits == 256; case SymmetricKey::HMAC_SHA1: return key_size_in_bits % 8 == 0 && key_size_in_bits != 0; } NOTREACHED(); return false; } } // namespace SymmetricKey::~SymmetricKey() { std::fill(key_.begin(), key_.end(), '\0'); // Zero out the confidential key. } // static std::unique_ptr SymmetricKey::GenerateRandomKey( Algorithm algorithm, size_t key_size_in_bits) { DCHECK_EQ(AES, algorithm); // Check for supported key sizes. Historically, NSS supported AES-192 while // BoringSSL did not and this check aligned their behavior. if (key_size_in_bits != 128 && key_size_in_bits != 256) return nullptr; size_t key_size_in_bytes = key_size_in_bits / 8; DCHECK_EQ(key_size_in_bits, key_size_in_bytes * 8); if (key_size_in_bytes == 0) return nullptr; OpenSSLErrStackTracer err_tracer(FROM_HERE); std::unique_ptr key(new SymmetricKey); key->key_.resize(key_size_in_bytes); int rv = RAND_bytes(reinterpret_cast(key->key_.data()), key->key_.size()); return rv == 1 ? std::move(key) : nullptr; } // static std::unique_ptr SymmetricKey::DeriveKeyFromPasswordUsingPbkdf2( Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) { if (!CheckDerivationParameters(algorithm, key_size_in_bits)) return nullptr; size_t key_size_in_bytes = key_size_in_bits / 8; OpenSSLErrStackTracer err_tracer(FROM_HERE); std::unique_ptr key(new SymmetricKey); key->key_.resize(key_size_in_bytes); int rv = PKCS5_PBKDF2_HMAC_SHA1( password.data(), password.length(), reinterpret_cast(salt.data()), salt.length(), static_cast(iterations), key->key_.size(), reinterpret_cast(key->key_.data())); return rv == 1 ? std::move(key) : nullptr; } // static std::unique_ptr SymmetricKey::DeriveKeyFromPasswordUsingScrypt( Algorithm algorithm, const std::string& password, const std::string& salt, size_t cost_parameter, size_t block_size, size_t parallelization_parameter, size_t max_memory_bytes, size_t key_size_in_bits) { if (!CheckDerivationParameters(algorithm, key_size_in_bits)) return nullptr; size_t key_size_in_bytes = key_size_in_bits / 8; OpenSSLErrStackTracer err_tracer(FROM_HERE); std::unique_ptr key(new SymmetricKey); key->key_.resize(key_size_in_bytes); int rv = EVP_PBE_scrypt( password.data(), password.length(), reinterpret_cast(salt.data()), salt.length(), cost_parameter, block_size, parallelization_parameter, max_memory_bytes, reinterpret_cast(key->key_.data()), key->key_.size()); return rv == 1 ? std::move(key) : nullptr; } // static std::unique_ptr SymmetricKey::Import(Algorithm algorithm, const std::string& raw_key) { if (algorithm == AES) { // Check for supported key sizes. Historically, NSS supported AES-192 while // BoringSSL did not and this check aligned their behavior. if (raw_key.size() != 128/8 && raw_key.size() != 256/8) return nullptr; } std::unique_ptr key(new SymmetricKey); key->key_ = raw_key; return key; } SymmetricKey::SymmetricKey() = default; } // namespace crypto