1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "components/rappor/byte_vector_utils.h"
9 #include "base/logging.h"
10 #include "base/rand_util.h"
11 #include "base/strings/string_number_conversions.h"
12 #include "crypto/random.h"
18 // Reinterpets a ByteVector as a StringPiece.
19 base::StringPiece
ByteVectorAsStringPiece(const ByteVector
& lhs
) {
20 return base::StringPiece(reinterpret_cast<const char *>(&lhs
[0]), lhs
.size());
23 // Concatenates parameters together as a string.
24 std::string
Concat(const ByteVector
& value
, char c
, const std::string
& data
) {
25 return std::string(value
.begin(), value
.end()) + c
+ data
;
28 // Performs the operation: K = HMAC(K, data)
29 // The input "K" is passed by initializing |hmac| with it.
30 // The output "K" is returned by initializing |result| with it.
31 // Returns false on an error.
32 bool HMAC_Rotate(const crypto::HMAC
& hmac
,
33 const std::string
& data
,
34 crypto::HMAC
* result
) {
35 ByteVector
key(hmac
.DigestLength());
36 if (!hmac
.Sign(data
, &key
[0], key
.size()))
38 return result
->Init(ByteVectorAsStringPiece(key
));
41 // Performs the operation: V = HMAC(K, V)
42 // The input "K" is passed by initializing |hmac| with it.
43 // "V" is read from and written to |value|.
44 // Returns false on an error.
45 bool HMAC_Rehash(const crypto::HMAC
& hmac
, ByteVector
* value
) {
46 return hmac
.Sign(ByteVectorAsStringPiece(*value
),
47 &(*value
)[0], value
->size());
50 // Implements (Key, V) = HMAC_DRBG_Update(provided_data, Key, V)
51 // See: http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
52 // "V" is read from and written to |value|.
53 // The input "Key" is passed by initializing |hmac1| with it.
54 // The output "Key" is returned by initializing |out_hmac| with it.
55 // Returns false on an error.
56 bool HMAC_DRBG_Update(const std::string
& provided_data
,
57 const crypto::HMAC
& hmac1
,
59 crypto::HMAC
* out_hmac
) {
60 // HMAC_DRBG Update Process
61 crypto::HMAC
temp_hmac(crypto::HMAC::SHA256
);
62 crypto::HMAC
* hmac2
= provided_data
.size() > 0 ? &temp_hmac
: out_hmac
;
63 // 1. K = HMAC(K, V || 0x00 || provided_data)
64 if (!HMAC_Rotate(hmac1
, Concat(*value
, 0x00, provided_data
), hmac2
))
67 if (!HMAC_Rehash(*hmac2
, value
))
69 // 3. If (provided_data = Null), then return K and V.
70 if (hmac2
== out_hmac
)
72 // 4. K = HMAC(K, V || 0x01 || provided_data)
73 if (!HMAC_Rotate(*hmac2
, Concat(*value
, 0x01, provided_data
), out_hmac
))
76 return HMAC_Rehash(*out_hmac
, value
);
81 void Uint64ToByteVector(uint64_t value
, size_t size
, ByteVector
* output
) {
83 DCHECK_EQ(size
, output
->size());
84 for (size_t i
= 0; i
< size
; i
++) {
85 // Get the value of the i-th smallest byte and copy it to the byte vector.
