2 HMAC-SHA256 KDF Wrapper Implementation over OpenSSL.
4 Copyright (c) 2018 - 2022, Intel Corporation. All rights reserved.<BR>
5 SPDX-License-Identifier: BSD-2-Clause-Patent
9 #include "InternalCryptLib.h"
10 #include <openssl/evp.h>
11 #include <openssl/kdf.h>
14 Derive HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
16 @param[in] Md Message Digest.
17 @param[in] Key Pointer to the user-supplied key.
18 @param[in] KeySize Key size in bytes.
19 @param[in] Salt Pointer to the salt(non-secret) value.
20 @param[in] SaltSize Salt size in bytes.
21 @param[in] Info Pointer to the application specific info.
22 @param[in] InfoSize Info size in bytes.
23 @param[out] Out Pointer to buffer to receive hkdf value.
24 @param[in] OutSize Size of hkdf bytes to generate.
26 @retval TRUE Hkdf generated successfully.
27 @retval FALSE Hkdf generation failed.
32 HkdfMdExtractAndExpand (
44 EVP_PKEY_CTX
*pHkdfCtx
;
47 if ((Key
== NULL
) || (Salt
== NULL
) || (Info
== NULL
) || (Out
== NULL
) ||
48 (KeySize
> INT_MAX
) || (SaltSize
> INT_MAX
) || (InfoSize
> INT_MAX
) || (OutSize
> INT_MAX
))
53 pHkdfCtx
= EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF
, NULL
);
54 if (pHkdfCtx
== NULL
) {
58 Result
= EVP_PKEY_derive_init (pHkdfCtx
) > 0;
60 Result
= EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx
, Md
) > 0;
64 Result
= EVP_PKEY_CTX_set1_hkdf_salt (pHkdfCtx
, Salt
, (UINT32
)SaltSize
) > 0;
68 Result
= EVP_PKEY_CTX_set1_hkdf_key (pHkdfCtx
, Key
, (UINT32
)KeySize
) > 0;
72 Result
= EVP_PKEY_CTX_add1_hkdf_info (pHkdfCtx
, Info
, (UINT32
)InfoSize
) > 0;
76 Result
= EVP_PKEY_derive (pHkdfCtx
, Out
, &OutSize
) > 0;
79 EVP_PKEY_CTX_free (pHkdfCtx
);
85 Derive HMAC-based Extract key Derivation Function (HKDF).
87 @param[in] Md message digest.
88 @param[in] Key Pointer to the user-supplied key.
89 @param[in] KeySize key size in bytes.
90 @param[in] Salt Pointer to the salt(non-secret) value.
91 @param[in] SaltSize salt size in bytes.
92 @param[out] PrkOut Pointer to buffer to receive hkdf value.
93 @param[in] PrkOutSize size of hkdf bytes to generate.
95 @retval true Hkdf generated successfully.
96 @retval false Hkdf generation failed.
105 IN CONST UINT8
*Salt
,
111 EVP_PKEY_CTX
*pHkdfCtx
;
114 if ((Key
== NULL
) || (Salt
== NULL
) || (PrkOut
== NULL
) ||
115 (KeySize
> INT_MAX
) || (SaltSize
> INT_MAX
) ||
116 (PrkOutSize
> INT_MAX
))
121 pHkdfCtx
= EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF
, NULL
);
122 if (pHkdfCtx
== NULL
) {
126 Result
= EVP_PKEY_derive_init (pHkdfCtx
) > 0;
128 Result
= EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx
, Md
) > 0;
133 EVP_PKEY_CTX_hkdf_mode (
135 EVP_PKEY_HKDEF_MODE_EXTRACT_ONLY
140 Result
= EVP_PKEY_CTX_set1_hkdf_salt (
148 Result
= EVP_PKEY_CTX_set1_hkdf_key (
156 Result
= EVP_PKEY_derive (pHkdfCtx
, PrkOut
, &PrkOutSize
) > 0;
159 EVP_PKEY_CTX_free (pHkdfCtx
);
165 Derive SHA256 HMAC-based Expand Key Derivation Function (HKDF).
167 @param[in] Md Message Digest.
168 @param[in] Prk Pointer to the user-supplied key.
169 @param[in] PrkSize Key size in bytes.
170 @param[in] Info Pointer to the application specific info.
171 @param[in] InfoSize Info size in bytes.
172 @param[out] Out Pointer to buffer to receive hkdf value.
173 @param[in] OutSize Size of hkdf bytes to generate.
175 @retval TRUE Hkdf generated successfully.
176 @retval FALSE Hkdf generation failed.
