Botan 3.12.0
Crypto and TLS for C&
pbkdf2.cpp
Go to the documentation of this file.
1/*
2* PBKDF2
3* (C) 1999-2007 Jack Lloyd
4* (C) 2018 Ribose Inc
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#include <botan/pbkdf2.h>
10
11#include <botan/exceptn.h>
12#include <botan/mem_ops.h>
13#include <botan/internal/bit_ops.h>
14#include <botan/internal/fmt.h>
15#include <botan/internal/mem_utils.h>
16#include <botan/internal/time_utils.h>
17
18namespace Botan {
19
20namespace {
21
22void pbkdf2_set_key(MessageAuthenticationCode& prf, const char* password, size_t password_len) {
23 try {
24 prf.set_key(as_span_of_bytes(password, password_len));
25 } catch(Invalid_Key_Length&) {
26 throw Invalid_Argument("PBKDF2 cannot accept passphrase of the given size");
27 }
28}
29
30size_t tune_pbkdf2(MessageAuthenticationCode& prf,
31 size_t output_length,
32 uint64_t desired_msec,
33 uint64_t tuning_msec = 10) {
34 if(output_length == 0) {
35 output_length = 1;
36 }
37
38 const size_t prf_sz = prf.output_length();
39 BOTAN_ASSERT_NOMSG(prf_sz > 0);
40 const secure_vector<uint8_t> U(prf_sz);
41
42 const size_t trial_iterations = 2000;
43
44 // Short output ensures we only need a single PBKDF2 block
45
46 prf.set_key(nullptr, 0);
47
48 const uint64_t duration_nsec = measure_cost(tuning_msec, [&]() {
49 uint8_t out[12] = {0};
50 uint8_t salt[12] = {0};
51 pbkdf2(prf, out, sizeof(out), salt, sizeof(salt), trial_iterations);
52 });
53
54 const uint64_t desired_nsec = desired_msec * 1000000;
55
56 if(duration_nsec > desired_nsec) {
57 return trial_iterations;
58 }
59
60 const size_t blocks_needed = (output_length + prf_sz - 1) / prf_sz;
61
62 const size_t multiplier = static_cast<size_t>(desired_nsec / duration_nsec / blocks_needed);
63
64 if(multiplier == 0) {
65 return trial_iterations;
66 } else {
67 return trial_iterations * multiplier;
68 }
69}
70
71} // namespace
72
74 uint8_t out[],
75 size_t out_len,
76 std::string_view password,
77 const uint8_t salt[],
78 size_t salt_len,
79 size_t iterations,
80 std::chrono::milliseconds msec) {
81 if(iterations == 0) {
82 iterations = tune_pbkdf2(prf, out_len, msec.count());
83 }
84
85 const PBKDF2 pbkdf2(prf, iterations);
86
87 pbkdf2.derive_key(out, out_len, password.data(), password.size(), salt, salt_len);
88
89 return iterations;
90}
91
93 uint8_t out[],
94 size_t out_len,
95 const uint8_t salt[],
96 size_t salt_len,
97 size_t iterations) {
98 if(iterations == 0) {
99 throw Invalid_Argument("PBKDF2: Invalid iteration count");
100 }
101
102 clear_mem(out, out_len);
103
104 if(out_len == 0) {
105 return;
106 }
107
108 const size_t prf_sz = prf.output_length();
109 BOTAN_ASSERT_NOMSG(prf_sz > 0);
110
111 // RFC 2898 Section 5.2: derived key length limited to (2^32 - 1) * hLen
112 const auto blocks_required = ceil_division<uint64_t>(out_len, prf_sz);
113 BOTAN_ARG_CHECK(blocks_required <= 0xFFFFFFFE, "PBKDF2 maximum output length exceeded");
114
115 secure_vector<uint8_t> U(prf_sz);
116
117 uint32_t counter = 1;
118 while(out_len > 0) {
119 const size_t prf_output = std::min<size_t>(prf_sz, out_len);
120
121 prf.update(salt, salt_len);
122 prf.update_be(counter++);
123 prf.final(U.data());
124
125 xor_buf(out, U.data(), prf_output);
126
127 for(size_t i = 1; i != iterations; ++i) {
128 prf.update(U);
129 prf.final(U.data());
130 xor_buf(out, U.data(), prf_output);
131 }
132
133 out_len -= prf_output;
134 out += prf_output;
135 }
136}
137
138// PBKDF interface
139size_t PKCS5_PBKDF2::pbkdf(uint8_t key[],
140 size_t key_len,
141 std::string_view password,
142 const uint8_t salt[],
143 size_t salt_len,
144 size_t iterations,
145 std::chrono::milliseconds msec) const {
146 if(iterations == 0) {
147 iterations = tune_pbkdf2(*m_mac, key_len, msec.count());
148 }
149
150 const PBKDF2 pbkdf2(*m_mac, iterations);
151
152 pbkdf2.derive_key(key, key_len, password.data(), password.size(), salt, salt_len);
153
154 return iterations;
155}
156
157std::string PKCS5_PBKDF2::name() const {
158 return fmt("PBKDF2({})", m_mac->name());
159}
160
