Skip to content

Commit dcd229b

Browse files
authored
Merge pull request #1 from rnapier/pbkdf2
Pbkdf2
2 parents 9fe4c89 + 0f85b85 commit dcd229b

File tree

2 files changed

+274
-0
lines changed

2 files changed

+274
-0
lines changed

lib/std/crypto.zig

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,11 @@ pub const onetimeauth = struct {
3535
pub const Poly1305 = @import("crypto/poly1305.zig").Poly1305;
3636
};
3737

38+
/// Key derivation functions
39+
pub const kdf = struct {
40+
pub const pbkdf2 = @import("crypto/pbkdf2.zig").pbkdf2;
41+
};
42+
3843
/// Core functions, that should rarely be used directly by applications.
3944
pub const core = struct {
4045
pub const aes = @import("crypto/aes.zig");
@@ -77,6 +82,7 @@ test "crypto" {
7782
_ = @import("crypto/gimli.zig");
7883
_ = @import("crypto/hmac.zig");
7984
_ = @import("crypto/md5.zig");
85+
_ = @import("crypto/pbkdf2.zig");
8086
_ = @import("crypto/poly1305.zig");
8187
_ = @import("crypto/sha1.zig");
8288
_ = @import("crypto/sha2.zig");

lib/std/crypto/pbkdf2.zig

Lines changed: 268 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,268 @@
1+
// SPDX-License-Identifier: MIT
2+
// Copyright (c) 2015-2020 Zig Contributors
3+
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
4+
// The MIT license requires this copyright notice to be included in all copies
5+
// and substantial portions of the software.
6+
7+
const std = @import("std");
8+
const crypto = std.crypto;
9+
const debug = std.debug;
10+
const assert = debug.assert;
11+
const mem = std.mem;
12+
13+
//! PBKDF2 (Password-Based Key Derivation Function 2) is intended to turn a weak, human generated
14+
//! password into a strong key, suitable for cryptographic uses. It does this by salting and
15+
//! stretching the password. Salting injects non-secret random data, so that identical passwords
16+
//! will be converted into unique keys. Stretching applies a deliberately slow hashing function to
17+
//! frustrate brute-force guessing.
18+
//!
19+
//! PBKDF2 is defined in RFC 2898, and is a recommendation of NIST SP 800-132.
20+
21+
// RFC 2898 Section 5.2
22+
//
23+
// FromSpec:
24+
//
25+
// PBKDF2 applies a pseudorandom function (see Appendix B.1 for an
26+
// example) to derive keys. The length of the derived key is essentially
27+
// unbounded. (However, the maximum effective search space for the
28+
// derived key may be limited by the structure of the underlying
29+
// pseudorandom function. See Appendix B.1 for further discussion.)
30+
// PBKDF2 is recommended for new applications.
31+
//
32+
// PBKDF2 (P, S, c, dkLen)
33+
//
34+
// Options: PRF underlying pseudorandom function (hLen
35+
// denotes the length in octets of the
36+
// pseudorandom function output)
37+
//
38+
// Input: P password, an octet string
39+
// S salt, an octet string
40+
// c iteration count, a positive integer
41+
// dkLen intended length in octets of the derived
42+
// key, a positive integer, at most
43+
// (2^32 - 1) * hLen
44+
//
45+
// Output: DK derived key, a dkLen-octet string
46+
47+
// Based on Apple's CommonKeyDerivation, based originally on code by Damien Bergamini.
48+
49+
/// Apply PBKDF2 to generate a key from a password.
50+
///
51+
/// derivedKey: Slice of appropriate size for generated key. Generally 16 or 32 bytes in length.
52+
/// May be uninitialized. All bytes will be written.
53+
/// Maximum size is (2^32 - 1) * Hash.digest_length
