Blame SOURCES/openssl-1.1.1-krb5-kdf.patch

c95581
diff -up openssl-1.1.1d/crypto/err/openssl.txt.krb5-kdf openssl-1.1.1d/crypto/err/openssl.txt
c95581
--- openssl-1.1.1d/crypto/err/openssl.txt.krb5-kdf	2019-11-14 15:07:05.320094521 +0100
c95581
+++ openssl-1.1.1d/crypto/err/openssl.txt	2019-11-14 15:07:05.342094129 +0100
c95581
@@ -821,6 +821,11 @@ EVP_F_S390X_AES_GCM_CTRL:201:s390x_aes_g
3a273b
 EVP_F_SCRYPT_ALG:228:scrypt_alg
3a273b
 EVP_F_UPDATE:173:update
3a273b
 KDF_F_HKDF_EXTRACT:112:HKDF_Extract
3a273b
+KDF_F_KBKDF_CTRL:134:kbkdf_ctrl
3a273b
+KDF_F_KBKDF_CTRL_STR:135:kbkdf_ctrl_str
3a273b
+KDF_F_KBKDF_DERIVE:136:kbkdf_derive
3a273b
+KDF_F_KBKDF_NEW:137:kbkdf_new
3a273b
+KDF_F_KDF_CIPHER2CTRL:138:kdf_cipher2ctrl
3a273b
 KDF_F_KDF_HKDF_DERIVE:113:kdf_hkdf_derive
3a273b
 KDF_F_KDF_HKDF_NEW:114:kdf_hkdf_new
3a273b
 KDF_F_KDF_HKDF_SIZE:115:kdf_hkdf_size
c95581
@@ -840,6 +845,8 @@ KDF_F_KDF_SSHKDF_NEW:133:kdf_sshkdf_new
3a273b
 KDF_F_KDF_TLS1_PRF_CTRL_STR:125:kdf_tls1_prf_ctrl_str
3a273b
 KDF_F_KDF_TLS1_PRF_DERIVE:126:kdf_tls1_prf_derive
3a273b
 KDF_F_KDF_TLS1_PRF_NEW:127:kdf_tls1_prf_new
3a273b
+KDF_F_KRB5KDF:139:KRB5KDF
3a273b
+KDF_F_KRB5KDF_DERIVE:140:krb5kdf_derive
3a273b
 KDF_F_PBKDF2_SET_MEMBUF:128:pbkdf2_set_membuf
3a273b
 KDF_F_PKEY_HKDF_CTRL_STR:103:pkey_hkdf_ctrl_str
3a273b
 KDF_F_PKEY_HKDF_DERIVE:102:pkey_hkdf_derive
c95581
@@ -853,6 +860,9 @@ KDF_F_PKEY_TLS1_PRF_CTRL_STR:100:pkey_tl
3a273b
 KDF_F_PKEY_TLS1_PRF_DERIVE:101:pkey_tls1_prf_derive
3a273b
 KDF_F_PKEY_TLS1_PRF_INIT:110:pkey_tls1_prf_init
3a273b
 KDF_F_SCRYPT_SET_MEMBUF:129:scrypt_set_membuf
3a273b
+KDF_F_SSKDF_DERIVE:141:sskdf_derive
3a273b
+KDF_F_SSKDF_NEW:142:sskdf_new
3a273b
+KDF_F_SSKDF_SIZE:143:sskdf_size
3a273b
 KDF_F_TLS1_PRF_ALG:111:tls1_prf_alg
3a273b
 OBJ_F_OBJ_ADD_OBJECT:105:OBJ_add_object
3a273b
 OBJ_F_OBJ_ADD_SIGID:107:OBJ_add_sigid
c95581
@@ -2325,7 +2335,13 @@ EVP_R_UNSUPPORTED_SALT_TYPE:126:unsuppor
3a273b
 EVP_R_WRAP_MODE_NOT_ALLOWED:170:wrap mode not allowed
3a273b
 EVP_R_WRONG_FINAL_BLOCK_LENGTH:109:wrong final block length
c95581
 EVP_R_XTS_DUPLICATED_KEYS:183:xts duplicated keys
3a273b
+KDF_R_FAILED_TO_GENERATE_KEY:118:failed to generate key
3a273b
+KDF_R_INVALID_CIPHER:116:invalid cipher
3a273b
+KDF_R_INVALID_CONSTANT_LENGTH:119:invalid constant length
3a273b
 KDF_R_INVALID_DIGEST:100:invalid digest
3a273b
+KDF_R_INVALID_SEED_LENGTH:117:invalid seed length
3a273b
+KDF_R_MISSING_CIPHER:120:missing cipher
3a273b
+KDF_R_MISSING_CONSTANT:121:missing constant
3a273b
 KDF_R_MISSING_ITERATION_COUNT:109:missing iteration count
3a273b
 KDF_R_MISSING_KEY:104:missing key
3a273b
 KDF_R_MISSING_MESSAGE_DIGEST:105:missing message digest
c95581
