github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/libkb/kex2_secret.go (about) 1 // Copyright 2015 Keybase, Inc. All rights reserved. Use of 2 // this source code is governed by the included BSD license. 3 4 package libkb 5 6 import ( 7 "errors" 8 "github.com/keybase/client/go/kex2" 9 keybase1 "github.com/keybase/client/go/protocol/keybase1" 10 "golang.org/x/crypto/scrypt" 11 "strings" 12 ) 13 14 const kexPhraseVersion = "four" 15 16 type Kex2Secret struct { 17 phrase string 18 secret kex2.Secret 19 typ Kex2SecretType 20 } 21 22 type Kex2SecretType int 23 24 const ( 25 Kex2SecretTypeNone Kex2SecretType = 0 26 Kex2SecretTypeV1Desktop Kex2SecretType = 1 27 Kex2SecretTypeV1Mobile Kex2SecretType = 2 28 Kex2SecretTypeV2 Kex2SecretType = 3 29 ) 30 31 func NewKex2SecretFromTypeAndUID(typ Kex2SecretType, uid keybase1.UID) (*Kex2Secret, error) { 32 33 entropy := Kex2PhraseEntropy 34 if typ == Kex2SecretTypeV2 { 35 entropy = Kex2PhraseEntropy2 36 } 37 38 words, err := SecWordList(entropy) 39 if err != nil { 40 return nil, err 41 } 42 43 phrase := strings.Join(words, " ") 44 // If we are provisioning a mobile device, we want to use an easier to compute secret. In order to 45 // communicate that to the two devices involved in kex without breaking the existing protocol, 46 // we have added an extra word that is not in the dictionary. Up to date clients can see this 47 // word and use the lighter version of scrypt. 48 if typ == Kex2SecretTypeV1Mobile { 49 phrase += " " + kexPhraseVersion 50 } 51 return newKex2SecretFromTypeUIDAndPhrase(typ, uid, phrase) 52 } 53 54 func NewKex2SecretFromUIDAndPhrase(uid keybase1.UID, phrase string) (*Kex2Secret, error) { 55 56 typ, err := kex2TypeFromPhrase(phrase) 57 if err != nil { 58 return nil, err 59 } 60 61 return newKex2SecretFromTypeUIDAndPhrase(typ, uid, phrase) 62 } 63 64 func kex2TypeFromPhrase(phrase string) (typ Kex2SecretType, err error) { 65 66 words := strings.Split(phrase, " ") 67 if len(words) == 8 { 68 return Kex2SecretTypeV1Desktop, nil 69 } 70 if len(words) != 9 { 71 return Kex2SecretTypeNone, errors.New("wrong number of words in passphrase; wanted 8 or 9") 72 } 73 if words[len(words)-1] == kexPhraseVersion { 74 return Kex2SecretTypeV1Mobile, nil 75 } 76 return Kex2SecretTypeV2, nil 77 } 78 79 func newKex2SecretFromTypeUIDAndPhrase(typ Kex2SecretType, uid keybase1.UID, phrase string) (*Kex2Secret, error) { 80 81 var cost int 82 var salt []byte 83 switch typ { 84 case Kex2SecretTypeV1Mobile: 85 cost = Kex2ScryptLiteCost 86 case Kex2SecretTypeV1Desktop: 87 cost = Kex2ScryptCost 88 case Kex2SecretTypeV2: 89 cost = Kex2ScryptLiteCost 90 salt = uid.ToBytes() 91 default: 92 return nil, errors.New("unknown kex2 secret type") 93 } 94 95 key, err := scrypt.Key([]byte(phrase), salt, cost, Kex2ScryptR, Kex2ScryptP, Kex2ScryptKeylen) 96 if err != nil { 97 return nil, err 98 } 99 res := &Kex2Secret{phrase: phrase, typ: typ} 100 copy(res.secret[:], key) 101 return res, nil 102 } 103 104 func (s *Kex2Secret) Secret() kex2.Secret { 105 return s.secret 106 } 107 108 func (s *Kex2Secret) Phrase() string { 109 return s.phrase 110 }