Skip to content

Commit 6ff4c8a

Browse files
committed
feat: add HKDF mechanisms
Signed-off-by: Direktor799 <[email protected]>
1 parent be13433 commit 6ff4c8a

File tree

3 files changed

+158
-1
lines changed

3 files changed

+158
-1
lines changed

cryptoki/src/mechanism/hkdf.rs

+116
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
//! Mechanisms of hash-based key derive function (HKDF)
2+
//! See: <https://docs.oasis-open.org/pkcs11/pkcs11-curr/v3.0/os/pkcs11-curr-v3.0-os.html#_Toc30061597>
3+
4+
use std::{convert::TryInto, marker::PhantomData, ptr::null_mut, slice};
5+
6+
use cryptoki_sys::{CKF_HKDF_SALT_DATA, CKF_HKDF_SALT_KEY, CKF_HKDF_SALT_NULL};
7+
8+
use crate::object::ObjectHandle;
9+
10+
use super::MechanismType;
11+
12+
#[derive(Debug, Clone, Copy)]
13+
/// The salt for the extract stage.
14+
pub enum HkdfSalt<'a> {
15+
/// CKF_HKDF_SALT_NULL no salt is supplied.
16+
Null,
17+
/// CKF_HKDF_SALT_DATA salt is supplied as a data in pSalt with length ulSaltLen.
18+
Data(&'a [u8]),
19+
/// CKF_HKDF_SALT_KEY salt is supplied as a key in hSaltKey
20+
Key(ObjectHandle),
21+
}
22+
23+
/// HKDF parameters.
24+
///
25+
/// This structure wraps a `CK_HKDF_PARAMS` structure.
26+
#[derive(Debug, Clone, Copy)]
27+
#[repr(transparent)]
28+
pub struct HkdfParams<'a> {
29+
inner: cryptoki_sys::CK_HKDF_PARAMS,
30+
/// Marker type to ensure we don't outlive the data
31+
_marker: PhantomData<&'a [u8]>,
32+
}
33+
34+
impl<'a> HkdfParams<'a> {
35+
/// Construct parameters for hash-based key derive function (HKDF).
36+
///
37+
/// # Arguments
38+
///
39+
/// * `extract` - Whether to execute the extract portion of HKDF.
40+
///
41+
/// * `expand` - Whether to execute the expand portion of HKDF.
42+
///
43+
/// * `prf_hash_mechanism` - The base hash used for the HMAC in the underlying HKDF operation
44+
///
45+
/// * `salt` - The salt for the extract stage.
46+
///
47+
/// * `info` - The info string for the expand stage.
48+
pub fn new(
49+
extract: bool,
50+
expand: bool,
51+
prf_hash_mechanism: MechanismType,
52+
salt: HkdfSalt,
53+
info: &'a [u8],
54+
) -> Self {
55+
Self {
56+
inner: cryptoki_sys::CK_HKDF_PARAMS {
57+
bExtract: extract as u8,
58+
bExpand: expand as u8,
59+
prfHashMechanism: *prf_hash_mechanism,
60+
ulSaltType: match salt {
61+
HkdfSalt::Null => CKF_HKDF_SALT_NULL,
62+
HkdfSalt::Data(_) => CKF_HKDF_SALT_DATA,
63+
HkdfSalt::Key(_) => CKF_HKDF_SALT_KEY,
64+
},
65+
pSalt: match salt {
66+
HkdfSalt::Data(data) => data.as_ptr() as *mut _,
67+
_ => null_mut(),
68+
},
69+
ulSaltLen: match salt {
70+
HkdfSalt::Data(data) => data
71+
.len()
72+
.try_into()
73+
.expect("salt length does not fit in CK_ULONG"),
74+
_ => 0,
75+
},
76+
hSaltKey: match salt {
77+
HkdfSalt::Key(key) => key.handle(),
78+
_ => 0,
79+
},
80+
pInfo: info.as_ptr() as *mut _,
81+
ulInfoLen: info
82+
.len()
83+
.try_into()
84+
.expect("info length does not fit in CK_ULONG"),
85+
},
86+
_marker: PhantomData,
87+
}
88+
}
89+
90+
/// Whether to execute the extract portion of HKDF.
91+
pub fn extract(&self) -> bool {
92+
self.inner.bExtract != 0
93+
}
94+
95+
/// Whether to execute the expand portion of HKDF.
96+
pub fn expand(&self) -> bool {
97+
self.inner.bExpand != 0
98+
}
99+
100+
/// The salt for the extract stage.
101+
pub fn salt(&self) -> HkdfSalt<'a> {
102+
match self.inner.ulSaltType {
103+
CKF_HKDF_SALT_NULL => HkdfSalt::Null,
104+
CKF_HKDF_SALT_DATA => HkdfSalt::Data(unsafe {
105+
slice::from_raw_parts(self.inner.pSalt, self.inner.ulSaltLen as _)
106+
}),
107+
CKF_HKDF_SALT_KEY => HkdfSalt::Key(ObjectHandle::new(self.inner.hSaltKey)),
108+
_ => unreachable!(),
109+
}
110+
}
111+
112+
/// The info string for the expand stage.
113+
pub fn info(&self) -> &'a [u8] {
114+
unsafe { slice::from_raw_parts(self.inner.pInfo, self.inner.ulInfoLen as _) }
115+
}
116+
}