@@ -2340,6 +2356,7 @@ KDF_R_MISSING_XCGHASH:115:missing xcghas
3a273b
 KDF_R_UNKNOWN_PARAMETER_TYPE:103:unknown parameter type
3a273b
 KDF_R_VALUE_ERROR:108:value error
3a273b
 KDF_R_VALUE_MISSING:102:value missing
3a273b
+KDF_R_WRONG_FINAL_BLOCK_LENGTH:120:wrong final block length
3a273b
 KDF_R_WRONG_OUTPUT_BUFFER_SIZE:112:wrong output buffer size
3a273b
 OBJ_R_OID_EXISTS:102:oid exists
3a273b
 OBJ_R_UNKNOWN_NID:101:unknown nid
c95581
diff -up openssl-1.1.1d/crypto/evp/kdf_lib.c.krb5-kdf openssl-1.1.1d/crypto/evp/kdf_lib.c
c95581
--- openssl-1.1.1d/crypto/evp/kdf_lib.c.krb5-kdf	2019-11-14 15:07:05.320094521 +0100
c95581
+++ openssl-1.1.1d/crypto/evp/kdf_lib.c	2019-11-14 15:07:05.342094129 +0100
3a273b
@@ -31,6 +31,9 @@ static const EVP_KDF_METHOD *standard_me
3a273b
     &tls1_prf_kdf_meth,
3a273b
     &hkdf_kdf_meth,
3a273b
     &sshkdf_kdf_meth,
3a273b
+    &kb_kdf_meth,
3a273b
+    &krb5kdf_kdf_meth,
3a273b
+    &ss_kdf_meth
3a273b
 };
3a273b
 
3a273b
 DECLARE_OBJ_BSEARCH_CMP_FN(const EVP_KDF_METHOD *, const EVP_KDF_METHOD *,
c95581
diff -up openssl-1.1.1d/include/crypto/evp.h.krb5-kdf openssl-1.1.1d/include/crypto/evp.h
c95581
--- openssl-1.1.1d/include/crypto/evp.h.krb5-kdf	2019-11-14 15:07:05.320094521 +0100
c95581
+++ openssl-1.1.1d/include/crypto/evp.h	2019-11-14 15:07:05.342094129 +0100
3a273b
@@ -130,6 +130,9 @@ extern const EVP_KDF_METHOD scrypt_kdf_m
3a273b
 extern const EVP_KDF_METHOD tls1_prf_kdf_meth;
3a273b
 extern const EVP_KDF_METHOD hkdf_kdf_meth;
3a273b
 extern const EVP_KDF_METHOD sshkdf_kdf_meth;
3a273b
+extern const EVP_KDF_METHOD kb_kdf_meth;
3a273b
+extern const EVP_KDF_METHOD krb5kdf_kdf_meth;
3a273b
+extern const EVP_KDF_METHOD ss_kdf_meth;
3a273b
 
3a273b
 struct evp_md_st {
3a273b
     int type;
c95581
diff -up openssl-1.1.1d/crypto/kdf/build.info.krb5-kdf openssl-1.1.1d/crypto/kdf/build.info
c95581
--- openssl-1.1.1d/crypto/kdf/build.info.krb5-kdf	2019-11-14 15:07:05.320094521 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/build.info	2019-11-14 15:07:05.342094129 +0100
3a273b
@@ -1,3 +1,3 @@
3a273b
 LIBS=../../libcrypto
3a273b
 SOURCE[../../libcrypto]=\
3a273b
-        tls1_prf.c kdf_err.c kdf_util.c hkdf.c scrypt.c pbkdf2.c sshkdf.c
3a273b
+        tls1_prf.c kdf_err.c kdf_util.c hkdf.c scrypt.c pbkdf2.c sshkdf.c kbkdf.c krb5kdf.c sskdf.c
c95581
diff -up openssl-1.1.1d/crypto/kdf/kbkdf.c.krb5-kdf openssl-1.1.1d/crypto/kdf/kbkdf.c
c95581
--- openssl-1.1.1d/crypto/kdf/kbkdf.c.krb5-kdf	2019-11-14 15:07:05.343094112 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/kbkdf.c	2019-11-18 17:21:58.326635901 +0100
3a273b
@@ -0,0 +1,540 @@
3a273b
+/*
3a273b
+ * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
3a273b
+ * Copyright 2019 Red Hat, Inc.
