summaryrefslogtreecommitdiffstats
path: root/src/kdf.rs
blob: ef1617e109febad528eebc5377b4ccb69d6e403e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
// -*- coding: utf-8 -*-
//
// disktest - Hard drive tester
//
// Copyright 2020 Michael Buesch <m@bues.ch>
//
// This program is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; either version 2 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License along
// with this program; if not, write to the Free Software Foundation, Inc.,
// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
//

use crypto::digest::Digest;
use crypto::hmac::Hmac;
use crypto::pbkdf2::pbkdf2;
use crypto::sha2::Sha512;

const ITERATIONS: u32   = 50000;
const DK_SIZE: usize    = 256 / 8;

/// Generate a bad salt substitution from the key.
fn derive_salt(key: &[u8]) -> [u8; 512/8] {
    // Generate the salt from the key.
    // That's not a great salt, but good enough for our purposes.
    let mut salt = [0; 512/8];
    let mut salt_hash = Sha512::new();
    salt_hash.input_str(&"disktest salt");
    salt_hash.input(&key);
    salt_hash.result(&mut salt);

    salt
}

/// Key derivation function for the user supplied seed.
pub fn kdf(seed: &Vec<u8>, thread_id: u32) -> Vec<u8> {
    // The key is: SEED | THREAD_ID
    let mut key = seed.to_vec();
    key.extend_from_slice(&thread_id.to_le_bytes());

    // Use HMAC-SHA512 as PRF.
    let mut mac = Hmac::new(Sha512::new(), &key);

    // Calculated the DK (derived key).
    let mut dk = [0; DK_SIZE];
    pbkdf2(&mut mac, &derive_salt(&key), ITERATIONS, &mut dk);

    dk.to_vec()
}

#[cfg(test)]
mod tests {
    use super::*;

    #[test]
    fn test_salt() {
        assert_eq!(derive_salt(&vec![1,2,3]).to_vec(),
                   derive_salt(&vec![1,2,3]).to_vec());

        assert_ne!(derive_salt(&vec![1,2,3]).to_vec(),
                   derive_salt(&vec![1,2,4]).to_vec());
    }

    #[test]
    fn test_kdf() {
        assert_eq!(kdf(&vec![1,2,3], 42),
                   vec![126, 166, 175, 110, 112, 203, 204, 118, 71, 125, 227, 115, 65, 242, 193, 117,
                        229, 246, 164, 226, 239, 88, 119, 226, 21, 98, 166, 137, 232, 151, 243, 154]);
        assert_eq!(kdf(&vec![1,2,4], 42),
                   vec![141, 91, 148, 215, 223, 193, 155, 52, 32, 216, 66, 86, 110, 114, 5, 10,
                        39, 253, 243, 146, 37, 243, 25, 238, 218, 100, 179, 204, 12, 150, 13, 102]);
        assert_eq!(kdf(&vec![1,2,3], 43),
                   vec![8, 206, 134, 103, 131, 239, 126, 159, 222, 12, 74, 197, 28, 44, 237, 166,
                        152, 102, 63, 199, 93, 82, 199, 62, 97, 178, 240, 244, 24, 148, 242, 209]);
    }
}

// vim: ts=4 sw=4 expandtab
bues.ch cgit interface