54+
/// It is a programming error to pass buffer longer than the maximum size.
55+
///
56+
/// password: Arbitrary sequence of bytes of any length, including empty.
57+
///
58+
/// salt: Arbitrary sequence of bytes of any length, including empty. A common length is 8 bytes.
59+
///
60+
/// rounds: Iteration count. Must be greater than 0. Common values range from 1,000 to 100,000.
61+
/// Larger iteration counts improve security by increasing the time required to compute
62+
/// the derivedKey. It is common to tune this parameter to achieve approximately 100ms.
63+
///
64+
/// Prf: Pseudo-random function to use. A common choice is std.crypto.auth.hmac.HmacSha256.
65+
pub fn pbkdf2(derivedKey: []u8, password: []const u8, salt: []const u8, rounds: u32, comptime Prf: type) void {
66+
assert(rounds >= 1);
67+
68+
const dkLen: u64 = derivedKey.len;
69+
const hLen: u32 = Prf.mac_length; // Force type to ensure multiplications can't overflow
70+
71+
// FromSpec:
72+
//
73+
// 1. If dkLen > (2^32 - 1) * hLen, output "derived key too long" and
74+
// stop.
75+
//
76+
assert(dkLen > 0 and dkLen <= @as(u64, 1 << 32 - 1) * hLen);
77+
78+
// FromSpec:
79+
//
80+
// 2. Let l be the number of hLen-octet blocks in the derived key,
81+
// rounding up, and let r be the number of octets in the last
82+
// block
83+
//
84+
const l = (dkLen + hLen - 1) / hLen;
85+
var r = dkLen % hLen;
86+
r = if (r != 0) r else hLen;
87+
88+
// FromSpec:
89+
//
90+
// 3. For each block of the derived key apply the function F defined
91+
// below to the password P, the salt S, the iteration count c, and
92+
// the block index to compute the block:
93+
//
94+
// T_1 = F (P, S, c, 1) ,
95+
// T_2 = F (P, S, c, 2) ,
96+
// ...
97+
// T_l = F (P, S, c, l) ,
98+
//
99+
// where the function F is defined as the exclusive-or sum of the
100+
// first c iterates of the underlying pseudorandom function PRF
101+
// applied to the password P and the concatenation of the salt S
102+
// and the block index i:
103+
//
104+
// F (P, S, c, i) = U_1 \xor U_2 \xor ... \xor U_c
105+
//
106+
// where
107+
//
108+
// U_1 = PRF (P, S || INT (i)) ,
109+
// U_2 = PRF (P, U_1) ,
110+
// ...
111+
// U_c = PRF (P, U_{c-1}) .
112+
//
113+
// Here, INT (i) is a four-octet encoding of the integer i, most
114+
// significant octet first.
115+
//
116+
// 4. Concatenate the blocks and extract the first dkLen octets to
117+
// produce a derived key DK:
118+
//
119+
// DK = T_1 || T_2 || ... || T_l<0..r-1>
120+
121+
var block: u32 = 0; // Spec limits to u32
122+
while (block < l) : (block += 1) {
123+
var prevBlock: [hLen]u8 = undefined;
124+
var newBlock: [hLen]u8 = undefined;
125+
126+
// U_1 = PRF (P, S || INT (i))
127+
const blockIndex = mem.toBytes(mem.nativeToBig(u32, block + 1)); // Block index starts at 0001
128+
var ctx = Prf.init(password);
129+
ctx.update(salt);
130+
ctx.update(blockIndex[0..]);
131+
ctx.final(prevBlock[0..]);
132+
133+
// Choose portion of DK to write into (T_n) and initialize
134+
const offset: u64 = @as(u64, block) * hLen;
135+
const blockLen = if (block != l - 1) hLen else r;
136+
var dkBlock = derivedKey[offset..(offset + blockLen)];
137+
mem.copy(u8, dkBlock, prevBlock[0..dkBlock.len]);
138+
139+
var i: u32 = 1;
140+
while (i < rounds) : (i += 1) {
141+
// U_c = PRF (P, U_{c-1})
142+
Prf.create(&newBlock, prevBlock[0..], password);
143+
mem.copy(u8, prevBlock[0..], newBlock[0..]);
144+
145+
