| 1 | /* |
| 2 | * Copyright (C) 2017 Apple Inc. All rights reserved. |
| 3 | * Copyright (C) 2017 Metrological Group B.V. |
| 4 | * Copyright (C) 2017 Igalia S.L. |
| 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions |
| 8 | * are met: |
| 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in the |
| 13 | * documentation and/or other materials provided with the distribution. |
| 14 | * |
| 15 | * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' |
| 16 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, |
| 17 | * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| 18 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS |
| 19 | * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 20 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 21 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| 22 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 23 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 24 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF |
| 25 | * THE POSSIBILITY OF SUCH DAMAGE. |
| 26 | */ |
| 27 | |
| 28 | #include "config.h" |
| 29 | #include "CryptoAlgorithmHKDF.h" |
| 30 | |
| 31 | #if ENABLE(WEB_CRYPTO) |
| 32 | |
| 33 | #include "CryptoAlgorithmHkdfParams.h" |
| 34 | #include "CryptoKeyRaw.h" |
| 35 | #include "GCryptUtilities.h" |
| 36 | |
| 37 | namespace WebCore { |
| 38 | |
| 39 | // libgcrypt doesn't provide HKDF functionality, so we have to implement it manually. |
| 40 | // We should switch to the libgcrypt-provided implementation once it's available. |
| 41 | // https://bugs.webkit.org/show_bug.cgi?id=171536 |
| 42 | |
| 43 | static Optional<Vector<uint8_t>> gcryptDeriveBits(const Vector<uint8_t>& key, const Vector<uint8_t>& salt, const Vector<uint8_t>& info, size_t lengthInBytes, CryptoAlgorithmIdentifier identifier) |
| 44 | { |
| 45 | // libgcrypt doesn't provide HKDF support, so we have to implement |
| 46 | // the functionality ourselves as specified in RFC5869. |
| 47 | // https://www.ietf.org/rfc/rfc5869.txt |
| 48 | |
| 49 | auto macAlgorithm = hmacAlgorithm(identifier); |
| 50 | if (!macAlgorithm) |
| 51 | return WTF::nullopt; |
| 52 | |
| 53 | // We can immediately discard invalid output lengths, otherwise needed for the expand step. |
| 54 | size_t macLength = gcry_mac_get_algo_maclen(*macAlgorithm); |
| 55 | if (lengthInBytes > macLength * 255) |
| 56 | return WTF::nullopt; |
| 57 | |
| 58 | PAL::GCrypt::Handle<gcry_mac_hd_t> handle; |
| 59 | gcry_error_t error = gcry_mac_open(&handle, *macAlgorithm, 0, nullptr); |
| 60 | if (error != GPG_ERR_NO_ERROR) { |
| 61 | PAL::GCrypt::logError(error); |
| 62 | return WTF::nullopt; |
| 63 | } |
| 64 | |
| 65 | // Step 1 -- Extract. A pseudo-random key is generated with the specified algorithm |
| 66 | // for the given salt value (used as a key) and the 'input keying material'. |
| 67 | Vector<uint8_t> pseudoRandomKey(macLength); |
| 68 | { |
| 69 | // If the salt vector is empty, a zeroed-out key of macLength size should be used. |
| 70 | if (salt.isEmpty()) { |
| 71 | Vector<uint8_t> zeroedKey(macLength, 0); |
| 72 | error = gcry_mac_setkey(handle, zeroedKey.data(), zeroedKey.size()); |
| 73 | } else |
| 74 | error = gcry_mac_setkey(handle, salt.data(), salt.size()); |
| 75 | if (error != GPG_ERR_NO_ERROR) { |
| 76 | PAL::GCrypt::logError(error); |
| 77 | return WTF::nullopt; |
| 78 | } |
