86 lines
2.9 KiB
Markdown
86 lines
2.9 KiB
Markdown
|
|
# RustCrypto: HKDF
|
||
|
|
|
||
|
|
[![crate][crate-image]][crate-link]
|
||
|
|
[![Docs][docs-image]][docs-link]
|
||
|
|
![Apache2/MIT licensed][license-image]
|
||
|
|
![Rust Version][rustc-image]
|
||
|
|
[![Project Chat][chat-image]][chat-link]
|
||
|
|
[![Build Status][build-image]][build-link]
|
||
|
|
|
||
|
|
Pure Rust implementation of the [HMAC-based Extract-and-Expand Key Derivation Function (HKDF)](https://tools.ietf.org/html/rfc5869) generic over hash function.
|
||
|
|
|
||
|
|
# Usage
|
||
|
|
|
||
|
|
The most common way to use HKDF is as follows: you provide the Initial Key Material (IKM) and an optional salt, then you expand it (perhaps multiple times) into some Output Key Material (OKM) bound to an "info" context string.
|
||
|
|
|
||
|
|
```rust
|
||
|
|
use sha2::Sha256;
|
||
|
|
use hkdf::Hkdf;
|
||
|
|
use hex_literal::hex;
|
||
|
|
|
||
|
|
let ikm = hex!("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b");
|
||
|
|
let salt = hex!("000102030405060708090a0b0c");
|
||
|
|
let info = hex!("f0f1f2f3f4f5f6f7f8f9");
|
||
|
|
|
||
|
|
let hk = Hkdf::<Sha256>::new(Some(&salt[..]), &ikm);
|
||
|
|
let mut okm = [0u8; 42];
|
||
|
|
hk.expand(&info, &mut okm)
|
||
|
|
.expect("42 is a valid length for Sha256 to output");
|
||
|
|
|
||
|
|
let expected = hex!("
|
||
|
|
3cb25f25faacd57a90434f64d0362f2a
|
||
|
|
2d2d0a90cf1a5a4c5db02d56ecc4c5bf
|
||
|
|
34007208d5b887185865
|
||
|
|
");
|
||
|
|
assert_eq!(okm, expected);
|
||
|
|
```
|
||
|
|
|
||
|
|
Normally the PRK (Pseudo-Random Key) remains hidden within the HKDF object, but if you need to access it, use `Hkdf::extract` instead of `Hkdf::new`.
|
||
|
|
|
||
|
|
```rust
|
||
|
|
let (prk, hk) = Hkdf::<Sha256>::extract(Some(&salt[..]), &ikm);
|
||
|
|
let expected = hex!("
|
||
|
|
077709362c2e32df0ddc3f0dc47bba63
|
||
|
|
90b6c73bb50f9c3122ec844ad7c2b3e5
|
||
|
|
");
|
||
|
|
assert_eq!(prk[..], expected[..]);
|
||
|
|
```
|
||
|
|
|
||
|
|
If you already have a strong key to work from (uniformly-distributed and
|
||
|
|
long enough), you can save a tiny amount of time by skipping the extract
|
||
|
|
step. In this case, you pass a Pseudo-Random Key (PRK) into the
|
||
|
|
`Hkdf::from_prk` constructor, then use the resulting `Hkdf` object
|
||
|
|
as usual.
|
||
|
|
|
||
|
|
```rust
|
||
|
|
let prk = hex!("
|
||
|
|
077709362c2e32df0ddc3f0dc47bba63
|
||
|
|
90b6c73bb50f9c3122ec844ad7c2b3e5
|
||
|
|
");
|
||
|
|
|
||
|
|
let hk = Hkdf::<Sha256>::from_prk(&prk).expect("PRK should be large enough");
|
||
|
|
let mut okm = [0u8; 42];
|
||
|
|
hk.expand(&info, &mut okm)
|
||
|
|
.expect("42 is a valid length for Sha256 to output");
|
||
|
|
|
||
|
|
let expected = hex!("
|
||
|
|
3cb25f25faacd57a90434f64d0362f2a
|
||
|
|
2d2d0a90cf1a5a4c5db02d56ecc4c5bf
|
||
|
|
34007208d5b887185865
|
||
|
|
");
|
||
|
|
assert_eq!(okm, expected);
|
||
|
|
```
|
||
|
|
|
||
|
|
[//]: # (badges)
|
||
|
|
|
||
|
|
[crate-image]: https://img.shields.io/crates/v/hkdf.svg
|
||
|
|
[crate-link]: https://crates.io/crates/hkdf
|
||
|
|
[docs-image]: https://docs.rs/hkdf/badge.svg
|
||
|
|
[docs-link]: https://docs.rs/hkdf/
|
||
|
|
[license-image]: https://img.shields.io/badge/license-Apache2.0/MIT-blue.svg
|
||
|
|
[rustc-image]: https://img.shields.io/badge/rustc-1.41+-blue.svg
|
||
|
|
[chat-image]: https://img.shields.io/badge/zulip-join_chat-blue.svg
|
||
|
|
[chat-link]: https://rustcrypto.zulipchat.com/#narrow/stream/260043-KDFs
|
||
|
|
[build-image]: https://github.com/RustCrypto/KDFs/workflows/hkdf/badge.svg?branch=master&event=push
|
||
|
|
[build-link]: https://github.com/RustCrypto/KDFs/actions?query=workflow:hkdf
|