// F (P, S, c, i) = U_1 \xor U_2 \xor ... \xor U_c
146+
for (dkBlock) |_, j| {
147+
dkBlock[j] ^= newBlock[j];
148+
}
149+
}
150+
}
151+
}
152+
153+
const htest = @import("test.zig");
154+
155+
// RFC 6070 PBKDF2 HMAC-SHA1 Test Vectors
156+
test "RFC 6070 one iteration" {
157+
const p = "password";
158+
const s = "salt";
159+
const c = 1;
160+
const dkLen = 20;
161+
162+
var derivedKey: [dkLen]u8 = undefined;
163+
164+
pbkdf2(&derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
165+
166+
const expected = "0c60c80f961f0e71f3a9b524af6012062fe037a6";
167+
168+
htest.assertEqual(expected, derivedKey[0..]);
169+
}
170+
171+
test "RFC 6070 two iterations" {
172+
const p = "password";
173+
const s = "salt";
174+
const c = 2;
175+
const dkLen = 20;
176+
177+
var derivedKey: [dkLen]u8 = undefined;
178+
179+
pbkdf2(&derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
180+
181+
const expected = "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957";
182+
183+
htest.assertEqual(expected, derivedKey[0..]);
184+
}
185+
186+
test "RFC 6070 4096 iterations" {
187+
const p = "password";
188+
const s = "salt";
189+
const c = 4096;
190+
const dkLen = 20;
191+
192+
var derivedKey: [dkLen]u8 = undefined;
193+
194+
pbkdf2(&derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
195+
196+
const expected = "4b007901b765489abead49d926f721d065a429c1";
197+
198+
htest.assertEqual(expected, derivedKey[0..]);
199+
}
200+
201+
test "RFC 6070 16,777,216 iterations" {
202+
// These iteration tests are slow so we always skip them. Results have been verified.
203+
if (true) {
204+
return error.SkipZigTest;
205+
}
206+
207+
const p = "password";
208+
const s = "salt";
209+
const c = 16777216;
210+
const dkLen = 20;
211+
212+
var derivedKey = [_]u8{0} ** dkLen;
213+
214+
pbkdf2(&derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
215+
216+
const expected = "eefe3d61cd4da4e4e9945b3d6ba2158c2634e984";
217+
218+
htest.assertEqual(expected, derivedKey[0..]);
219+
}
220+
221+
test "RFC 6070 multi-block salt and password" {
222+
const p = "passwordPASSWORDpassword";
223+
const s = "saltSALTsaltSALTsaltSALTsaltSALTsalt";
224+
const c = 4096;
225+
const dkLen = 25;
226+
227+
var derivedKey: [dkLen]u8 = undefined;
228+
229+
pbkdf2(&derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
230+
231+
const expected = "3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038";
232+
233+
htest.assertEqual(expected, derivedKey[0..]);
234+
}
235+
236+
test "RFC 6070 embedded NUL" {
237+
const p = "pass\x00word";
238+
const s = "sa\x00lt";
239+
const c = 4096;
240+
const dkLen = 16;
241+
242+
var derivedKey: [dkLen]u8 = undefined;
243+
244+
pbkdf2(&derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
245+
246+
const expected = "56fa6aa75548099dcc37d7f03425e0c3";
247+
248+
htest.assertEqual(expected, derivedKey[0..]);
249+
}
250+
251+
test "Very large dkLen" {
252+
// This test allocates 8GB of memory and is expected to take several hours to run.
253+
if (true) {
254+
return error.SkipZigTest;
255+
}
256+
const p = "password";
257+
const s = "salt";
258+
const c = 1;
259+
const dkLen = 1 << 33;
260+
261+
var derivedKey = try std.testing.allocator.alloc(u8, dkLen);
262+
defer {
263+
std.testing.allocator.free(derivedKey);
264+
}
265+
266+
pbkdf2(derivedKey, p, s, c, crypto.auth.hmac.HmacSha1);
267+
// Just verify this doesn't crash with an overflow
268+
}

0 commit comments

Comments
 (0)