Skip to content

Commit d65fe8f

Browse files
authored
Merge pull request #15 from esl/update_fast_pbkdf2
Allow SHA3 hashes
2 parents c5b565f + e9c5f94 commit d65fe8f

File tree

5 files changed

+38
-10
lines changed

5 files changed

+38
-10
lines changed

README.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ SaltedPassword = fast_scram:hi(Hash, Password, Salt, IterationCount)
3232
```
3333
where `Hash` is the underlying hash function chosen as described by
3434
```erlang
35-
-type sha_type() :: crypto:sha1() | crypto:sha2().
35+
-type sha_type() :: crypto:sha1() | crypto:sha2() | crypto:sha3().
3636
```
3737

3838
### Full algorithm
@@ -219,7 +219,7 @@ It all boils down to the right PBKDF2 implementation, as done in [fast_pbkdf2][f
219219
But while the erlang implementation consumes memory linearly to the iteration count, the NIF implementation does not allocate any more memory.
220220

221221
### Running without NIFs
222-
Note that since OTP24.2, the `crypto` application exposes a native `pbkdf2_hmac` function. However, the NIF implementation from [fast_pbkdf2] is twice as fast, so that one is left as a default.
222+
Note that since OTP24.2, the `crypto` application exposes a native `pbkdf2_hmac` function. However, the NIF implementation from [fast_pbkdf2] is ~30% faster, and supports SHA3, so that one is left as a default.
223223

224224
If for any particular reason you want to skip compiling and loading custom NIFs, you can override the dependency using `rebar3`'s overrides as below, this way the dependency will not be fetched and code will be compiled to use the `crypto` callback instead.
225225

@@ -229,7 +229,6 @@ If for any particular reason you want to skip compiling and loading custom NIFs,
229229
{override, fast_scram, [{erl_opts, [{d, 'WITHOUT_NIFS'}]}, {deps, []}]},
230230
]
231231
}.
232-
233232
```
234233

235234
## Read more:

rebar.config

+6-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,12 @@
4343
dirs => ["src/**"],
4444
filter => "*.erl",
4545
ruleset => erl_files,
46-
rules => [{elvis_style, private_data_types, disable}]
46+
rules => [
47+
{elvis_style, private_data_types, disable},
48+
{elvis_style, atom_naming_convention, #{
49+
regex => "^([a-z][a-zA-Z0-9_]*_?)*$"
50+
}}
51+
]
4752
},
4853
#{
4954
dirs => ["."],

src/fast_scram.erl

+4
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,11 @@
33

44
-include("fast_scram.hrl").
55

6+
-ifdef(WITHOUT_NIFS).
67
-type sha_type() :: crypto:sha1() | crypto:sha2().
8+
-else.
9+
-type sha_type() :: crypto:sha1() | crypto:sha2() | sha3_224 | sha3_256 | sha3_384 | sha3_512.
10+
-endif.
711
%%% Supported underlying hashing algorithms.
812
-type configuration() :: #{
913
entity := client | server,

src/fast_scram.hrl

+2-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@
55
H =:= sha orelse
66
H =:= sha224 orelse H =:= sha256 orelse
77
H =:= sha384 orelse H =:= sha512 orelse
8-
H =:= sha3_512
8+
H =:= sha3_224 orelse H =:= sha3_256 orelse
9+
H =:= sha3_384 orelse H =:= sha3_512
910
).
1011

1112
-record(nonce, {

test/scram_SUITE.erl

+24-5
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,9 @@
88
%% test cases
99
-export([
1010
regular_scram_authentication_example_from_the_rfc/1,
11-
regular_scram_authentication/1,
11+
regular_scram_authentication_sha1/1,
12+
regular_scram_authentication_sha2/1,
13+
regular_scram_authentication_sha3/1,
1214
wrong_configuration_key/1,
1315
configuration_client_sends_wrong_username/1,
1416
configuration_cached_keys_works_easily/0,
@@ -73,7 +75,9 @@ groups() ->
7375
[
7476
{verifications, [parallel], [
7577
regular_scram_authentication_example_from_the_rfc,
76-
regular_scram_authentication,
78+
regular_scram_authentication_sha1,
79+
regular_scram_authentication_sha2,
80+
regular_scram_authentication_sha3,
7781
wrong_configuration_key,
7882
verification_name_escapes_values_correctly,
7983
verification_name_does_not_escape_values_correctly,
@@ -152,18 +156,33 @@ regular_scram_authentication_example_from_the_rfc(_Config) ->
152156
%% Client successfully accepts the server's verifier
153157
{ok, _Final, _ClientState7} = fast_scram:mech_step(ClientState5, ServerFinal).
154158

155-
regular_scram_authentication(_Config) ->
159+
regular_scram_authentication_sha1(_Config) ->
160+
regular_scram_authentication(_Config, sha).
161+
162+
regular_scram_authentication_sha2(_Config) ->
163+
regular_scram_authentication(_Config, sha224),
164+
regular_scram_authentication(_Config, sha256),
165+
regular_scram_authentication(_Config, sha384),
166+
regular_scram_authentication(_Config, sha512).
167+
168+
regular_scram_authentication_sha3(_Config) ->
169+
regular_scram_authentication(_Config, sha3_224),
170+
regular_scram_authentication(_Config, sha3_256),
171+
regular_scram_authentication(_Config, sha3_384),
172+
regular_scram_authentication(_Config, sha3_512).
173+
174+
regular_scram_authentication(_Config, Hash) ->
156175
Password = base64:encode(crypto:strong_rand_bytes(8 + rand:uniform(8))),
157176
{ok, ClientState1} = fast_scram:mech_new(#{
158177
entity => client,
159-
hash_method => sha256,
178+
hash_method => Hash,
160179
username => <<"user">>,
161180
auth_data => #{password => Password}
162181
}),
163182
{ok, ServerState2} = fast_scram:mech_new(
164183
#{
165184
entity => server,
166-
hash_method => sha256,
185+
hash_method => Hash,
167186
username => <<"user">>,
168187
retrieve_mechanism =>
169188
fun(U, S) -> retrieve_mechanism(U, #{password => Password}, S) end

0 commit comments

Comments
 (0)