3a273b
+ *
3a273b
+ * Licensed under the Apache License 2.0 (the "License").  You may not use
3a273b
+ * this file except in compliance with the License.  You can obtain a copy
3a273b
+ * in the file LICENSE in the source distribution or at
3a273b
+ * https://www.openssl.org/source/license.html
3a273b
+ */
3a273b
+
3a273b
+/*
3a273b
+ * This implements https://csrc.nist.gov/publications/detail/sp/800-108/final
3a273b
+ * section 5.1 ("counter mode") and section 5.2 ("feedback mode") in both HMAC
3a273b
+ * and CMAC.  That document does not name the KDFs it defines; the name is
3a273b
+ * derived from
3a273b
+ * https://csrc.nist.gov/Projects/Cryptographic-Algorithm-Validation-Program/Key-Derivation
3a273b
+ *
3a273b
+ * Note that section 5.3 ("double-pipeline mode") is not implemented, though
3a273b
+ * it would be possible to do so in the future.
3a273b
+ *
3a273b
+ * These versions all assume the counter is used.  It would be relatively
3a273b
+ * straightforward to expose a configuration handle should the need arise.
3a273b
+ *
3a273b
+ * Variable names attempt to match those of SP800-108.
3a273b
+ */
3a273b
+
3a273b
+#include <stdarg.h>
3a273b
+#include <stdlib.h>
3a273b
+#include <string.h>
3a273b
+
3a273b
+#include <openssl/evp.h>
3a273b
+#include <openssl/hmac.h>
3a273b
+#include <openssl/cmac.h>
3a273b
+#include <openssl/kdf.h>
3a273b
+
3a273b
+#include "internal/numbers.h"
3a273b
+#include "internal/cryptlib.h"
c95581
+#include "crypto/evp.h"
3a273b
+#include "kdf_local.h"
3a273b
+
3a273b
+#include "e_os.h"
3a273b
+
3a273b
+#ifdef MIN
3a273b
+# undef MIN
3a273b
+#endif
3a273b
+#define MIN(a, b) ((a) < (b)) ? (a) : (b)
3a273b
+
3a273b
+typedef struct {
3a273b
+    int mac_type;
3a273b
+    union {
3a273b
+        HMAC_CTX *hmac;
3a273b
+        CMAC_CTX *cmac;
3a273b
+    } m;
3a273b
+} MAC_CTX;
3a273b
+
3a273b
+/* Our context structure. */
3a273b
+struct evp_kdf_impl_st {
3a273b
+    int mode;
3a273b
+
3a273b
+    MAC_CTX *ctx_init;
3a273b
+
3a273b
+    const EVP_CIPHER *cipher;
3a273b
+    const EVP_MD *md;
3a273b
+
3a273b
+    /* Names are lowercased versions of those found in SP800-108. */
3a273b
+    unsigned char *ki;
3a273b
+    size_t ki_len;
3a273b
+    unsigned char *label;
3a273b
+    size_t label_len;
3a273b
+    unsigned char *context;
3a273b
+    size_t context_len;
3a273b
+    unsigned char *iv;
3a273b
+    size_t iv_len;
3a273b
+};
3a273b
+
3a273b
+static MAC_CTX *EVP_MAC_CTX_new(int mac_type)
3a273b
