blob: 2af9e4a695f56f085df11ff667a5b0caa428677d [file] [log] [blame]
package sarama
import (
"crypto/hmac"
"crypto/sha256"
"crypto/sha512"
"hash"
)
// ScramFormatter implementation
// @see: https://github.com/apache/kafka/blob/99b9b3e84f4e98c3f07714e1de6a139a004cbc5b/clients/src/main/java/org/apache/kafka/common/security/scram/internals/ScramFormatter.java#L93
type scramFormatter struct {
mechanism ScramMechanismType
}
func (s scramFormatter) mac(key []byte) (hash.Hash, error) {
var m hash.Hash
switch s.mechanism {
case SCRAM_MECHANISM_SHA_256:
m = hmac.New(sha256.New, key)
case SCRAM_MECHANISM_SHA_512:
m = hmac.New(sha512.New, key)
default:
return nil, ErrUnknownScramMechanism
}
return m, nil
}
func (s scramFormatter) hmac(key []byte, extra []byte) ([]byte, error) {
mac, err := s.mac(key)
if err != nil {
return nil, err
}
if _, err := mac.Write(extra); err != nil {
return nil, err
}
return mac.Sum(nil), nil
}
func (s scramFormatter) xor(result []byte, second []byte) {
for i := 0; i < len(result); i++ {
result[i] = result[i] ^ second[i]
}
}
func (s scramFormatter) saltedPassword(password []byte, salt []byte, iterations int) ([]byte, error) {
mac, err := s.mac(password)
if err != nil {
return nil, err
}
if _, err := mac.Write(salt); err != nil {
return nil, err
}
if _, err := mac.Write([]byte{0, 0, 0, 1}); err != nil {
return nil, err
}
u1 := mac.Sum(nil)
prev := u1
result := u1
for i := 2; i <= iterations; i++ {
ui, err := s.hmac(password, prev)
if err != nil {
return nil, err
}
s.xor(result, ui)
prev = ui
}
return result, nil
}