aboutsummaryrefslogtreecommitdiffstats
path: root/src/libs/3rdparty/botan/src/lib/pbkdf/pbkdf2/pbkdf2.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/libs/3rdparty/botan/src/lib/pbkdf/pbkdf2/pbkdf2.cpp')
-rw-r--r--src/libs/3rdparty/botan/src/lib/pbkdf/pbkdf2/pbkdf2.cpp118
1 files changed, 118 insertions, 0 deletions
diff --git a/src/libs/3rdparty/botan/src/lib/pbkdf/pbkdf2/pbkdf2.cpp b/src/libs/3rdparty/botan/src/lib/pbkdf/pbkdf2/pbkdf2.cpp
new file mode 100644
index 0000000000..cc2982f6e9
--- /dev/null
+++ b/src/libs/3rdparty/botan/src/lib/pbkdf/pbkdf2/pbkdf2.cpp
@@ -0,0 +1,118 @@
+/*
+* PBKDF2
+* (C) 1999-2007 Jack Lloyd
+*
+* Botan is released under the Simplified BSD License (see license.txt)
+*/
+
+#include <botan/pbkdf2.h>
+#include <botan/exceptn.h>
+#include <botan/internal/rounding.h>
+
+namespace Botan {
+
+size_t
+pbkdf2(MessageAuthenticationCode& prf,
+ uint8_t out[],
+ size_t out_len,
+ const std::string& passphrase,
+ const uint8_t salt[], size_t salt_len,
+ size_t iterations,
+ std::chrono::milliseconds msec)
+ {
+ clear_mem(out, out_len);
+
+ if(out_len == 0)
+ return 0;
+
+ try
+ {
+ prf.set_key(cast_char_ptr_to_uint8(passphrase.data()), passphrase.size());
+ }
+ catch(Invalid_Key_Length&)
+ {
+ throw Exception("PBKDF2 with " + prf.name() +
+ " cannot accept passphrases of length " +
+ std::to_string(passphrase.size()));
+ }
+
+ const size_t prf_sz = prf.output_length();
+ secure_vector<uint8_t> U(prf_sz);
+
+ const size_t blocks_needed = round_up(out_len, prf_sz) / prf_sz;
+
+ std::chrono::microseconds usec_per_block =
+ std::chrono::duration_cast<std::chrono::microseconds>(msec) / blocks_needed;
+
+ uint32_t counter = 1;
+ while(out_len)
+ {
+ const size_t prf_output = std::min<size_t>(prf_sz, out_len);
+
+ prf.update(salt, salt_len);
+ prf.update_be(counter++);
+ prf.final(U.data());
+
+ xor_buf(out, U.data(), prf_output);
+
+ if(iterations == 0)
+ {
+ /*
+ If no iterations set, run the first block to calibrate based
+ on how long hashing takes on whatever machine we're running on.
+ */
+
+ const auto start = std::chrono::high_resolution_clock::now();
+
+ iterations = 1; // the first iteration we did above
+
+ while(true)
+ {
+ prf.update(U);
+ prf.final(U.data());
+ xor_buf(out, U.data(), prf_output);
+ iterations++;
+
+ /*
+ Only break on relatively 'even' iterations. For one it
+ avoids confusion, and likely some broken implementations
+ break on getting completely randomly distributed values
+ */
+ if(iterations % 10000 == 0)
+ {
+ auto time_taken = std::chrono::high_resolution_clock::now() - start;
+ auto usec_taken = std::chrono::duration_cast<std::chrono::microseconds>(time_taken);
+ if(usec_taken > usec_per_block)
+ break;
+ }
+ }
+ }
+ else
+ {
+ for(size_t i = 1; i != iterations; ++i)
+ {
+ prf.update(U);
+ prf.final(U.data());
+ xor_buf(out, U.data(), prf_output);
+ }
+ }
+
+ out_len -= prf_output;
+ out += prf_output;
+ }
+
+ return iterations;
+ }
+
+size_t
+PKCS5_PBKDF2::pbkdf(uint8_t key[], size_t key_len,
+ const std::string& passphrase,
+ const uint8_t salt[], size_t salt_len,
+ size_t iterations,
+ std::chrono::milliseconds msec) const
+ {
+ return pbkdf2(*m_mac.get(), key, key_len, passphrase, salt, salt_len, iterations, msec);
+ }
+
+
+}