2
2
mirror of https://github.com/octoleo/restic.git synced 2024-11-01 03:12:31 +00:00
restic/internal/crypto/kdf.go

103 lines
2.6 KiB
Go
Raw Normal View History

2016-08-21 09:33:46 +00:00
package crypto
import (
"crypto/rand"
"time"
2016-08-21 09:33:46 +00:00
2017-07-23 12:21:03 +00:00
"github.com/restic/restic/internal/errors"
2016-09-04 11:24:51 +00:00
sscrypt "github.com/elithrar/simple-scrypt"
2016-08-21 09:33:46 +00:00
"golang.org/x/crypto/scrypt"
)
const saltLength = 64
2017-10-28 08:28:29 +00:00
// Params are the default parameters used for the key derivation function KDF().
type Params struct {
N int
R int
P int
}
// DefaultKDFParams are the default parameters used for Calibrate and KDF().
2017-10-28 08:28:29 +00:00
var DefaultKDFParams = Params{
N: sscrypt.DefaultParams.N,
R: sscrypt.DefaultParams.R,
P: sscrypt.DefaultParams.P,
}
// Calibrate determines new KDF parameters for the current hardware.
2017-10-28 08:28:29 +00:00
func Calibrate(timeout time.Duration, memory int) (Params, error) {
defaultParams := sscrypt.Params{
N: DefaultKDFParams.N,
R: DefaultKDFParams.R,
P: DefaultKDFParams.P,
DKLen: sscrypt.DefaultParams.DKLen,
SaltLen: sscrypt.DefaultParams.SaltLen,
}
params, err := sscrypt.Calibrate(timeout, memory, defaultParams)
if err != nil {
2016-08-29 20:16:58 +00:00
return DefaultKDFParams, errors.Wrap(err, "scrypt.Calibrate")
}
2017-10-28 08:28:29 +00:00
return Params{
N: params.N,
R: params.R,
P: params.P,
}, nil
}
2016-08-21 09:33:46 +00:00
// KDF derives encryption and message authentication keys from the password
// using the supplied parameters N, R and P and the Salt.
2017-10-28 08:28:29 +00:00
func KDF(p Params, salt []byte, password string) (*Key, error) {
if len(salt) != saltLength {
return nil, errors.Errorf("scrypt() called with invalid salt bytes (len %d)", len(salt))
}
// make sure we have valid parameters
params := sscrypt.Params{
N: p.N,
R: p.R,
P: p.P,
DKLen: sscrypt.DefaultParams.DKLen,
SaltLen: len(salt),
}
if err := params.Check(); err != nil {
2016-08-29 20:16:58 +00:00
return nil, errors.Wrap(err, "Check")
2016-08-21 09:33:46 +00:00
}
derKeys := &Key{}
keybytes := macKeySize + aesKeySize
scryptKeys, err := scrypt.Key([]byte(password), salt, p.N, p.R, p.P, keybytes)
2016-08-21 09:33:46 +00:00
if err != nil {
2016-08-29 20:16:58 +00:00
return nil, errors.Wrap(err, "scrypt.Key")
2016-08-21 09:33:46 +00:00
}
if len(scryptKeys) != keybytes {
return nil, errors.Errorf("invalid numbers of bytes expanded from scrypt(): %d", len(scryptKeys))
2016-08-21 09:33:46 +00:00
}
// first 32 byte of scrypt output is the encryption key
copy(derKeys.EncryptionKey[:], scryptKeys[:aesKeySize])
2016-08-21 09:33:46 +00:00
// next 32 byte of scrypt output is the mac key, in the form k||r
macKeyFromSlice(&derKeys.MACKey, scryptKeys[aesKeySize:])
2016-08-21 09:33:46 +00:00
return derKeys, nil
}
// NewSalt returns new random salt bytes to use with KDF(). If NewSalt returns
// an error, this is a grave situation and the program must abort and terminate.
func NewSalt() ([]byte, error) {
buf := make([]byte, saltLength)
n, err := rand.Read(buf)
if n != saltLength || err != nil {
panic("unable to read enough random bytes for new salt")
}
return buf, nil
}