Botan 3.11.0
Crypto and TLS for C&
scrypt.cpp
Go to the documentation of this file.
1/**
2* (C) 2018 Jack Lloyd
3* (C) 2018 Ribose Inc
4*
5* Botan is released under the Simplified BSD License (see license.txt)
6*/
7
8#include <botan/scrypt.h>
9
10#include <botan/exceptn.h>
11#include <botan/pbkdf2.h>
12#include <botan/internal/bit_ops.h>
13#include <botan/internal/fmt.h>
14#include <botan/internal/loadstor.h>
15#include <botan/internal/mem_utils.h>
16#include <botan/internal/salsa20.h>
17#include <botan/internal/time_utils.h>
18
19namespace Botan {
20
21namespace {
22
23size_t scrypt_memory_usage(size_t N, size_t r, size_t p) {
24 return 128 * r * (N + p);
25}
26
27} // namespace
28
29std::string Scrypt_Family::name() const {
30 return "Scrypt";
31}
32
33std::unique_ptr<PasswordHash> Scrypt_Family::default_params() const {
34 return std::make_unique<Scrypt>(32768, 8, 1);
35}
36
37std::unique_ptr<PasswordHash> Scrypt_Family::tune_params(size_t /*output_length*/,
38 uint64_t desired_msec,
39 std::optional<size_t> max_memory,
40 uint64_t tuning_msec) const {
41 /*
42 * Some rough relations between scrypt parameters and runtime.
43 * Denote here by stime(N,r,p) the msec it takes to run scrypt.
44 *
45 * Empirically for smaller sizes:
46 * stime(N,8*r,p) / stime(N,r,p) is ~ 6-7
47 * stime(N,r,8*p) / stime(N,r,8*p) is ~ 7
48 * stime(2*N,r,p) / stime(N,r,p) is ~ 2
49 *
50 * Compute stime(8192,1,1) as baseline and extrapolate
51 */
52
53 // If max_memory is nullopt or zero this becomes zero and is ignored
54 const size_t max_memory_bytes = max_memory.value_or(0) * 1024 * 1024;
55
56 // Starting parameters
57 size_t N = 8 * 1024;
58 size_t r = 1;
59 size_t p = 1;
60
61 auto pwdhash = this->from_params(N, r, p);
62
63 const uint64_t measured_time = measure_cost(tuning_msec, [&]() {
64 uint8_t output[32] = {0};
65 pwdhash->derive_key(output, sizeof(output), "test", 4, nullptr, 0);
66 });
67
68 const uint64_t target_nsec = desired_msec * static_cast<uint64_t>(1000000);
69
70 uint64_t est_nsec = measured_time;
71
72 // In below code we invoke scrypt_memory_usage with p == 0 as p contributes
73 // (very slightly) to memory consumption, but N is the driving factor.
74 // Including p leads to using an N half as large as what the user would expect.
75
76 // First increase r by 8x if possible
77 if(max_memory_bytes == 0 || scrypt_memory_usage(N, r * 8, 0) <= max_memory_bytes) {
78 if(target_nsec / est_nsec >= 5) {
79 r *= 8;
80 est_nsec *= 5;
81 }
82 }
83
84 // Now double N as many times as we can
85 while(max_memory_bytes == 0 || scrypt_memory_usage(N * 2, r, 0) <= max_memory_bytes) {
86 if(target_nsec / est_nsec >= 2) {
87 N *= 2;
88 est_nsec *= 2;
89 } else {
90 break;
91 }
92 }
93
94 // If we have extra runtime budget, increment p
95 if(target_nsec / est_nsec >= 2) {
96 p *= std::min<size_t>(1024, static_cast<size_t>(target_nsec / est_nsec));
97 }
98
99 return std::make_unique<Scrypt>(N, r, p);
100}
101
102std::unique_ptr<PasswordHash> Scrypt_Family::from_params(size_t N, size_t r, size_t p) const {
103 return std::make_unique<Scrypt>(N, r, p);
104}
105
106std::unique_ptr<PasswordHash> Scrypt_Family::from_iterations(size_t iter) const {
107 const size_t r = 8;
108 const size_t p = 1;
109
110 size_t N = 8192;
111
112 if(iter > 50000) {
113 N = 16384;
114 }
115 if(iter > 100000) {
116 N = 32768;
117 }
118 if(iter > 150000) {
119 N = 65536;
120 }
121
122 return std::make_unique<Scrypt>(N, r, p);
123}
124
125Scrypt::Scrypt(size_t N, size_t r, size_t p) : m_N(N), m_r(r), m_p(p) {
126 if(!is_power_of_2(N)) {
127 throw Invalid_Argument("Scrypt N parameter must be a power of 2");
128 }
129
130 if(p == 0 || p > 1024) {
131 throw Invalid_Argument("Invalid or unsupported scrypt p");
132 }
133 if(r == 0 || r > 256) {
134 throw Invalid_Argument("Invalid or unsupported scrypt r");
135 }
136 if(N < 1 || N > 4194304) {
137 throw Invalid_Argument("Invalid or unsupported scrypt N");
138 }
139}
140
141std::string Scrypt::to_string() const {
142 return fmt("Scrypt({},{},{})", m_N, m_r, m_p);
143}
144
146 const size_t N = memory_param();
147 const size_t p = parallelism();
148 const size_t r = iterations();
149
150 return scrypt_memory_usage(N, r, p);
151}
152
153namespace {
154
155void scryptBlockMix(size_t r, uint8_t* B, uint8_t* Y) {
