Botan 3.9.0
Crypto and TLS for C&
Botan::PBKDF Class Referenceabstract

#include <pbkdf.h>

Inheritance diagram for Botan::PBKDF:
Botan::OpenPGP_S2K Botan::PKCS5_PBKDF2

Public Member Functions

PBKDFclone () const
template<typename Alloc>
OctetString derive_key (size_t out_len, std::string_view passphrase, const std::vector< uint8_t, Alloc > &salt, size_t iterations) const
template<typename Alloc>
OctetString derive_key (size_t out_len, std::string_view passphrase, const std::vector< uint8_t, Alloc > &salt, std::chrono::milliseconds msec, size_t &iterations) const
OctetString derive_key (size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations) const
OctetString derive_key (size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, std::chrono::milliseconds msec, size_t &iterations) const
virtual std::string name () const =0
virtual std::unique_ptr< PBKDFnew_object () const =0
virtual size_t pbkdf (uint8_t out[], size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations, std::chrono::milliseconds msec) const =0
secure_vector< uint8_t > pbkdf_iterations (size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations) const
void pbkdf_iterations (uint8_t out[], size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations) const
secure_vector< uint8_t > pbkdf_timed (size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, std::chrono::milliseconds msec, size_t &iterations) const
void pbkdf_timed (uint8_t out[], size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, std::chrono::milliseconds msec, size_t &iterations) const
virtual ~PBKDF ()=default

Static Public Member Functions

static std::unique_ptr< PBKDFcreate (std::string_view algo_spec, std::string_view provider="")
static std::unique_ptr< PBKDFcreate_or_throw (std::string_view algo_spec, std::string_view provider="")
static std::vector< std::string > providers (std::string_view algo_spec)

Detailed Description

Base class for PBKDF (password based key derivation function) implementations. Converts a password into a key using a salt and iterated hashing to make brute force attacks harder.

Starting in 2.8 this functionality is also offered by PasswordHash.

Warning
This class will be removed in a future major release. Use PasswordHash

Definition at line 34 of file pbkdf.h.

Constructor & Destructor Documentation

◆ ~PBKDF()

virtual Botan::PBKDF::~PBKDF ( )
virtualdefault

Member Function Documentation

◆ clone()

PBKDF * Botan::PBKDF::clone ( ) const
inline
Returns
new instance of this same algorithm

Definition at line 67 of file pbkdf.h.

67{ return this->new_object().release(); }
virtual std::unique_ptr< PBKDF > new_object() const =0

References new_object().

◆ create()

std::unique_ptr< PBKDF > Botan::PBKDF::create ( std::string_view algo_spec,
std::string_view provider = "" )
static

Create an instance based on a name If provider is empty then best available is chosen.

Parameters
algo_specalgorithm name
providerprovider implementation to choose
Returns
a null pointer if the algo/provider combination cannot be found

Definition at line 24 of file pbkdf.cpp.

24 {
25 const SCAN_Name req(algo_spec);
26
27#if defined(BOTAN_HAS_PBKDF2)
28 if(req.algo_name() == "PBKDF2") {
29 if(provider.empty() || provider == "base") {
30 if(auto mac = MessageAuthenticationCode::create("HMAC(" + req.arg(0) + ")")) {
31 return std::make_unique<PKCS5_PBKDF2>(std::move(mac));
32 }
33
34 if(auto mac = MessageAuthenticationCode::create(req.arg(0))) {
35 return std::make_unique<PKCS5_PBKDF2>(std::move(mac));
36 }
37 }
38
39 return nullptr;
40 }
41#endif
42
43#if defined(BOTAN_HAS_PGP_S2K)
44 if(req.algo_name() == "OpenPGP-S2K" && req.arg_count() == 1) {
45 if(auto hash = HashFunction::create(req.arg(0))) {
46 return std::make_unique<OpenPGP_S2K>(std::move(hash));
47 }
48 }
49#endif
50
51 BOTAN_UNUSED(req, provider);
52
53 return nullptr;
54}
#define BOTAN_UNUSED
Definition assert.h:144
static std::unique_ptr< HashFunction > create(std::string_view algo_spec, std::string_view provider="")
Definition hash.cpp:107
static std::unique_ptr< MessageAuthenticationCode > create(std::string_view algo_spec, std::string_view provider="")
Definition mac.cpp:51

References Botan::SCAN_Name::algo_name(), Botan::SCAN_Name::arg(), Botan::SCAN_Name::arg_count(), BOTAN_UNUSED, Botan::HashFunction::create(), and Botan::MessageAuthenticationCode::create().

