forked from zbackup/zbackup
-
Notifications
You must be signed in to change notification settings - Fork 0
/
encryption_key.cc
110 lines (92 loc) · 3.45 KB
/
encryption_key.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
// Copyright (c) 2012-2014 Konstantin Isakov <[email protected]> and ZBackup contributors, see CONTRIBUTORS
// Part of ZBackup. Licensed under GNU GPLv2 or later + OpenSSL, see LICENSE
#include <openssl/aes.h>
#include <openssl/evp.h>
#include <openssl/hmac.h>
#include <string.h>
#include "check.hh"
#include "encryption_key.hh"
#include "random.hh"
namespace {
/// Derives an encryption key from a password and key info
void deriveKey( string const & password, EncryptionKeyInfo const & info,
void * key, unsigned keySize )
{
CHECK( PKCS5_PBKDF2_HMAC_SHA1( password.data(), password.size(),
(unsigned char const *) info.salt().data(),
info.salt().size(), info.rounds(), keySize,
(unsigned char *) key ) == 1,
"encryption key derivation failed" );
}
string calculateKeyHmac( void const * key, unsigned keySize,
string const & input )
{
char result[ EVP_MAX_MD_SIZE ];
unsigned resultSize;
CHECK( HMAC( EVP_sha1(), (unsigned char const *) key, keySize,
(unsigned char const *) input.data(), input.size(),
(unsigned char *) result, &resultSize ),
"encryption key HMAC calcuation failed" );
return string( result, result + resultSize );
}
}
EncryptionKey::EncryptionKey( string const & password,
EncryptionKeyInfo const * info )
{
if ( !info )
isSet = false;
else
{
isSet = true;
char derivedKey[ KeySize ];
deriveKey( password, *info, derivedKey, sizeof( derivedKey ) );
AES_KEY aesKey;
AES_set_decrypt_key( ( unsigned char const * ) derivedKey, 128, &aesKey );
AES_decrypt( ( unsigned char const * ) info->encrypted_key().data(),
( unsigned char * ) key, &aesKey );
if ( calculateKeyHmac( key, sizeof( key ), info->key_check_input() ) !=
info->key_check_hmac() )
throw exInvalidPassword();
}
}
EncryptionKey::~EncryptionKey()
{
// Clear the key from memory
memset( key, 0, sizeof( key ) );
}
void EncryptionKey::generate( string const & password,
EncryptionKeyInfo & info,
EncryptionKey & encryptionkey )
{
// Use this buf for salts
char buf[ KeySize ];
Random::generatePseudo( buf, sizeof( buf ) );
info.set_salt( buf, sizeof( buf ) );
info.set_rounds( 10000 ); // TODO: make this configurable
char derivedKey[ KeySize ];
deriveKey( password, info, derivedKey, sizeof( derivedKey ) );
char key[ KeySize ];
if ( encryptionkey.hasKey() )
memcpy( key, encryptionkey.getKey(), KeySize );
else
Random::generateTrue( key, sizeof( key ) );
// Fill in the HMAC verification part
Random::generatePseudo( buf, sizeof( buf ) );
info.set_key_check_input( buf, sizeof( buf ) );
info.set_key_check_hmac( calculateKeyHmac( key, sizeof( key ),
info.key_check_input() ) );
// Encrypt the key
AES_KEY aesKey;
AES_set_encrypt_key( ( unsigned char const * ) derivedKey, 128, &aesKey );
char encryptedKey[ sizeof( key ) ];
AES_encrypt( ( unsigned char const * ) key,
( unsigned char * ) encryptedKey, &aesKey );
info.set_encrypted_key( encryptedKey, sizeof( encryptedKey ) );
// Clear the key from memory
memset( key, 0, sizeof( key ) );
}
EncryptionKey const & EncryptionKey::noKey()
{
static EncryptionKey key( string(), NULL );
return key;
}