Index: crypto/hkdf.h |
diff --git a/crypto/hkdf.h b/crypto/hkdf.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..e91bccf5b4f38c1f486c8423b28813d09de8662e |
--- /dev/null |
+++ b/crypto/hkdf.h |
@@ -0,0 +1,71 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CRYPTO_HKDF_H_ |
+#define CRYPTO_HKDF_H_ |
+ |
+#include <vector> |
+ |
+#include "base/basictypes.h" |
+#include "base/strings/string_piece.h" |
+#include "crypto/crypto_export.h" |
+ |
+namespace crypto { |
+ |
+// HKDF implements the key derivation function specified in RFC 5869 (using |
+// SHA-256) and outputs key material, as needed by QUIC. |
+// See https://tools.ietf.org/html/rfc5869 for details. |
+class CRYPTO_EXPORT HKDF { |
+ public: |
+ // |secret|: the input shared secret (or, from RFC 5869, the IKM). |
+ // |salt|: an (optional) public salt / non-secret random value. While |
+ // optional, callers are strongly recommended to provide a salt. There is no |
+ // added security value in making this larger than the SHA-256 block size of |
+ // 64 bytes. |
+ // |info|: an (optional) label to distinguish different uses of HKDF. It is |
+ // optional context and application specific information (can be a zero-length |
+ // string). |
+ // |key_bytes_to_generate|: the number of bytes of key material to generate |
+ // for both client and server. |
+ // |iv_bytes_to_generate|: the number of bytes of IV to generate for both |
+ // client and server. |
+ // |subkey_secret_bytes_to_generate|: the number of bytes of subkey secret to |
+ // generate, shared between client and server. |
+ HKDF(const base::StringPiece& secret, |
+ const base::StringPiece& salt, |
+ const base::StringPiece& info, |
+ size_t key_bytes_to_generate, |
+ size_t iv_bytes_to_generate, |
+ size_t subkey_secret_bytes_to_generate); |
+ ~HKDF(); |
+ |
+ base::StringPiece client_write_key() const { |
+ return client_write_key_; |
+ } |
+ base::StringPiece client_write_iv() const { |
+ return client_write_iv_; |
+ } |
+ base::StringPiece server_write_key() const { |
+ return server_write_key_; |
+ } |
+ base::StringPiece server_write_iv() const { |
+ return server_write_iv_; |
+ } |
+ base::StringPiece subkey_secret() const { |
+ return subkey_secret_; |
+ } |
+ |
+ private: |
+ std::vector<uint8> output_; |
+ |
+ base::StringPiece client_write_key_; |
+ base::StringPiece server_write_key_; |
+ base::StringPiece client_write_iv_; |
+ base::StringPiece server_write_iv_; |
+ base::StringPiece subkey_secret_; |
+}; |
+ |
+} // namespace crypto |
+ |
+#endif // CRYPTO_HKDF_H_ |