#include "EverCrypt_HKDF.h"
void
EverCrypt_HKDF_expand_sha1(
uint8_t *okm,
uint8_t *prk,
uint32_t prklen,
uint8_t *info,
uint32_t infolen,
uint32_t len
)
{
uint32_t tlen = (uint32_t)20U;
uint32_t n1 = len / tlen;
uint8_t *output = okm;
KRML_CHECK_SIZE(sizeof (uint8_t), tlen + infolen + (uint32_t)1U);
{
uint8_t text[tlen + infolen + (uint32_t)1U];
memset(text, 0U, (tlen + infolen + (uint32_t)1U) * sizeof text[0U]);
{
uint8_t *text0 = text + tlen;
uint8_t *tag = text;
uint8_t *ctr = text + tlen + infolen;
memcpy(text + tlen, info, infolen * sizeof info[0U]);
{
uint32_t i;
for (i = (uint32_t)0U; i < n1; i = i + (uint32_t)1U)
{
ctr[0U] = (uint8_t)(i + (uint32_t)1U);
if (i == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha1(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha1(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
memcpy(output + i * tlen, tag, tlen * sizeof tag[0U]);
}
}
if (n1 * tlen < len)
{
ctr[0U] = (uint8_t)(n1 + (uint32_t)1U);
if (n1 == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha1(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha1(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
{
uint8_t *block = okm + n1 * tlen;
memcpy(block, tag, (len - n1 * tlen) * sizeof tag[0U]);
}
}
}
}
}
void
EverCrypt_HKDF_extract_sha1(
uint8_t *prk,
uint8_t *salt,
uint32_t saltlen,
uint8_t *ikm,
uint32_t ikmlen
)
{
EverCrypt_HMAC_compute_sha1(prk, salt, saltlen, ikm, ikmlen);
}
void
EverCrypt_HKDF_expand_sha2_256(
uint8_t *okm,
uint8_t *prk,
uint32_t prklen,
uint8_t *info,
uint32_t infolen,
uint32_t len
)
{
uint32_t tlen = (uint32_t)32U;
uint32_t n1 = len / tlen;
uint8_t *output = okm;
KRML_CHECK_SIZE(sizeof (uint8_t), tlen + infolen + (uint32_t)1U);
{
uint8_t text[tlen + infolen + (uint32_t)1U];
memset(text, 0U, (tlen + infolen + (uint32_t)1U) * sizeof text[0U]);
{
uint8_t *text0 = text + tlen;
uint8_t *tag = text;
uint8_t *ctr = text + tlen + infolen;
memcpy(text + tlen, info, infolen * sizeof info[0U]);
{
uint32_t i;
for (i = (uint32_t)0U; i < n1; i = i + (uint32_t)1U)
{
ctr[0U] = (uint8_t)(i + (uint32_t)1U);
if (i == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha2_256(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha2_256(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
memcpy(output + i * tlen, tag, tlen * sizeof tag[0U]);
}
}
if (n1 * tlen < len)
{
ctr[0U] = (uint8_t)(n1 + (uint32_t)1U);
if (n1 == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha2_256(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha2_256(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
{
uint8_t *block = okm + n1 * tlen;
memcpy(block, tag, (len - n1 * tlen) * sizeof tag[0U]);
}
}
}
}
}
void
EverCrypt_HKDF_extract_sha2_256(
uint8_t *prk,
uint8_t *salt,
uint32_t saltlen,
uint8_t *ikm,
uint32_t ikmlen
)
{
EverCrypt_HMAC_compute_sha2_256(prk, salt, saltlen, ikm, ikmlen);
}
void
EverCrypt_HKDF_expand_sha2_384(
uint8_t *okm,
uint8_t *prk,
uint32_t prklen,
uint8_t *info,
uint32_t infolen,
uint32_t len
)
{
uint32_t tlen = (uint32_t)48U;
uint32_t n1 = len / tlen;
uint8_t *output = okm;
KRML_CHECK_SIZE(sizeof (uint8_t), tlen + infolen + (uint32_t)1U);
{
uint8_t text[tlen + infolen + (uint32_t)1U];
memset(text, 0U, (tlen + infolen + (uint32_t)1U) * sizeof text[0U]);
{
uint8_t *text0 = text + tlen;
uint8_t *tag = text;
uint8_t *ctr = text + tlen + infolen;
memcpy(text + tlen, info, infolen * sizeof info[0U]);
{
uint32_t i;
for (i = (uint32_t)0U; i < n1; i = i + (uint32_t)1U)
{
ctr[0U] = (uint8_t)(i + (uint32_t)1U);
if (i == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha2_384(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha2_384(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
memcpy(output + i * tlen, tag, tlen * sizeof tag[0U]);
}
}
if (n1 * tlen < len)
{
ctr[0U] = (uint8_t)(n1 + (uint32_t)1U);
