mirror of https://github.com/acidanthera/audk.git
CryptoPkg: add new Hkdf api in Crypt Lib.
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4033 Signed-off-by: Qi Zhang <qi1.zhang@intel.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Xiaoyu Lu <xiaoyu1.lu@intel.com> Cc: Guomin Jiang <guomin.jiang@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
This commit is contained in:
parent
1336476233
commit
11b24ef0d7
|
@ -1,7 +1,7 @@
|
|||
/** @file
|
||||
HMAC-SHA256 KDF Wrapper Implementation over OpenSSL.
|
||||
|
||||
Copyright (c) 2018 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2018 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -10,6 +10,221 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
|||
#include <openssl/evp.h>
|
||||
#include <openssl/kdf.h>
|
||||
|
||||
/**
|
||||
Derive HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Md Message Digest.
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize Key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize Salt size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
HkdfMdExtractAndExpand (
|
||||
IN CONST EVP_MD *Md,
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
EVP_PKEY_CTX *pHkdfCtx;
|
||||
BOOLEAN Result;
|
||||
|
||||
if ((Key == NULL) || (Salt == NULL) || (Info == NULL) || (Out == NULL) ||
|
||||
(KeySize > INT_MAX) || (SaltSize > INT_MAX) || (InfoSize > INT_MAX) || (OutSize > INT_MAX))
|
||||
{
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
pHkdfCtx = EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF, NULL);
|
||||
if (pHkdfCtx == NULL) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
Result = EVP_PKEY_derive_init (pHkdfCtx) > 0;
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx, Md) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_salt (pHkdfCtx, Salt, (UINT32)SaltSize) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_key (pHkdfCtx, Key, (UINT32)KeySize) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_add1_hkdf_info (pHkdfCtx, Info, (UINT32)InfoSize) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_derive (pHkdfCtx, Out, &OutSize) > 0;
|
||||
}
|
||||
|
||||
EVP_PKEY_CTX_free (pHkdfCtx);
|
||||
pHkdfCtx = NULL;
|
||||
return Result;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Md message digest.
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
HkdfMdExtract (
|
||||
IN CONST EVP_MD *Md,
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
EVP_PKEY_CTX *pHkdfCtx;
|
||||
BOOLEAN Result;
|
||||
|
||||
if ((Key == NULL) || (Salt == NULL) || (PrkOut == NULL) ||
|
||||
(KeySize > INT_MAX) || (SaltSize > INT_MAX) ||
|
||||
(PrkOutSize > INT_MAX))
|
||||
{
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
pHkdfCtx = EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF, NULL);
|
||||
if (pHkdfCtx == NULL) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
Result = EVP_PKEY_derive_init (pHkdfCtx) > 0;
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx, Md) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result =
|
||||
EVP_PKEY_CTX_hkdf_mode (
|
||||
pHkdfCtx,
|
||||
EVP_PKEY_HKDEF_MODE_EXTRACT_ONLY
|
||||
) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_salt (
|
||||
pHkdfCtx,
|
||||
Salt,
|
||||
(uint32_t)SaltSize
|
||||
) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_key (
|
||||
pHkdfCtx,
|
||||
Key,
|
||||
(uint32_t)KeySize
|
||||
) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_derive (pHkdfCtx, PrkOut, &PrkOutSize) > 0;
|
||||
}
|
||||
|
||||
EVP_PKEY_CTX_free (pHkdfCtx);
|
||||
pHkdfCtx = NULL;
|
||||
return Result;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA256 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Md Message Digest.
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
HkdfMdExpand (
|
||||
IN CONST EVP_MD *Md,
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
EVP_PKEY_CTX *pHkdfCtx;
|
||||
BOOLEAN Result;
|
||||
|
||||
if ((Prk == NULL) || (Info == NULL) || (Out == NULL) ||
|
||||
(PrkSize > INT_MAX) || (InfoSize > INT_MAX) || (OutSize > INT_MAX))
|
||||
{
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
pHkdfCtx = EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF, NULL);
|
||||
if (pHkdfCtx == NULL) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
Result = EVP_PKEY_derive_init (pHkdfCtx) > 0;
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx, Md) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_hkdf_mode (pHkdfCtx, EVP_PKEY_HKDEF_MODE_EXPAND_ONLY) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_key (pHkdfCtx, Prk, (UINT32)PrkSize) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_add1_hkdf_info (pHkdfCtx, Info, (UINT32)InfoSize) > 0;
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_derive (pHkdfCtx, Out, &OutSize) > 0;
|
||||
}
|
||||
|
||||
EVP_PKEY_CTX_free (pHkdfCtx);
|
||||
pHkdfCtx = NULL;
|
||||
return Result;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
|
||||
|
||||
|
@ -39,42 +254,165 @@ HkdfSha256ExtractAndExpand (
|
|||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
EVP_PKEY_CTX *pHkdfCtx;
|
||||
BOOLEAN Result;
|
||||
return HkdfMdExtractAndExpand (EVP_sha256 (), Key, KeySize, Salt, SaltSize, Info, InfoSize, Out, OutSize);
|
||||
}
|
||||
|
||||
if ((Key == NULL) || (Salt == NULL) || (Info == NULL) || (Out == NULL) ||
|
||||
(KeySize > INT_MAX) || (SaltSize > INT_MAX) || (InfoSize > INT_MAX) || (OutSize > INT_MAX))
|
||||
/**
|
||||
Derive SHA256 HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha256Extract (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
return FALSE;
|
||||
return HkdfMdExtract (
|
||||
EVP_sha256 (),
|
||||
Key,
|
||||
KeySize,
|
||||
Salt,
|
||||
SaltSize,
|
||||
PrkOut,
|
||||