cryptoki/src/mechanism/mod.rs

+36-1
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
pub mod aead;
66
pub mod ekdf;
77
pub mod elliptic_curve;
8+
pub mod hkdf;
89
mod mechanism_info;
910
pub mod rsa;
1011

@@ -281,6 +282,18 @@ impl MechanismType {
281282
val: CKM_GENERIC_SECRET_KEY_GEN,
282283
};
283284

285+
// HKDF
286+
/// HKDF key generation mechanism
287+
pub const HKDF_KEY_GEN: MechanismType = MechanismType {
288+
val: CKM_HKDF_KEY_GEN,
289+
};
290+
/// HKDF-DERIVE mechanism
291+
pub const HKDF_DERIVE: MechanismType = MechanismType {
292+
val: CKM_HKDF_DERIVE,
293+
};
294+
/// HKDF-DATA mechanism
295+
pub const HKDF_DATA: MechanismType = MechanismType { val: CKM_HKDF_DATA };
296+
284297
pub(crate) fn stringify(mech: CK_MECHANISM_TYPE) -> String {
285298
match mech {
286299
CKM_RSA_PKCS_KEY_PAIR_GEN => String::from(stringify!(CKM_RSA_PKCS_KEY_PAIR_GEN)),
@@ -637,6 +650,9 @@ impl MechanismType {
637650
String::from(stringify!(CKM_EC_MONTGOMERY_KEY_PAIR_GEN))
638651
}
639652
CKM_EDDSA => String::from(stringify!(CKM_EDDSA)),
653+
CKM_HKDF_KEY_GEN => String::from(stringify!(CKM_HKDF_KEY_GEN)),
654+
CKM_HKDF_DERIVE => String::from(stringify!(CKM_HKDF_DERIVE)),
655+
CKM_HKDF_DATA => String::from(stringify!(CKM_HKDF_DATA)),
640656
_ => format!("unknown {mech:08x}"),
641657
}
642658
}
@@ -712,6 +728,9 @@ impl TryFrom<CK_MECHANISM_TYPE> for MechanismType {
712728
CKM_SHA384_HMAC => Ok(MechanismType::SHA384_HMAC),
713729
CKM_SHA512_HMAC => Ok(MechanismType::SHA512_HMAC),
714730
CKM_GENERIC_SECRET_KEY_GEN => Ok(MechanismType::GENERIC_SECRET_KEY_GEN),
731+
CKM_HKDF_KEY_GEN => Ok(MechanismType::HKDF_KEY_GEN),
732+
CKM_HKDF_DERIVE => Ok(MechanismType::HKDF_DERIVE),
733+
CKM_HKDF_DATA => Ok(MechanismType::HKDF_DATA),
715734
other => {
716735
error!("Mechanism type {} is not supported.", other);
717736
Err(Error::NotSupported)
@@ -894,6 +913,14 @@ pub enum Mechanism<'a> {
894913
Sha256Hmac,
895914
/// GENERIC-SECRET-KEY-GEN mechanism
896915
GenericSecretKeyGen,
916+
917+
// HKDF
918+
/// HKDF key gen mechanism
919+
HkdfKeyGen,
920+
/// HKDF-DERIVE mechanism
921+
HkdfDerive(hkdf::HkdfParams<'a>),
922+
/// HKDF-DATA mechanism
923+
HkdfData(hkdf::HkdfParams<'a>),
897924
}
898925

