cryptonite-0.14: Cryptography Primitives sink

LicenseBSD-style
MaintainerVincent Hanquez <vincent@snarc.org>
Stabilityexperimental
Portabilityunknown
Safe HaskellNone
LanguageHaskell2010

Crypto.KDF.HKDF

Description

Key Derivation Function based on HMAC

See RFC5869

Synopsis

Documentation

data PRK a Source

Pseudo Random Key

Instances

Eq (PRK a) Source 

extract Source

Arguments

:: (HashAlgorithm a, ByteArrayAccess salt, ByteArrayAccess ikm) 
=> salt

Salt

-> ikm

Input Keying Material

-> PRK a

Pseudo random key

Extract a Pseudo Random Key using the parameter and the underlaying hash mechanism

extractSkip :: (HashAlgorithm a, ByteArrayAccess ikm) => ikm -> PRK a Source

Create a PRK directly from the input key material.

Only use when guaranteed to have a good quality and random data to use directly as key. This effectively skip a HMAC with key=salt and data=key.

expand Source

Arguments

:: (HashAlgorithm a, ByteArrayAccess info, ByteArray out) 
=> PRK a

Pseudo Random Key

-> info

Optional context and application specific information

-> Int

Output length in bytes

-> out

Output data

Expand key material of specific length out of the parameters