使用HMAC SHA1的CCKeyDerivationPBKDF通常返回-1

Lee*_*o3x 3 objective-c ios

当我使用CCKeyDerivationPBKDFfrom时#import <CommonCrypto/CommonKeyDerivation.h>,它返回的-1是未定义的结果。我不知道我是否想念什么。如果我使用HMAC MD5或其他算法,它可以返回成功,并且只有在使用HMAC SHA1它时,它才会返回不良状态。

int feedback = CCKeyDerivationPBKDF(kCCPBKDF2, clearTextData.bytes, clearTextData.length, secretData.bytes, secretData.length, kCCHmacAlgSHA1, 2048, result, sizeof(result)); 
Run Code Online (Sandbox Code Playgroud)

zap*_*aph 6

我注意到您正在使用kCCHmacAlgSHA1而不是kCCPRFHmacAlgSHA1,这可能是错误。

这对我有用:

NSData *keyData = [@"password" dataUsingEncoding:NSUTF8StringEncoding];
NSData *salt    = [@"salt" dataUsingEncoding:NSUTF8StringEncoding];
uint    rounds  = 2048;
uint    keySize = kCCKeySizeAES128;

NSMutableData *derivedKey = [NSMutableData dataWithLength:keySize];

CCKeyDerivationPBKDF(kCCPBKDF2,               // algorithm
                     keyData.bytes,           // password
                     keyData.length,          // passwordLength
                     salt.bytes,              // salt
                     salt.length,             // saltLen
                     kCCPRFHmacAlgSHA1,       // PRF
                     rounds,                  // rounds
                     derivedKey.mutableBytes, // derivedKey
                     derivedKey.length);      // derivedKeyLen

NSLog(@"derivedKey: %@", derivedKey);
Run Code Online (Sandbox Code Playgroud)

输出:
derivedKey: <2c13cb7a d3468748 5c3f3d4f 18ebddbd>

迅捷3

let password = "TestPassword"
let salt     = Data("salt" .utf8);
let keySize  = kCCKeySizeAES128;
let rounds   = 2048

var derivedKeyData = Data(repeating:0, count:keySize)

let derivationStatus = derivedKeyData.withUnsafeMutableBytes {derivedKeyBytes in
    salt.withUnsafeBytes { saltBytes in

        CCKeyDerivationPBKDF(
            CCPBKDFAlgorithm(kCCPBKDF2),
            password, password.utf8.count,
            saltBytes, salt.count,
            UInt32(kCCPRFHmacAlgSHA1),
            UInt32(rounds),
            derivedKeyBytes,
            derivedKeyData.count)
    }
}

print("derivedKeyData: \(derivedKeyData.map { String(format: "%02hhx", $0) }.joined())")
Run Code Online (Sandbox Code Playgroud)

输出:
derivedKeyData: 75d1f85fd64d170b3ffe66c7f1d1519a

来自废止的文档部分的更通用的解决方案:

基于密码的密钥派生2(快速3+)

基于密码的密钥派生既可以用于从密码文本派生加密密钥,又可以保存密码以进行身份​​验证。

此示例代码提供了多种可用的哈希算法,包括SHA1,SHA256,SHA512。

rounds参数用于使计算变慢,从而使攻击者不得不在每次尝试上花费大量时间。典型的延迟值介于100毫秒至500毫秒之间,如果性能不可接受,则可以使用较短的值。

此示例需要通用加密
。必须在项目中具有桥接头:
#import <CommonCrypto/CommonCrypto.h>
将添加Security.framework到项目中。

参数:

password     password String  
salt         salt Data  
keyByteCount number of key bytes to generate
rounds       Iteration rounds

returns      Derived key


func pbkdf2SHA1(password: String, salt: Data, keyByteCount: Int, rounds: Int) -> Data? {
    return pbkdf2(hash:CCPBKDFAlgorithm(kCCPRFHmacAlgSHA1), password:password, salt:salt, keyByteCount:keyByteCount, rounds:rounds)
}

func pbkdf2SHA256(password: String, salt: Data, keyByteCount: Int, rounds: Int) -> Data? {
    return pbkdf2(hash:CCPBKDFAlgorithm(kCCPRFHmacAlgSHA256), password:password, salt:salt, keyByteCount:keyByteCount, rounds:rounds)
}

func pbkdf2SHA512(password: String, salt: Data, keyByteCount: Int, rounds: Int) -> Data? {
    return pbkdf2(hash:CCPBKDFAlgorithm(kCCPRFHmacAlgSHA512), password:password, salt:salt, keyByteCount:keyByteCount, rounds:rounds)
}

func pbkdf2(hash :CCPBKDFAlgorithm, password: String, salt: Data, keyByteCount: Int, rounds: Int) -> Data? {
    let passwordData = password.data(using:String.Encoding.utf8)!
    var derivedKeyData = Data(repeating:0, count:keyByteCount)

    let derivationStatus = derivedKeyData.withUnsafeMutableBytes {derivedKeyBytes in
        salt.withUnsafeBytes { saltBytes in

            CCKeyDerivationPBKDF(
                CCPBKDFAlgorithm(kCCPBKDF2),
                password, passwordData.count,
                saltBytes, salt.count,
                hash,
                UInt32(rounds),
                derivedKeyBytes, derivedKeyData.count)
        }
    }
    if (derivationStatus != 0) {
        print("Error: \(derivationStatus)")
        return nil;
    }

    return derivedKeyData
}
Run Code Online (Sandbox Code Playgroud)

用法示例:

let password     = "password"
//let salt       = "saltData".data(using: String.Encoding.utf8)!
let salt         = Data(bytes: [0x73, 0x61, 0x6c, 0x74, 0x44, 0x61, 0x74, 0x61])
let keyByteCount = 16
let rounds       = 100000

let derivedKey = pbkdf2SHA1(password:password, salt:salt, keyByteCount:keyByteCount, rounds:rounds)
print("derivedKey (SHA1): \(derivedKey! as NSData)")
Run Code Online (Sandbox Code Playgroud)

示例输出:

derivedKey (SHA1): <6b9d4fa3 0385d128 f6d196ee 3f1d6dbf>
Run Code Online (Sandbox Code Playgroud)

基于密码的密钥派生校准(Swift 3+)

确定在当前平台上用于特定延迟的PRF轮数。

缺省情况下,有几个参数是代表值,不会实质影响舍入计数。

password Sample password.  
salt     Sample salt.  
msec     Targeted duration we want to achieve for a key derivation.

returns  The number of iterations to use for the desired processing time.


func pbkdf2SHA1Calibrate(password: String, salt: Data, msec: Int) -> UInt32 {
    let actualRoundCount: UInt32 = CCCalibratePBKDF(
        CCPBKDFAlgorithm(kCCPBKDF2),
        password.utf8.count,
        salt.count,
        CCPseudoRandomAlgorithm(kCCPRFHmacAlgSHA1),
        kCCKeySizeAES256,
        UInt32(msec));
    return actualRoundCount
}
Run Code Online (Sandbox Code Playgroud)

用法示例:

let saltData       = Data(bytes: [0x73, 0x61, 0x6c, 0x74, 0x44, 0x61, 0x74, 0x61])
let passwordString = "password"
let delayMsec      = 100

let rounds = pbkdf2SHA1Calibrate(password:passwordString, salt:saltData, msec:delayMsec)
print("For \(delayMsec) msec delay, rounds: \(rounds)")
Run Code Online (Sandbox Code Playgroud)

示例输出:

For 100 msec delay, rounds: 93457
Run Code Online (Sandbox Code Playgroud)