| /* |
| * Copyright 2018 The WebRTC Project Authors. All rights reserved. |
| * |
| * Use of this source code is governed by a BSD-style license |
| * that can be found in the LICENSE file in the root of the source |
| * tree. An additional intellectual property rights grant can be found |
| * in the file PATENTS. All contributing project authors may |
| * be found in the AUTHORS file in the root of the source tree. |
| */ |
| |
| #include "rtc_base/openssl_key_derivation_hkdf.h" |
| |
| #include <openssl/digest.h> |
| #include <openssl/err.h> |
| #include <openssl/hkdf.h> |
| #include <openssl/sha.h> |
| |
| #include <algorithm> |
| #include <utility> |
| |
| #include "rtc_base/buffer.h" |
| #include "rtc_base/openssl.h" |
| |
| namespace rtc { |
| |
| OpenSSLKeyDerivationHKDF::OpenSSLKeyDerivationHKDF() = default; |
| OpenSSLKeyDerivationHKDF::~OpenSSLKeyDerivationHKDF() = default; |
| |
| const size_t OpenSSLKeyDerivationHKDF::kMinKeyByteSize = 16; |
| const size_t OpenSSLKeyDerivationHKDF::kMaxKeyByteSize = |
| 255 * SHA256_DIGEST_LENGTH; |
| const size_t OpenSSLKeyDerivationHKDF::kMinSecretByteSize = 16; |
| |
| absl::optional<ZeroOnFreeBuffer<uint8_t>> OpenSSLKeyDerivationHKDF::DeriveKey( |
| rtc::ArrayView<const uint8_t> secret, |
| rtc::ArrayView<const uint8_t> salt, |
| rtc::ArrayView<const uint8_t> label, |
| size_t derived_key_byte_size) { |
| // Prevent deriving less than 128 bits of key material or more than the max. |
| if (derived_key_byte_size < kMinKeyByteSize || |
| derived_key_byte_size > kMaxKeyByteSize) { |
| return absl::nullopt; |
| } |
| // The secret must reach the minimum number of bits to be secure. |
| if (secret.data() == nullptr || secret.size() < kMinSecretByteSize) { |
| return absl::nullopt; |
| } |
| // Empty labels are always invalid in derivation. |
| if (label.data() == nullptr || label.size() == 0) { |
| return absl::nullopt; |
| } |
| // If a random salt is not provided use all zeros. |
| rtc::Buffer salt_buffer; |
| if (salt.data() == nullptr || salt.size() == 0) { |
| salt_buffer.SetSize(SHA256_DIGEST_LENGTH); |
| std::fill(salt_buffer.begin(), salt_buffer.end(), 0); |
| salt = salt_buffer; |
| } |
| // This buffer will erase itself on release. |
| ZeroOnFreeBuffer<uint8_t> derived_key_buffer(derived_key_byte_size, 0); |
| if (!HKDF(derived_key_buffer.data(), derived_key_buffer.size(), EVP_sha256(), |
| secret.data(), secret.size(), salt.data(), salt.size(), |
| label.data(), label.size())) { |
| return absl::nullopt; |
| } |
| return absl::optional<ZeroOnFreeBuffer<uint8_t>>( |
| std::move(derived_key_buffer)); |
| } |
| |
| } // namespace rtc |