Referenced by create_or_throw().

◆ create_or_throw()

std::unique_ptr< PBKDF > Botan::PBKDF::create_or_throw ( std::string_view algo_spec,
std::string_view provider = "" )
static

Create an instance based on a name, or throw if the algo/provider combination cannot be found. If provider is empty then best available is chosen.

Definition at line 57 of file pbkdf.cpp.

57 {
58 if(auto pbkdf = PBKDF::create(algo, provider)) {
59 return pbkdf;
60 }
61 throw Lookup_Error("PBKDF", algo, provider);
62}
virtual size_t pbkdf(uint8_t out[], size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations, std::chrono::milliseconds msec) const =0
static std::unique_ptr< PBKDF > create(std::string_view algo_spec, std::string_view provider="")
Definition pbkdf.cpp:24

References create(), and pbkdf().

Referenced by Botan::get_pbkdf(), and Botan::get_s2k().

◆ derive_key() [1/4]

template<typename Alloc>
OctetString Botan::PBKDF::derive_key ( size_t out_len,
std::string_view passphrase,
const std::vector< uint8_t, Alloc > & salt,
size_t iterations ) const
inline

Derive a key from a passphrase

Parameters
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
iterationsthe number of iterations to use (use 10K or more)

Definition at line 191 of file pbkdf.h.

194 {
195 return OctetString(pbkdf_iterations(out_len, passphrase, salt.data(), salt.size(), iterations));
196 }
void pbkdf_iterations(uint8_t out[], size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations) const
Definition pbkdf.cpp:78

References pbkdf_iterations().

◆ derive_key() [2/4]

template<typename Alloc>
OctetString Botan::PBKDF::derive_key ( size_t out_len,
std::string_view passphrase,
const std::vector< uint8_t, Alloc > & salt,
std::chrono::milliseconds msec,
size_t & iterations ) const
inline

Derive a key from a passphrase using a certain amount of time

Parameters
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
msecis how long to run the PBKDF
iterationsis set to the number of iterations used

Definition at line 225 of file pbkdf.h.

229 {
230 return OctetString(pbkdf_timed(out_len, passphrase, salt.data(), salt.size(), msec, iterations));
231 }
void pbkdf_timed(uint8_t out[], size_t out_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, std::chrono::milliseconds msec, size_t &iterations) const
Definition pbkdf.cpp:68

References pbkdf_timed().

◆ derive_key() [3/4]

OctetString Botan::PBKDF::derive_key ( size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
size_t iterations ) const
inline

Derive a key from a passphrase

Parameters
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
iterationsthe number of iterations to use (use 10K or more)

Definition at line 178 of file pbkdf.h.

179 {
180 return OctetString(pbkdf_iterations(out_len, passphrase, salt, salt_len, iterations));
181 }

References pbkdf_iterations().

Referenced by Botan::check_passhash9(), and Botan::generate_passhash9().

◆ derive_key() [4/4]

OctetString Botan::PBKDF::derive_key ( size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
std::chrono::milliseconds msec,
size_t & iterations ) const
inline

Derive a key from a passphrase

Parameters
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
msecis how long to run the PBKDF
iterationsis set to the number of iterations used

Definition at line 207 of file pbkdf.h.

212 {
213 return OctetString(pbkdf_timed(out_len, passphrase, salt, salt_len, msec, iterations));
214 }

References pbkdf_timed().

◆ name()

virtual std::string Botan::PBKDF::name ( ) const
pure virtual
Returns
name of this PBKDF

Implemented in Botan::OpenPGP_S2K, and Botan::PKCS5_PBKDF2.

Referenced by pbkdf_iterations().

◆ new_object()

virtual std::unique_ptr< PBKDF > Botan::PBKDF::new_object ( ) const
pure virtual
Returns
new instance of this same algorithm

Implemented in Botan::OpenPGP_S2K, and Botan::PKCS5_PBKDF2.

Referenced by clone().

◆ pbkdf()

virtual size_t Botan::PBKDF::pbkdf ( uint8_t out[],
size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
size_t iterations,
std::chrono::milliseconds msec ) const
pure virtual

Derive a key from a passphrase for a number of iterations specified by either iterations or if iterations == 0 then running until msec time has elapsed.