PrkOutSize
|
||||
);
|
||||
}
|
||||
|
||||
pHkdfCtx = EVP_PKEY_CTX_new_id (EVP_PKEY_HKDF, NULL);
|
||||
if (pHkdfCtx == NULL) {
|
||||
return FALSE;
|
||||
/**
|
||||
Derive SHA256 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha256Expand (
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
return HkdfMdExpand (EVP_sha256 (), Prk, PrkSize, Info, InfoSize, Out, OutSize);
|
||||
}
|
||||
|
||||
Result = EVP_PKEY_derive_init (pHkdfCtx) > 0;
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set_hkdf_md (pHkdfCtx, EVP_sha256 ()) > 0;
|
||||
/**
|
||||
Derive SHA384 HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize Key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize Salt size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384ExtractAndExpand (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
return HkdfMdExtractAndExpand (EVP_sha384 (), Key, KeySize, Salt, SaltSize, Info, InfoSize, Out, OutSize);
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_salt (pHkdfCtx, Salt, (UINT32)SaltSize) > 0;
|
||||
/**
|
||||
Derive SHA384 HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384Extract (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
return HkdfMdExtract (
|
||||
EVP_sha384 (),
|
||||
Key,
|
||||
KeySize,
|
||||
Salt,
|
||||
SaltSize,
|
||||
PrkOut,
|
||||
PrkOutSize
|
||||
);
|
||||
}
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_set1_hkdf_key (pHkdfCtx, Key, (UINT32)KeySize) > 0;
|
||||
}
|
||||
/**
|
||||
Derive SHA384 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_CTX_add1_hkdf_info (pHkdfCtx, Info, (UINT32)InfoSize) > 0;
|
||||
}
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
if (Result) {
|
||||
Result = EVP_PKEY_derive (pHkdfCtx, Out, &OutSize) > 0;
|
||||
}
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
EVP_PKEY_CTX_free (pHkdfCtx);
|
||||
pHkdfCtx = NULL;
|
||||
return Result;
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384Expand (
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
return HkdfMdExpand (EVP_sha384 (), Prk, PrkSize, Info, InfoSize, Out, OutSize);
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/** @file
|
||||
HMAC-SHA256 KDF Wrapper Implementation which does not provide real capabilities.
|
||||
|
||||
Copyright (c) 2018 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2018 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -41,3 +41,152 @@ HkdfSha256ExtractAndExpand (
|
|||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA256 HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha256Extract (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA256 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha256Expand (
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA384 HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize Key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize Salt size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384ExtractAndExpand (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA384 HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384Extract (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA384 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384Expand (
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/** @file
|
||||
HMAC-SHA256 KDF Wrapper Implementation which does not provide real capabilities.
|
||||
|
||||
Copyright (c) 2018 - 2019, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2018 - 2022, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
@ -41,3 +41,152 @@ HkdfSha256ExtractAndExpand (
|
|||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA256 HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha256Extract (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA256 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha256Expand (
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA384 HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize Key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize Salt size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384ExtractAndExpand (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA384 HMAC-based Extract key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Key Pointer to the user-supplied key.
|
||||
@param[in] KeySize key size in bytes.
|
||||
@param[in] Salt Pointer to the salt(non-secret) value.
|
||||
@param[in] SaltSize salt size in bytes.
|
||||
@param[out] PrkOut Pointer to buffer to receive hkdf value.
|
||||
@param[in] PrkOutSize size of hkdf bytes to generate.
|
||||
|
||||
@retval true Hkdf generated successfully.
|
||||
@retval false Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384Extract (
|
||||
IN CONST UINT8 *Key,
|
||||
IN UINTN KeySize,
|
||||
IN CONST UINT8 *Salt,
|
||||
IN UINTN SaltSize,
|
||||
OUT UINT8 *PrkOut,
|
||||
UINTN PrkOutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Derive SHA384 HMAC-based Expand Key Derivation Function (HKDF).
|
||||
|
||||
@param[in] Prk Pointer to the user-supplied key.
|
||||
@param[in] PrkSize Key size in bytes.
|
||||
@param[in] Info Pointer to the application specific info.
|
||||
@param[in] InfoSize Info size in bytes.
|
||||
@param[out] Out Pointer to buffer to receive hkdf value.
|
||||
@param[in] OutSize Size of hkdf bytes to generate.
|
||||
|
||||
@retval TRUE Hkdf generated successfully.
|
||||
@retval FALSE Hkdf generation failed.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
HkdfSha384Expand (
|
||||
IN CONST UINT8 *Prk,
|
||||
IN UINTN PrkSize,
|
||||
IN CONST UINT8 *Info,
|
||||
IN UINTN InfoSize,
|
||||
OUT UINT8 *Out,
|
||||
IN UINTN OutSize
|
||||
)
|
||||
{
|
||||
ASSERT (FALSE);
|
||||
return FALSE;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue