mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-28 23:33:26 +01:00
Implement PBKDF2 with NSS.
This was a gap that we left in the last commit.
This commit is contained in:
parent
6a88d8f6b4
commit
96f8e19802
@ -20,10 +20,14 @@
|
|||||||
#include "lib/crypt_ops/crypto_util.h"
|
#include "lib/crypt_ops/crypto_util.h"
|
||||||
#include "lib/ctime/di_ops.h"
|
#include "lib/ctime/di_ops.h"
|
||||||
#include "lib/log/util_bug.h"
|
#include "lib/log/util_bug.h"
|
||||||
|
#include "lib/intmath/cmp.h"
|
||||||
|
|
||||||
#ifdef ENABLE_OPENSSL
|
#ifdef ENABLE_OPENSSL
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#endif
|
#endif
|
||||||
|
#ifdef ENABLE_NSS
|
||||||
|
#include <pk11pub.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#if defined(HAVE_LIBSCRYPT_H) && defined(HAVE_LIBSCRYPT_SCRYPT)
|
#if defined(HAVE_LIBSCRYPT_H) && defined(HAVE_LIBSCRYPT_SCRYPT)
|
||||||
#define HAVE_SCRYPT
|
#define HAVE_SCRYPT
|
||||||
@ -267,13 +271,13 @@ secret_to_key_compute_key(uint8_t *key_out, size_t key_out_len,
|
|||||||
return (int)key_out_len;
|
return (int)key_out_len;
|
||||||
|
|
||||||
case S2K_TYPE_PBKDF2: {
|
case S2K_TYPE_PBKDF2: {
|
||||||
#ifdef ENABLE_OPENSSL
|
|
||||||
uint8_t log_iters;
|
uint8_t log_iters;
|
||||||
if (spec_len < 1 || secret_len > INT_MAX || spec_len > INT_MAX)
|
if (spec_len < 1 || secret_len > INT_MAX || spec_len > INT_MAX)
|
||||||
return S2K_BAD_LEN;
|
return S2K_BAD_LEN;
|
||||||
log_iters = spec[spec_len-1];
|
log_iters = spec[spec_len-1];
|
||||||
if (log_iters > 31)
|
if (log_iters > 31)
|
||||||
return S2K_BAD_PARAMS;
|
return S2K_BAD_PARAMS;
|
||||||
|
#ifdef ENABLE_OPENSSL
|
||||||
rv = PKCS5_PBKDF2_HMAC_SHA1(secret, (int)secret_len,
|
rv = PKCS5_PBKDF2_HMAC_SHA1(secret, (int)secret_len,
|
||||||
spec, (int)spec_len-1,
|
spec, (int)spec_len-1,
|
||||||
(1<<log_iters),
|
(1<<log_iters),
|
||||||
@ -282,8 +286,45 @@ secret_to_key_compute_key(uint8_t *key_out, size_t key_out_len,
|
|||||||
return S2K_FAILED;
|
return S2K_FAILED;
|
||||||
return (int)key_out_len;
|
return (int)key_out_len;
|
||||||
#else
|
#else
|
||||||
// XXXXXXXXXXXXXXXXXXXXXXXX implement me.
|
SECItem passItem = { .type = siBuffer,
|
||||||
return S2K_NO_SCRYPT_SUPPORT;
|
.data = (unsigned char *) secret,
|
||||||
|
.len = (int)secret_len };
|
||||||
|
SECItem saltItem = { .type = siBuffer,
|
||||||
|
.data = (unsigned char *) spec,
|
||||||
|
.len = (int)spec_len - 1 };
|
||||||
|
SECAlgorithmID *alg = NULL;
|
||||||
|
PK11SymKey *key = NULL;
|
||||||
|
|
||||||
|
rv = S2K_FAILED;
|
||||||
|
alg = PK11_CreatePBEV2AlgorithmID(
|
||||||
|
SEC_OID_PKCS5_PBKDF2, SEC_OID_HMAC_SHA1, SEC_OID_HMAC_SHA1,
|
||||||
|
(int)key_out_len, (1<<log_iters), &saltItem);
|
||||||
|
if (alg == NULL)
|
||||||
|
return S2K_FAILED;
|
||||||
|
|
||||||
|
key = PK11_PBEKeyGen(NULL /* slot */,
|
||||||
|
alg,
|
||||||
|
&passItem,
|
||||||
|
false,
|
||||||
|
NULL);
|
||||||
|
|
||||||
|
SECStatus st = PK11_ExtractKeyValue(key);
|
||||||
|
if (st != SECSuccess)
|
||||||
|
goto nss_pbkdf_err;
|
||||||
|
|
||||||
|
const SECItem *iptr = PK11_GetKeyData(key);
|
||||||
|
if (iptr == NULL)
|
||||||
|
goto nss_pbkdf_err;
|
||||||
|
|
||||||
|
rv = MIN((int)iptr->len, (int)key_out_len);
|
||||||
|
memcpy(key_out, iptr->data, rv);
|
||||||
|
|
||||||
|
nss_pbkdf_err:
|
||||||
|
if (key)
|
||||||
|
PK11_FreeSymKey(key);
|
||||||
|
if (alg)
|
||||||
|
SECOID_DestroyAlgorithmID(alg, PR_TRUE);
|
||||||
|
return rv;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user