2 This file is part of GNUnet.
3 Copyright (C) 2010 GNUnet e.V.
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
18 Boston, MA 02110-1301, USA.
22 * @file src/util/crypto_kdf.c
23 * @brief Key derivation
25 * @author Jeffrey Burdges <burdges@gnunet.org>
31 #include "gnunet_crypto_lib.h"
33 #define LOG(kind,...) GNUNET_log_from (kind, "util-crypto-kdf", __VA_ARGS__)
37 * @param result buffer for the derived key, allocated by caller
38 * @param out_len desired length of the derived key
40 * @param xts_len length of @a xts
41 * @param skm source key material
42 * @param skm_len length of @a skm
43 * @param argp va_list of void * & size_t pairs for context chunks
44 * @return #GNUNET_YES on success
47 GNUNET_CRYPTO_kdf_v (void *result,
56 * "Finally, we point out to a particularly advantageous instantiation using
57 * HMAC-SHA512 as XTR and HMAC-SHA256 in PRF* (in which case the output from SHA-512 is
58 * truncated to 256 bits). This makes sense in two ways: First, the extraction part is where we need a
59 * stronger hash function due to the unconventional demand from the hash function in the extraction
60 * setting. Second, as shown in Section 6, using HMAC with a truncated output as an extractor
61 * allows to prove the security of HKDF under considerably weaker assumptions on the underlying
64 * http://eprint.iacr.org/2010/264
67 return GNUNET_CRYPTO_hkdf_v (result,
81 * @param result buffer for the derived key, allocated by caller
82 * @param out_len desired length of the derived key
84 * @param xts_len length of @a xts
85 * @param skm source key material
86 * @param skm_len length of @a skm
87 * @param ... void * & size_t pairs for context chunks
88 * @return #GNUNET_YES on success
91 GNUNET_CRYPTO_kdf (void *result,
101 va_start (argp, skm_len);
102 ret = GNUNET_CRYPTO_kdf_v (result,
116 * Deterministically generate a pseudo-random number uniformly from the
117 * integers modulo a libgcrypt mpi.
119 * @param[out] r MPI value set to the FDH
120 * @param n MPI to work modulo
122 * @param xts_len length of @a xts
123 * @param skm source key material
124 * @param skm_len length of @a skm
125 * @param ctx context string
128 GNUNET_CRYPTO_kdf_mod_mpi (gcry_mpi_t *r,
130 const void *xts, size_t xts_len,
131 const void *skm, size_t skm_len,
139 nbits = gcry_mpi_get_nbits (n);
140 /* GNUNET_assert (nbits > 512); */
145 /* Ain't clear if n is always divisible by 8 */
146 uint8_t buf[ (nbits-1)/8 + 1 ];
148 rc = GNUNET_CRYPTO_kdf (buf,
155 GNUNET_assert (GNUNET_YES == rc);
157 rc = gcry_mpi_scan (r,
159 (const unsigned char *) buf,
162 GNUNET_assert (0 == rc); /* Allocation erro? */
164 gcry_mpi_clear_highbit (*r, nbits);
165 GNUNET_assert( 0 == gcry_mpi_test_bit (*r, nbits) );
167 /* We reject this FDH if either *r > n and retry with another ctr */
168 if (0 > gcry_mpi_cmp(*r, n))
170 gcry_mpi_release (*r);
174 /* end of crypto_kdf.c */