185 IN CONST UINT8
*Info
,
191 EVP_PKEY_CTX
*pHkdfCtx
;
194 if ((Prk
== NULL
) || (Info
== NULL
) || (Out
== NULL
) ||
195 (PrkSize
> INT_MAX
) || (InfoSize
> INT_MAX
) || (OutSize
> INT_MAX
))
200 pHkdfCtx
= EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF
, NULL
);
201 if (pHkdfCtx
== NULL
) {
205 Result
= EVP_PKEY_derive_init (pHkdfCtx
) > 0;
207 Result
= EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx
, Md
) > 0;
211 Result
= EVP_PKEY_CTX_hkdf_mode (pHkdfCtx
, EVP_PKEY_HKDEF_MODE_EXPAND_ONLY
) > 0;
215 Result
= EVP_PKEY_CTX_set1_hkdf_key (pHkdfCtx
, Prk
, (UINT32
)PrkSize
) > 0;
219 Result
= EVP_PKEY_CTX_add1_hkdf_info (pHkdfCtx
, Info
, (UINT32
)InfoSize
) > 0;
223 Result
= EVP_PKEY_derive (pHkdfCtx
, Out
, &OutSize
) > 0;
226 EVP_PKEY_CTX_free (pHkdfCtx
);
232 Derive HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
234 @param[in] Key Pointer to the user-supplied key.
235 @param[in] KeySize Key size in bytes.
236 @param[in] Salt Pointer to the salt(non-secret) value.
237 @param[in] SaltSize Salt size in bytes.
238 @param[in] Info Pointer to the application specific info.
239 @param[in] InfoSize Info size in bytes.
240 @param[out] Out Pointer to buffer to receive hkdf value.
241 @param[in] OutSize Size of hkdf bytes to generate.
243 @retval TRUE Hkdf generated successfully.
244 @retval FALSE Hkdf generation failed.
249 HkdfSha256ExtractAndExpand (
252 IN CONST UINT8
*Salt
,
254 IN CONST UINT8
*Info
,
260 return HkdfMdExtractAndExpand (EVP_sha256 (), Key
, KeySize
, Salt
, SaltSize
, Info
, InfoSize
, Out
, OutSize
);
264 Derive SHA256 HMAC-based Extract key Derivation Function (HKDF).
266 @param[in] Key Pointer to the user-supplied key.
267 @param[in] KeySize key size in bytes.
268 @param[in] Salt Pointer to the salt(non-secret) value.
269 @param[in] SaltSize salt size in bytes.
270 @param[out] PrkOut Pointer to buffer to receive hkdf value.
271 @param[in] PrkOutSize size of hkdf bytes to generate.
273 @retval true Hkdf generated successfully.
274 @retval false Hkdf generation failed.
282 IN CONST UINT8
*Salt
,
288 return HkdfMdExtract (
300 Derive SHA256 HMAC-based Expand Key Derivation Function (HKDF).
302 @param[in] Prk Pointer to the user-supplied key.
303 @param[in] PrkSize Key size in bytes.
304 @param[in] Info Pointer to the application specific info.
305 @param[in] InfoSize Info size in bytes.
306 @param[out] Out Pointer to buffer to receive hkdf value.
307 @param[in] OutSize Size of hkdf bytes to generate.
309 @retval TRUE Hkdf generated successfully.
310 @retval FALSE Hkdf generation failed.
318 IN CONST UINT8
*Info
,
324 return HkdfMdExpand (EVP_sha256 (), Prk
, PrkSize
, Info
, InfoSize
, Out
, OutSize
);
328 Derive SHA384 HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
330 @param[in] Key Pointer to the user-supplied key.
331 @param[in] KeySize Key size in bytes.
332 @param[in] Salt Pointer to the salt(non-secret) value.
333 @param[in] SaltSize Salt size in bytes.
334 @param[in] Info Pointer to the application specific info.
335 @param[in] InfoSize Info size in bytes.
336 @param[out] Out Pointer to buffer to receive hkdf value.
337 @param[in] OutSize Size of hkdf bytes to generate.
339 @retval TRUE Hkdf generated successfully.
340 @retval FALSE Hkdf generation failed.
345 HkdfSha384ExtractAndExpand (
348 IN CONST UINT8
*Salt
,
350 IN CONST UINT8
*Info
,
356 return HkdfMdExtractAndExpand (EVP_sha384 (), Key
, KeySize
, Salt
, SaltSize
, Info
, InfoSize
, Out
, OutSize
);
360 Derive SHA384 HMAC-based Extract key Derivation Function (HKDF).
362 @param[in] Key Pointer to the user-supplied key.
363 @param[in] KeySize key size in bytes.
364 @param[in] Salt Pointer to the salt(non-secret) value.
365 @param[in] SaltSize salt size in bytes.
366 @param[out] PrkOut Pointer to buffer to receive hkdf value.
367 @param[in] PrkOutSize size of hkdf bytes to generate.
369 @retval true Hkdf generated successfully.
370 @retval false Hkdf generation failed.
378 IN CONST UINT8
*Salt
,
384 return HkdfMdExtract (
396 Derive SHA384 HMAC-based Expand Key Derivation Function (HKDF).
398 @param[in] Prk Pointer to the user-supplied key.
399 @param[in] PrkSize Key size in bytes.
400 @param[in] Info Pointer to the application specific info.
401 @param[in] InfoSize Info size in bytes.
402 @param[out] Out Pointer to buffer to receive hkdf value.
403 @param[in] OutSize Size of hkdf bytes to generate.
405 @retval TRUE Hkdf generated successfully.
406 @retval FALSE Hkdf generation failed.
414 IN CONST UINT8
*Info
,
420 return HkdfMdExpand (EVP_sha384 (), Prk
, PrkSize
, Info
, InfoSize
, Out
, OutSize
);