86 uint64_t shift
= i
* 8;
87 uint64_t byte_mask
= static_cast<uint64_t>(0xff) << shift
;
88 (*output
)[i
] = (value
& byte_mask
) >> shift
;
92 ByteVector
* ByteVectorAnd(const ByteVector
& lhs
, ByteVector
* rhs
) {
93 DCHECK_EQ(lhs
.size(), rhs
->size());
94 for (size_t i
= 0; i
< lhs
.size(); ++i
) {
95 (*rhs
)[i
] = lhs
[i
] & (*rhs
)[i
];
100 ByteVector
* ByteVectorOr(const ByteVector
& lhs
, ByteVector
* rhs
) {
101 DCHECK_EQ(lhs
.size(), rhs
->size());
102 for (size_t i
= 0; i
< lhs
.size(); ++i
) {
103 (*rhs
)[i
] = lhs
[i
] | (*rhs
)[i
];
108 ByteVector
* ByteVectorMerge(const ByteVector
& mask
,
109 const ByteVector
& lhs
,
111 DCHECK_EQ(lhs
.size(), rhs
->size());
112 for (size_t i
= 0; i
< lhs
.size(); ++i
) {
113 (*rhs
)[i
] = (lhs
[i
] & ~mask
[i
]) | ((*rhs
)[i
] & mask
[i
]);
118 int CountBits(const ByteVector
& vector
) {
120 for (size_t i
= 0; i
< vector
.size(); ++i
) {
121 uint8_t byte
= vector
[i
];
122 for (int j
= 0; j
< 8 ; ++j
) {
130 ByteVectorGenerator::ByteVectorGenerator(size_t byte_count
)
131 : byte_count_(byte_count
) {}
133 ByteVectorGenerator::~ByteVectorGenerator() {}
135 ByteVector
ByteVectorGenerator::GetRandomByteVector() {
136 ByteVector
bytes(byte_count_
);
137 crypto::RandBytes(&bytes
[0], bytes
.size());
141 ByteVector
ByteVectorGenerator::GetWeightedRandomByteVector(
142 Probability probability
) {
143 ByteVector bytes
= GetRandomByteVector();
144 switch (probability
) {
146 return *ByteVectorOr(GetRandomByteVector(), &bytes
);
150 return *ByteVectorAnd(GetRandomByteVector(), &bytes
);
156 HmacByteVectorGenerator::HmacByteVectorGenerator(
158 const std::string
& entropy_input
,
159 const std::string
& personalization_string
)
160 : ByteVectorGenerator(byte_count
),
161 hmac_(crypto::HMAC::SHA256
),
162 value_(hmac_
.DigestLength(), 0x01),
163 generated_bytes_(0) {
164 // HMAC_DRBG Instantiate Process
165 // See: http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
166 // 1. seed_material = entropy_input + nonce + personalization_string
167 // Note: We are using the 8.6.7 interpretation, where the entropy_input and
168 // nonce are acquired at the same time from the same source.
169 DCHECK_EQ(kEntropyInputSize
, entropy_input
.size());
170 std::string
seed_material(entropy_input
+ personalization_string
);
171 // 2. Key = 0x00 00...00
172 crypto::HMAC
hmac1(crypto::HMAC::SHA256
);
173 if (!hmac1
.Init(std::string(hmac_
.DigestLength(), 0x00)))
175 // 3. V = 0x01 01...01
176 // (value_ in initializer list)
178 // 4. (Key, V) = HMAC_DRBG_Update(seed_material, Key, V)
179 if (!HMAC_DRBG_Update(seed_material
, hmac1
, &value_
, &hmac_
))
183 HmacByteVectorGenerator::~HmacByteVectorGenerator() {}
185 HmacByteVectorGenerator::HmacByteVectorGenerator(
186 const HmacByteVectorGenerator
& prev_request
)
187 : ByteVectorGenerator(prev_request
.byte_count()),
188 hmac_(crypto::HMAC::SHA256
),
189 value_(prev_request
.value_
),
190 generated_bytes_(0) {
191 if (!HMAC_DRBG_Update("", prev_request
.hmac_
, &value_
, &hmac_
))
195 // HMAC_DRBG requires entropy input to be security_strength bits long,
196 // and nonce to be at least 1/2 security_strength bits long. We
197 // generate them both as a single "extra strong" entropy input.
198 // max_security_strength for SHA256 is 256 bits.
199 // See: http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
200 const size_t HmacByteVectorGenerator::kEntropyInputSize
= (256 / 8) * 3 / 2;
203 std::string
HmacByteVectorGenerator::GenerateEntropyInput() {
204 return base::RandBytesAsString(kEntropyInputSize
);
207 ByteVector
HmacByteVectorGenerator::GetRandomByteVector() {
208 // Streams bytes from HMAC_DRBG_Generate
209 // See: http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
210 const size_t digest_length
= hmac_
.DigestLength();
211 DCHECK_EQ(value_
.size(), digest_length
);
212 ByteVector
bytes(byte_count());
213 uint8_t* data
= &bytes
[0];
214 size_t bytes_to_go
= byte_count();
215 while (bytes_to_go
> 0) {
216 size_t requested_byte_in_digest
= generated_bytes_
% digest_length
;
217 if (requested_byte_in_digest
== 0) {
218 // Do step 4.1 of the HMAC_DRBG Generate Process for more bits.
220 if (!HMAC_Rehash(hmac_
, &value_
))
223 size_t n
= std::min(bytes_to_go
,
224 digest_length
- requested_byte_in_digest
);
225 memcpy(data
, &value_
[requested_byte_in_digest
], n
);
228 generated_bytes_
+= n
;
229 // Check max_number_of_bits_per_request from 10.1 Table 2
230 // max_number_of_bits_per_request == 2^19 bits == 2^16 bytes
231 DCHECK_LT(generated_bytes_
, 1U << 16);
236 } // namespace rappor