Parameters
outbuffer to store the derived key, must be of out_len bytes
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
iterationsthe number of iterations to use (use 10K or more)
msecif iterations is zero, then instead the PBKDF is run until msec milliseconds has passed.
Returns
the number of iterations performed

Implemented in Botan::OpenPGP_S2K, and Botan::PKCS5_PBKDF2.

References pbkdf_iterations(), and pbkdf_timed().

Referenced by create_or_throw(), pbkdf_iterations(), and pbkdf_timed().

◆ pbkdf_iterations() [1/2]

secure_vector< uint8_t > Botan::PBKDF::pbkdf_iterations ( size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
size_t iterations ) const

Derive a key from a passphrase for a number of iterations.

Parameters
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
iterationsthe number of iterations to use (use 10K or more)
Returns
the derived key

Definition at line 93 of file pbkdf.cpp.

94 {
95 secure_vector<uint8_t> out(out_len);
96 pbkdf_iterations(out.data(), out_len, passphrase, salt, salt_len, iterations);
97 return out;
98}
std::vector< T, secure_allocator< T > > secure_vector
Definition secmem.h:69

References pbkdf_iterations().

◆ pbkdf_iterations() [2/2]

void Botan::PBKDF::pbkdf_iterations ( uint8_t out[],
size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
size_t iterations ) const

Derive a key from a passphrase for a number of iterations.

Parameters
outbuffer to store the derived key, must be of out_len bytes
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
iterationsthe number of iterations to use (use 10K or more)

Definition at line 78 of file pbkdf.cpp.

83 {
84 if(iterations == 0) {
85 throw Invalid_Argument(name() + ": Invalid iteration count");
86 }
87
88 const size_t iterations_run =
89 pbkdf(out, out_len, passphrase, salt, salt_len, iterations, std::chrono::milliseconds(0));
90 BOTAN_ASSERT_EQUAL(iterations, iterations_run, "Expected PBKDF iterations");
91}
#define BOTAN_ASSERT_EQUAL(expr1, expr2, assertion_made)
Definition assert.h:88
virtual std::string name() const =0

References BOTAN_ASSERT_EQUAL, name(), and pbkdf().

Referenced by derive_key(), derive_key(), pbkdf(), and pbkdf_iterations().

◆ pbkdf_timed() [1/2]

secure_vector< uint8_t > Botan::PBKDF::pbkdf_timed ( size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
std::chrono::milliseconds msec,
size_t & iterations ) const

Derive a key from a passphrase, running until msec time has elapsed.

Parameters
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
msecif iterations is zero, then instead the PBKDF is run until msec milliseconds has passed.
iterationsset to the number iterations executed
Returns
the derived key

Definition at line 100 of file pbkdf.cpp.

105 {
106 secure_vector<uint8_t> out(out_len);
107 pbkdf_timed(out.data(), out_len, passphrase, salt, salt_len, msec, iterations);
108 return out;
109}

References pbkdf_timed().

◆ pbkdf_timed() [2/2]

void Botan::PBKDF::pbkdf_timed ( uint8_t out[],
size_t out_len,
std::string_view passphrase,
const uint8_t salt[],
size_t salt_len,
std::chrono::milliseconds msec,
size_t & iterations ) const

Derive a key from a passphrase, running until msec time has elapsed.

Parameters
outbuffer to store the derived key, must be of out_len bytes
out_lenthe desired length of the key to produce
passphrasethe password to derive the key from
salta randomly chosen salt
salt_lenlength of salt in bytes
msecif iterations is zero, then instead the PBKDF is run until msec milliseconds has passed.
iterationsset to the number iterations executed

Definition at line 68 of file pbkdf.cpp.

74 {
75 iterations = pbkdf(out, out_len, passphrase, salt, salt_len, 0, msec);
76}

References pbkdf().

Referenced by derive_key(), derive_key(), pbkdf(), and pbkdf_timed().

◆ providers()

std::vector< std::string > Botan::PBKDF::providers ( std::string_view algo_spec)
static
Returns
list of available providers for this algorithm, empty if not available

Definition at line 64 of file pbkdf.cpp.

64 {
65 return probe_providers_of<PBKDF>(algo_spec);
66}
std::vector< std::string > probe_providers_of(std::string_view algo_spec, const std::vector< std::string > &possible={"base"})
Definition scan_name.h:105

References Botan::probe_providers_of().


The documentation for this class was generated from the following files: