blob: 7a9e12153e907a0b1ec086e7192957928d6f663a [file] [log] [blame]
Thai Duong7689ed62015-03-20 16:50:18 -07001/*
2 * Copyright 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Thai Duong7689ed62015-03-20 16:50:18 -070017#include "hkdf.h"
18
Shawn Willden0f906ec2015-06-20 09:16:30 -060019#include <new>
20
21#include <keymaster/android_keymaster_utils.h>
22
23#include "hmac.h"
24
Thai Duong7689ed62015-03-20 16:50:18 -070025namespace keymaster {
26
27const size_t kSHA256HashLength = 32;
28
Thai Duongfabacaf2015-03-25 20:14:57 -070029bool Rfc5869Sha256Kdf::Init(Buffer& secret, Buffer& salt, Buffer& info,
30 size_t key_bytes_to_generate) {
31 return Init(secret.peek_read(), secret.available_read(), salt.peek_read(),
32 salt.available_read(), info.peek_read(), info.available_read(),
33 key_bytes_to_generate);
Thai Duong7689ed62015-03-20 16:50:18 -070034}
35
Thai Duongfabacaf2015-03-25 20:14:57 -070036bool Rfc5869Sha256Kdf::Init(const uint8_t* secret, size_t secret_len, const uint8_t* salt,
37 size_t salt_len, const uint8_t* info, size_t info_len,
38 size_t key_bytes_to_generate) {
Thai Duong7689ed62015-03-20 16:50:18 -070039 // Step 1. Extract: PRK = HMAC-SHA256(actual_salt, secret)
40 // https://tools.ietf.org/html/rfc5869#section-2.2
41 HmacSha256 prk_hmac;
Thai Duong60eebdc2015-03-25 17:20:24 -070042 bool result;
43 if (salt) {
44 result = prk_hmac.Init(salt, salt_len);
45 } else {
46 uint8_t zeros[kSHA256HashLength];
47 // If salt is not given, HashLength zeros are used.
48 memset(zeros, 0, sizeof(zeros));
49 result = prk_hmac.Init(zeros, sizeof(zeros));
50 }
Thai Duongfabacaf2015-03-25 20:14:57 -070051 if (!result) {
52 return false;
53 }
Thai Duong7689ed62015-03-20 16:50:18 -070054
55 // |prk| is a pseudorandom key (of kSHA256HashLength octets).
56 uint8_t prk[kSHA256HashLength];
Thai Duongfabacaf2015-03-25 20:14:57 -070057 if (sizeof(prk) != prk_hmac.DigestLength())
58 return false;
Thai Duong7689ed62015-03-20 16:50:18 -070059 result = prk_hmac.Sign(secret, secret_len, prk, sizeof(prk));
Thai Duongfabacaf2015-03-25 20:14:57 -070060 if (!result) {
61 return false;
62 }
Thai Duong7689ed62015-03-20 16:50:18 -070063
64 // Step 2. Expand: OUTPUT = HKDF-Expand(PRK, info)
65 // https://tools.ietf.org/html/rfc5869#section-2.3
66 const size_t n = (key_bytes_to_generate + kSHA256HashLength - 1) / kSHA256HashLength;
Thai Duongfabacaf2015-03-25 20:14:57 -070067 if (n >= 256u) {
68 return false;
69 }
70 output_.reset(new uint8_t[n * kSHA256HashLength]);
Thai Duong60eebdc2015-03-25 17:20:24 -070071 if (!output_.get()) {
Thai Duongfabacaf2015-03-25 20:14:57 -070072 return false;
Thai Duong60eebdc2015-03-25 17:20:24 -070073 }
Thai Duong7689ed62015-03-20 16:50:18 -070074
Thai Duong7689ed62015-03-20 16:50:18 -070075 uint8_t buf[kSHA256HashLength + info_len + 1];
76 uint8_t digest[kSHA256HashLength];
Thai Duong7689ed62015-03-20 16:50:18 -070077 HmacSha256 hmac;
78 result = hmac.Init(prk, sizeof(prk));
Thai Duongfabacaf2015-03-25 20:14:57 -070079 if (!result) {
80 return false;
81 }
Thai Duong7689ed62015-03-20 16:50:18 -070082
83 for (size_t i = 1; i <= n; i++) {
Thai Duong60eebdc2015-03-25 17:20:24 -070084 size_t j = 0;
85 if (i != 1) {
86 memcpy(buf, digest, sizeof(digest));
87 j = sizeof(digest);
88 }
Thai Duong7689ed62015-03-20 16:50:18 -070089 memcpy(buf + j, info, info_len);
90 j += info_len;
91 buf[j++] = static_cast<uint8_t>(i);
92 result = hmac.Sign(buf, j, digest, sizeof(digest));
Thai Duongfabacaf2015-03-25 20:14:57 -070093 if (!result)
94 return false;
Thai Duong60eebdc2015-03-25 17:20:24 -070095 memcpy(output_.get() + (i - 1) * sizeof(digest), digest, sizeof(digest));
Thai Duong7689ed62015-03-20 16:50:18 -070096 }
97
Thai Duong60eebdc2015-03-25 17:20:24 -070098 if (key_bytes_to_generate) {
99 secret_key_len_ = key_bytes_to_generate;
Shawn Willden0f906ec2015-06-20 09:16:30 -0600100 secret_key_.reset(dup_buffer(output_.get(), key_bytes_to_generate));
Thai Duong60eebdc2015-03-25 17:20:24 -0700101 if (!secret_key_.get()) {
Thai Duongfabacaf2015-03-25 20:14:57 -0700102 return false;
Thai Duong60eebdc2015-03-25 17:20:24 -0700103 }
Thai Duong60eebdc2015-03-25 17:20:24 -0700104 }
Thai Duongfabacaf2015-03-25 20:14:57 -0700105 initalized_ = true;
106
107 return true;
Thai Duong7689ed62015-03-20 16:50:18 -0700108}
109
110} // namespace keymaster