156 uint32_t B32[16];
158 copy_mem(X.data(), &B[(2 * r - 1) * 64], 64);
159
160 for(size_t i = 0; i != 2 * r; i++) {
161 xor_buf(X.data(), &B[64 * i], 64);
162 load_le<uint32_t>(B32, X.data(), 16);
163 Salsa20::salsa_core(X.data(), B32, 8);
164 copy_mem(&Y[64 * i], X.data(), 64);
165 }
166
167 for(size_t i = 0; i < r; ++i) {
168 copy_mem(&B[i * 64], &Y[(i * 2) * 64], 64);
169 }
170
171 for(size_t i = 0; i < r; ++i) {
172 copy_mem(&B[(i + r) * 64], &Y[(i * 2 + 1) * 64], 64);
173 }
174}
175
176void scryptROMmix(size_t r, size_t N, uint8_t* B, secure_vector<uint8_t>& V) {
177 const size_t S = 128 * r;
178
179 for(size_t i = 0; i != N; ++i) {
180 copy_mem(&V[S * i], B, S);
181 scryptBlockMix(r, B, &V[N * S]);
182 }
183
184 for(size_t i = 0; i != N; ++i) {
185 // compiler doesn't know here that N is power of 2
186 const size_t j = load_le<uint32_t>(&B[(2 * r - 1) * 64], 0) & (N - 1);
187 xor_buf(B, &V[j * S], S);
188 scryptBlockMix(r, B, &V[N * S]);
189 }
190}
191
192} // namespace
193
194void Scrypt::derive_key(uint8_t output[],
195 size_t output_len,
196 const char* password,
197 size_t password_len,
198 const uint8_t salt[],
199 size_t salt_len) const {
200 const size_t N = memory_param();
201 const size_t p = parallelism();
202 const size_t r = iterations();
203
204 const size_t S = 128 * r;
205 secure_vector<uint8_t> B(p * S);
206 // temp space
207 secure_vector<uint8_t> V((N + 1) * S);
208
209 auto hmac_sha256 = MessageAuthenticationCode::create_or_throw("HMAC(SHA-256)");
210
211 try {
212 hmac_sha256->set_key(as_span_of_bytes(password, password_len));
213 } catch(Invalid_Key_Length&) {
214 throw Invalid_Argument("Scrypt cannot accept passphrases of the provided length");
215 }
216
217 pbkdf2(*hmac_sha256, B.data(), B.size(), salt, salt_len, 1);
218
219 // these can be parallel
220 for(size_t i = 0; i != p; ++i) {
221 scryptROMmix(r, N, &B[128 * r * i], V);
222 }
223
224 pbkdf2(*hmac_sha256, output, output_len, B.data(), B.size(), 1);
225}
226
227} // namespace Botan
static std::unique_ptr< MessageAuthenticationCode > create_or_throw(std::string_view algo_spec, std::string_view provider="")
Definition mac.cpp:147
static void salsa_core(uint8_t output[64], const uint32_t input[16], size_t rounds)
Definition salsa20.cpp:75
std::unique_ptr< PasswordHash > from_params(size_t N, size_t r, size_t p) const override
Definition scrypt.cpp:102
std::unique_ptr< PasswordHash > tune_params(size_t output_len, uint64_t desired_runtime_msec, std::optional< size_t > max_memory, uint64_t tune_msec) const override
Definition scrypt.cpp:37
std::unique_ptr< PasswordHash > from_iterations(size_t iter) const override
Definition scrypt.cpp:106
std::string name() const override
Definition scrypt.cpp:29
std::unique_ptr< PasswordHash > default_params() const override
Definition scrypt.cpp:33
std::string to_string() const override
Definition scrypt.cpp:141
size_t memory_param() const override
Definition scrypt.h:41
size_t iterations() const override
Definition scrypt.h:37
size_t parallelism() const override
Definition scrypt.h:39
size_t total_memory_usage() const override
Definition scrypt.cpp:145
Scrypt(size_t N, size_t r, size_t p)
Definition scrypt.cpp:125
void derive_key(uint8_t out[], size_t out_len, const char *password, size_t password_len, const uint8_t salt[], size_t salt_len) const override
Definition scrypt.cpp:194
BOTAN_FORCE_INLINE constexpr bool is_power_of_2(T arg)
Definition bit_ops.h:62
std::span< const uint8_t > as_span_of_bytes(const char *s, size_t len)
Definition mem_utils.h:59
constexpr void copy_mem(T *out, const T *in, size_t n)
Definition mem_ops.h:144
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53
constexpr auto load_le(ParamTs &&... params)
Definition loadstor.h:495
constexpr void xor_buf(ranges::contiguous_output_range< uint8_t > auto &&out, ranges::contiguous_range< uint8_t > auto &&in)
Definition mem_ops.h:341
std::vector< T, secure_allocator< T > > secure_vector
Definition secmem.h:68
size_t pbkdf2(MessageAuthenticationCode &prf, uint8_t out[], size_t out_len, std::string_view password, const uint8_t salt[], size_t salt_len, size_t iterations, std::chrono::milliseconds msec)
Definition pbkdf2.cpp:72
uint64_t measure_cost(uint64_t trial_msec, F func)
Definition time_utils.h:19