899926
impl Mechanism<'_> {
@@ -957,6 +984,10 @@ impl Mechanism<'_> {
957984
Mechanism::Sha256Hmac => MechanismType::SHA256_HMAC,
958985

959986
Mechanism::GenericSecretKeyGen => MechanismType::GENERIC_SECRET_KEY_GEN,
987+
988+
Mechanism::HkdfKeyGen => MechanismType::HKDF_KEY_GEN,
989+
Mechanism::HkdfDerive(_) => MechanismType::HKDF_DERIVE,
990+
Mechanism::HkdfData(_) => MechanismType::HKDF_DATA,
960991
}
961992
}
962993
}
@@ -988,6 +1019,9 @@ impl From<&Mechanism<'_>> for CK_MECHANISM {
9881019
| Mechanism::Sha512RsaPkcsPss(params) => make_mechanism(mechanism, params),
9891020
Mechanism::RsaPkcsOaep(params) => make_mechanism(mechanism, params),
9901021
Mechanism::Ecdh1Derive(params) => make_mechanism(mechanism, params),
1022+
Mechanism::HkdfDerive(params) | Mechanism::HkdfData(params) => {
1023+
make_mechanism(mechanism, params)
1024+
}
9911025
// Mechanisms without parameters
9921026
Mechanism::AesKeyGen
9931027
| Mechanism::AesEcb
@@ -1023,7 +1057,8 @@ impl From<&Mechanism<'_>> for CK_MECHANISM {
10231057
| Mechanism::Sha384RsaPkcs
10241058
| Mechanism::Sha512RsaPkcs
10251059
| Mechanism::Sha256Hmac
1026-
| Mechanism::GenericSecretKeyGen => CK_MECHANISM {
1060+
| Mechanism::GenericSecretKeyGen
1061+
| Mechanism::HkdfKeyGen => CK_MECHANISM {
10271062
mechanism,
10281063
pParameter: null_mut(),
10291064
ulParameterLen: 0,

cryptoki/src/object.rs

+6
Original file line numberDiff line numberDiff line change
@@ -1192,6 +1192,9 @@ impl KeyType {
11921192
val: CKK_EC_MONTGOMERY,
11931193
};
11941194

1195+
/// HKDF key
1196+
pub const HKDF: KeyType = KeyType { val: CKK_HKDF };
1197+
11951198
fn stringify(key_type: CK_KEY_TYPE) -> String {
11961199
match key_type {
11971200
CKK_RSA => String::from(stringify!(CKK_RSA)),
@@ -1236,6 +1239,8 @@ impl KeyType {
12361239
CKK_GOSTR3411 => String::from(stringify!(CKK_GOSTR3411)),
12371240
CKK_GOST28147 => String::from(stringify!(CKK_GOST28147)),
12381241
CKK_EC_EDWARDS => String::from(stringify!(CKK_EC_EDWARDS)),
1242+
CKK_EC_MONTGOMERY => String::from(stringify!(CKK_EC_MONTGOMERY)),
1243+
CKK_HKDF => String::from(stringify!(CKK_HKDF)),
12391244
_ => format!("unknown ({key_type:08x})"),
12401245
}
12411246
}
@@ -1309,6 +1314,7 @@ impl TryFrom<CK_KEY_TYPE> for KeyType {
13091314
CKK_GOST28147 => Ok(KeyType::GOST28147),
13101315
CKK_EC_EDWARDS => Ok(KeyType::EC_EDWARDS),
13111316
CKK_EC_MONTGOMERY => Ok(KeyType::EC_MONTGOMERY),
1317+
CKK_HKDF => Ok(KeyType::HKDF),
13121318
_ => {
13131319
error!("Key type {} is not supported.", key_type);
13141320
Err(Error::NotSupported)

0 commit comments

Comments
 (0)