161std::unique_ptr<PBKDF> PKCS5_PBKDF2::new_object() const {
162 return std::make_unique<PKCS5_PBKDF2>(m_mac->new_object());
163}
164
165// PasswordHash interface
166
167PBKDF2::PBKDF2(const MessageAuthenticationCode& prf, size_t olen, std::chrono::milliseconds msec) :
168 m_prf(prf.new_object()), m_iterations(tune_pbkdf2(*m_prf, olen, msec.count())) {}
169
170std::string PBKDF2::to_string() const {
171 return fmt("PBKDF2({},{})", m_prf->name(), m_iterations);
172}
173
174void PBKDF2::derive_key(uint8_t out[],
175 size_t out_len,
176 const char* password,
177 const size_t password_len,
178 const uint8_t salt[],
179 size_t salt_len) const {
180 pbkdf2_set_key(*m_prf, password, password_len);
181 pbkdf2(*m_prf, out, out_len, salt, salt_len, m_iterations);
182}
183
184std::string PBKDF2_Family::name() const {
185 return fmt("PBKDF2({})", m_prf->name());
186}
187
188std::unique_ptr<PasswordHash> PBKDF2_Family::tune_params(size_t output_len,
189 uint64_t desired_runtime_msec,
190 std::optional<size_t> /*max_memory*/,
191 uint64_t tune_msec) const {
192 auto iterations = tune_pbkdf2(*m_prf, output_len, desired_runtime_msec, tune_msec);
193 return std::make_unique<PBKDF2>(*m_prf, iterations);
194}
195
196std::unique_ptr<PasswordHash> PBKDF2_Family::default_params() const {
197 return std::make_unique<PBKDF2>(*m_prf, 150000);
198}
199
200std::unique_ptr<PasswordHash> PBKDF2_Family::from_params(size_t iter, size_t /*i2*/, size_t /*i3*/) const {
201 return std::make_unique<PBKDF2>(*m_prf, iter);
202}
203
204std::unique_ptr<PasswordHash> PBKDF2_Family::from_iterations(size_t iter) const {
205 return std::make_unique<PBKDF2>(*m_prf, iter);
206}
207
208} // namespace Botan
#define BOTAN_ASSERT_NOMSG(expr)
Definition assert.h:75
#define BOTAN_ARG_CHECK(expr, msg)
Definition assert.h:33
void update(const uint8_t in[], size_t length)
Definition buf_comp.h:34
virtual size_t output_length() const =0
void update_be(uint16_t val)
Definition buf_comp.cpp:18
void final(uint8_t out[])
Definition buf_comp.h:69
std::unique_ptr< PasswordHash > tune_params(size_t output_len, uint64_t desired_runtime_msec, std::optional< size_t > max_memory, uint64_t tune_msec) const override
Definition pbkdf2.cpp:188
std::string name() const override
Definition pbkdf2.cpp:184
std::unique_ptr< PasswordHash > default_params() const override
Definition pbkdf2.cpp:196
std::unique_ptr< PasswordHash > from_iterations(size_t iter) const override
Definition pbkdf2.cpp:204
std::unique_ptr< PasswordHash > from_params(size_t iter, size_t, size_t) const override
Definition pbkdf2.cpp:200
PBKDF2(const MessageAuthenticationCode &prf, size_t iter)
Definition pbkdf2.h:47
void derive_key(uint8_t out[], size_t out_len, const char *password, size_t password_len, const uint8_t salt[], size_t salt_len) const override
Definition pbkdf2.cpp:174
std::string to_string() const override
Definition pbkdf2.cpp:170
size_t pbkdf(uint8_t output_buf[], size_t output_len, std::string_view passphrase, const uint8_t salt[], size_t salt_len, size_t iterations, std::chrono::milliseconds msec) const override
Definition pbkdf2.cpp:139
std::string name() const override
Definition pbkdf2.cpp:157
std::unique_ptr< PBKDF > new_object() const override
Definition pbkdf2.cpp:161
std::span< const uint8_t > as_span_of_bytes(const char *s, size_t len)
Definition mem_utils.h:59
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53
BOTAN_FORCE_INLINE constexpr T ceil_division(T a, T b)
Definition bit_ops.h:167
constexpr void xor_buf(ranges::contiguous_output_range< uint8_t > auto &&out, ranges::contiguous_range< uint8_t > auto &&in)
Definition mem_ops.h:341
std::vector< T, secure_allocator< T > > secure_vector
Definition secmem.h:68
size_t pbkdf2(MessageAuthenticationCode &prf, uint8_t out[], size_t out_len, std::string_view password, const uint8_t salt[], size_t salt_len, size_t iterations, std::chrono::milliseconds msec)
Definition pbkdf2.cpp:73
uint64_t measure_cost(uint64_t trial_msec, F func)
Definition time_utils.h:19
constexpr void clear_mem(T *ptr, size_t n)
Definition mem_ops.h:118