/* * SPDX-FileCopyrightText: Copyright (c) 2023 NVIDIA CORPORATION & AFFILIATES. All rights reserved. * SPDX-License-Identifier: MIT * * Permission is hereby granted, free of charge, to any person obtaining a * copy of this software and associated documentation files (the "Software"), * to deal in the Software without restriction, including without limitation * the rights to use, copy, modify, merge, publish, distribute, sublicense, * and/or sell copies of the Software, and to permit persons to whom the * Software is furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER * DEALINGS IN THE SOFTWARE. * * Prototypes and checks taken from DMTF: Copyright 2021-2022 DMTF. All rights reserved. * License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/libspdm/blob/main/LICENSE.md */ #include "internal_crypt_lib.h" bool libspdm_hkdf_sha256_extract_and_expand(const uint8_t *key, size_t key_size, const uint8_t *salt, size_t salt_size, const uint8_t *info, size_t info_size, uint8_t *out, size_t out_size) { return lkca_hkdf_extract_and_expand("hmac(sha256)", key, key_size, salt, salt_size, info, info_size, out, out_size); } bool libspdm_hkdf_sha256_extract(const uint8_t *key, size_t key_size, const uint8_t *salt, size_t salt_size, uint8_t *prk_out, size_t prk_out_size) { if (prk_out_size != (256 / 8)) return false; return libspdm_hmac_sha256_all(key, key_size, salt, salt_size, prk_out); } bool libspdm_hkdf_sha256_expand(const uint8_t *prk, size_t prk_size, const uint8_t *info, size_t info_size, uint8_t *out, size_t out_size) { return lkca_hkdf_expand("hmac(sha256)", prk, prk_size, info, info_size, out, out_size); } bool libspdm_hkdf_sha384_extract_and_expand(const uint8_t *key, size_t key_size, const uint8_t *salt, size_t salt_size, const uint8_t *info, size_t info_size, uint8_t *out, size_t out_size) { return lkca_hkdf_extract_and_expand("hmac(sha384)", key, key_size, salt, salt_size, info, info_size, out, out_size); } bool libspdm_hkdf_sha384_extract(const uint8_t *key, size_t key_size, const uint8_t *salt, size_t salt_size, uint8_t *prk_out, size_t prk_out_size) { if (prk_out_size != (384 / 8)) return false; return libspdm_hmac_sha384_all(key, key_size, salt, salt_size, prk_out); } bool libspdm_hkdf_sha384_expand(const uint8_t *prk, size_t prk_size, const uint8_t *info, size_t info_size, uint8_t *out, size_t out_size) { return lkca_hkdf_expand("hmac(sha384)", prk, prk_size, info, info_size, out, out_size); } bool libspdm_hkdf_sha512_extract_and_expand(const uint8_t *key, size_t key_size, const uint8_t *salt, size_t salt_size, const uint8_t *info, size_t info_size, uint8_t *out, size_t out_size) { return lkca_hkdf_extract_and_expand("hmac(sha512)", key, key_size, salt, salt_size, info, info_size, out, out_size); } bool libspdm_hkdf_sha512_extract(const uint8_t *key, size_t key_size, const uint8_t *salt, size_t salt_size, uint8_t *prk_out, size_t prk_out_size) { if (prk_out_size != (512 / 8)) return false; return libspdm_hmac_sha512_all(key, key_size, salt, salt_size, prk_out); } bool libspdm_hkdf_sha512_expand(const uint8_t *prk, size_t prk_size, const uint8_t *info, size_t info_size, uint8_t *out, size_t out_size) { return lkca_hkdf_expand("hmac(sha512)", prk, prk_size, info, info_size, out, out_size); }