if (n1 == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha2_384(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha2_384(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
{
uint8_t *block = okm + n1 * tlen;
memcpy(block, tag, (len - n1 * tlen) * sizeof tag[0U]);
}
}
}
}
}
void
EverCrypt_HKDF_extract_sha2_384(
uint8_t *prk,
uint8_t *salt,
uint32_t saltlen,
uint8_t *ikm,
uint32_t ikmlen
)
{
EverCrypt_HMAC_compute_sha2_384(prk, salt, saltlen, ikm, ikmlen);
}
void
EverCrypt_HKDF_expand_sha2_512(
uint8_t *okm,
uint8_t *prk,
uint32_t prklen,
uint8_t *info,
uint32_t infolen,
uint32_t len
)
{
uint32_t tlen = (uint32_t)64U;
uint32_t n1 = len / tlen;
uint8_t *output = okm;
KRML_CHECK_SIZE(sizeof (uint8_t), tlen + infolen + (uint32_t)1U);
{
uint8_t text[tlen + infolen + (uint32_t)1U];
memset(text, 0U, (tlen + infolen + (uint32_t)1U) * sizeof text[0U]);
{
uint8_t *text0 = text + tlen;
uint8_t *tag = text;
uint8_t *ctr = text + tlen + infolen;
memcpy(text + tlen, info, infolen * sizeof info[0U]);
{
uint32_t i;
for (i = (uint32_t)0U; i < n1; i = i + (uint32_t)1U)
{
ctr[0U] = (uint8_t)(i + (uint32_t)1U);
if (i == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha2_512(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha2_512(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
memcpy(output + i * tlen, tag, tlen * sizeof tag[0U]);
}
}
if (n1 * tlen < len)
{
ctr[0U] = (uint8_t)(n1 + (uint32_t)1U);
if (n1 == (uint32_t)0U)
{
EverCrypt_HMAC_compute_sha2_512(tag, prk, prklen, text0, infolen + (uint32_t)1U);
}
else
{
EverCrypt_HMAC_compute_sha2_512(tag, prk, prklen, text, tlen + infolen + (uint32_t)1U);
}
{
uint8_t *block = okm + n1 * tlen;
memcpy(block, tag, (len - n1 * tlen) * sizeof tag[0U]);
}
}
}
}
}
void
EverCrypt_HKDF_extract_sha2_512(
uint8_t *prk,
uint8_t *salt,
uint32_t saltlen,
uint8_t *ikm,
uint32_t ikmlen
)
{
EverCrypt_HMAC_compute_sha2_512(prk, salt, saltlen, ikm, ikmlen);
}
void
EverCrypt_HKDF_expand(
Spec_Hash_Definitions_hash_alg a,
uint8_t *okm,
uint8_t *prk,
uint32_t prklen,
uint8_t *info,
uint32_t infolen,
uint32_t len
)
{
switch (a)
{
case Spec_Hash_Definitions_SHA1:
{
EverCrypt_HKDF_expand_sha1(okm, prk, prklen, info, infolen, len);
break;
}
case Spec_Hash_Definitions_SHA2_256:
{
EverCrypt_HKDF_expand_sha2_256(okm, prk, prklen, info, infolen, len);
break;
}
case Spec_Hash_Definitions_SHA2_384:
{
EverCrypt_HKDF_expand_sha2_384(okm, prk, prklen, info, infolen, len);
break;
}
case Spec_Hash_Definitions_SHA2_512:
{
EverCrypt_HKDF_expand_sha2_512(okm, prk, prklen, info, infolen, len);
break;
}
default:
{
KRML_HOST_PRINTF("KreMLin incomplete match at %s:%d\n", __FILE__, __LINE__);
KRML_HOST_EXIT(253U);
}
}
}
void
EverCrypt_HKDF_extract(
Spec_Hash_Definitions_hash_alg a,
uint8_t *prk,
uint8_t *salt,
uint32_t saltlen,
uint8_t *ikm,
uint32_t ikmlen
)
{
switch (a)
{
case Spec_Hash_Definitions_SHA1:
{
EverCrypt_HKDF_extract_sha1(prk, salt, saltlen, ikm, ikmlen);
break;
}
case Spec_Hash_Definitions_SHA2_256:
{
EverCrypt_HKDF_extract_sha2_256(prk, salt, saltlen, ikm, ikmlen);
break;
}
case Spec_Hash_Definitions_SHA2_384:
{
EverCrypt_HKDF_extract_sha2_384(prk, salt, saltlen, ikm, ikmlen);
break;
}
case Spec_Hash_Definitions_SHA2_512:
{
EverCrypt_HKDF_extract_sha2_512(prk, salt, saltlen, ikm, ikmlen);
break;
}
default:
{
KRML_HOST_PRINTF("KreMLin incomplete match at %s:%d\n", __FILE__, __LINE__);
KRML_HOST_EXIT(253U);
}
}
}
KRML_DEPRECATED("expand")
void
EverCrypt_HKDF_hkdf_expand(
Spec_Hash_Definitions_hash_alg a,
uint8_t *okm,
uint8_t *prk,
uint32_t prklen,
uint8_t *info,
uint32_t infolen,
uint32_t len
)
{
EverCrypt_HKDF_expand(a, okm, prk, prklen, info, infolen, len);
}
KRML_DEPRECATED("extract")
void
EverCrypt_HKDF_hkdf_extract(
Spec_Hash_Definitions_hash_alg a,
uint8_t *prk,
uint8_t *salt,
uint32_t saltlen,
uint8_t *ikm,
uint32_t ikmlen
)
{
EverCrypt_HKDF_extract(a, prk, salt, saltlen, ikm, ikmlen);
}