| 79 | |
| 80 | error = gcry_mac_write(handle, key.data(), key.size()); |
| 81 | if (error != GPG_ERR_NO_ERROR) { |
| 82 | PAL::GCrypt::logError(error); |
| 83 | return WTF::nullopt; |
| 84 | } |
| 85 | |
| 86 | size_t pseudoRandomKeySize = pseudoRandomKey.size(); |
| 87 | error = gcry_mac_read(handle, pseudoRandomKey.data(), &pseudoRandomKeySize); |
| 88 | if (error != GPG_ERR_NO_ERROR) { |
| 89 | PAL::GCrypt::logError(error); |
| 90 | return WTF::nullopt; |
| 91 | } |
| 92 | |
| 93 | // Something went wrong if libgcrypt didn't write out the proper amount of data. |
| 94 | if (pseudoRandomKeySize != macLength) |
| 95 | return WTF::nullopt; |
| 96 | } |
| 97 | |
| 98 | // Step #2 -- Expand. |
| 99 | Vector<uint8_t> output; |
| 100 | { |
| 101 | // Deduce the number of needed iterations to retrieve the necessary amount of data. |
| 102 | size_t numIterations = (lengthInBytes + macLength) / macLength; |
| 103 | // Block from the previous iteration is used in the current one, except |
| 104 | // in the first iteration when it's empty. |
| 105 | Vector<uint8_t> lastBlock(macLength); |
| 106 | |
| 107 | for (size_t i = 0; i < numIterations; ++i) { |
| 108 | error = gcry_mac_reset(handle); |
| 109 | if (error != GPG_ERR_NO_ERROR) { |
| 110 | PAL::GCrypt::logError(error); |
| 111 | return WTF::nullopt; |
| 112 | } |
| 113 | |
| 114 | error = gcry_mac_setkey(handle, pseudoRandomKey.data(), pseudoRandomKey.size()); |
| 115 | if (error != GPG_ERR_NO_ERROR) { |
| 116 | PAL::GCrypt::logError(error); |
| 117 | return WTF::nullopt; |
| 118 | } |
| 119 | |
| 120 | // T(0) = empty string (zero length) -- i.e. empty lastBlock |
| 121 | // T(i) = HMAC-Hash(PRK, T(i-1) | info | hex(i)) -- | represents concatenation |
| 122 | Vector<uint8_t> blockData; |
| 123 | if (i) |
| 124 | blockData.appendVector(lastBlock); |
| 125 | blockData.appendVector(info); |
| 126 | blockData.append(i + 1); |
| 127 | |
| 128 | error = gcry_mac_write(handle, blockData.data(), blockData.size()); |
| 129 | if (error != GPG_ERR_NO_ERROR) { |
| 130 | PAL::GCrypt::logError(error); |
| 131 | return WTF::nullopt; |
| 132 | } |
| 133 | |
| 134 | size_t blockSize = lastBlock.size(); |
| 135 | error = gcry_mac_read(handle, lastBlock.data(), &blockSize); |
| 136 | if (error != GPG_ERR_NO_ERROR) { |
| 137 | PAL::GCrypt::logError(error); |
| 138 | return WTF::nullopt; |
| 139 | } |
| 140 | |
| 141 | // Something went wrong if libgcrypt didn't write out the proper amount of data. |
| 142 | if (blockSize != lastBlock.size()) |
| 143 | return WTF::nullopt; |
| 144 | |
| 145 | // Append the current block data to the output vector. |
| 146 | output.appendVector(lastBlock); |
| 147 | } |
| 148 | } |
| 149 | |
| 150 | // Clip output vector to the requested size. |
| 151 | output.resize(lengthInBytes); |
| 152 | return output; |
| 153 | } |
| 154 | |
| 155 | ExceptionOr<Vector<uint8_t>> CryptoAlgorithmHKDF::platformDeriveBits(const CryptoAlgorithmHkdfParams& parameters, const CryptoKeyRaw& key, size_t length) |
| 156 | { |
| 157 | auto output = gcryptDeriveBits(key.key(), parameters.saltVector(), parameters.infoVector(), length / 8, parameters.hashIdentifier); |
| 158 | if (!output) |
| 159 | return Exception { OperationError }; |
| 160 | return WTFMove(*output); |
| 161 | } |
| 162 | |
| 163 | } // namespace WebCore |
| 164 | |
| 165 | #endif // ENABLE(WEB_CRYPTO) |
| 166 | |