+{
3a273b
+    MAC_CTX *ctx;
3a273b
+
3a273b
+    ctx = OPENSSL_zalloc(sizeof(*ctx));
3a273b
+    if (ctx == NULL)
3a273b
+        return NULL;
3a273b
+
3a273b
+    ctx->mac_type = mac_type;
3a273b
+    if (mac_type == EVP_KDF_KB_MAC_TYPE_HMAC) {
3a273b
+        if ((ctx->m.hmac = HMAC_CTX_new()) == NULL)
3a273b
+            goto err;
3a273b
+    } else {
3a273b
+        if ((ctx->m.cmac = CMAC_CTX_new()) == NULL)
3a273b
+            goto err;
3a273b
+    }
3a273b
+    return ctx;
3a273b
+
3a273b
+err:
3a273b
+    OPENSSL_free(ctx);
3a273b
+    return NULL;
3a273b
+}
3a273b
+
3a273b
+static void EVP_MAC_CTX_free(MAC_CTX *ctx)
3a273b
+{
3a273b
+    if (ctx == NULL)
3a273b
+        return;
3a273b
+
3a273b
+    if (ctx->mac_type == EVP_KDF_KB_MAC_TYPE_HMAC)
3a273b
+        HMAC_CTX_free(ctx->m.hmac);
3a273b
+    else
3a273b
+        CMAC_CTX_free(ctx->m.cmac);
3a273b
+    OPENSSL_free(ctx);
3a273b
+}
3a273b
+
3a273b
+static MAC_CTX *EVP_MAC_CTX_dup(MAC_CTX *sctx)
3a273b
+{
3a273b
+    MAC_CTX *ctx;
3a273b
+
3a273b
+    ctx = OPENSSL_zalloc(sizeof(*sctx));
3a273b
+    if (ctx == NULL)
3a273b
+        return NULL;
3a273b
+
3a273b
+    ctx->mac_type = sctx->mac_type;
3a273b
+    if (sctx->mac_type == EVP_KDF_KB_MAC_TYPE_HMAC) {
3a273b
+        if ((ctx->m.hmac = HMAC_CTX_new()) == NULL
3a273b
+            || HMAC_CTX_copy(ctx->m.hmac, sctx->m.hmac) <= 0)
3a273b
+            goto err;
3a273b
+    } else {
3a273b
+        if ((ctx->m.cmac = CMAC_CTX_new()) == NULL
3a273b
+            || CMAC_CTX_copy(ctx->m.cmac, sctx->m.cmac) <= 0)
3a273b
+            goto err;
3a273b
+    }
3a273b
+    return ctx;
3a273b
+
3a273b
+err:
3a273b
+    EVP_MAC_CTX_free(ctx);
3a273b
+    return NULL;
3a273b
+}
3a273b
+
3a273b
+static size_t EVP_MAC_size(MAC_CTX *ctx)
3a273b
+{
3a273b
+    if (ctx->mac_type == EVP_KDF_KB_MAC_TYPE_HMAC) {
3a273b
+        const EVP_MD *md;
3a273b
+
3a273b
+        if (ctx->m.hmac == NULL)
3a273b
+            return 0;
3a273b
+        if ((md = HMAC_CTX_get_md(ctx->m.hmac)) == NULL)
3a273b
+            return 0;
3a273b
+        return (size_t)EVP_MD_size(md);
3a273b
+    } else {
3a273b
+        const EVP_CIPHER_CTX *cctx;
3a273b
+
3a273b
+        if (ctx->m.cmac == NULL)
3a273b
+            return 0;
3a273b
+        if ((cctx = CMAC_CTX_get0_cipher_ctx(ctx->m.cmac)) == NULL)
3a273b
+            return 0;
3a273b
+        return EVP_CIPHER_CTX_block_size(cctx);
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static int EVP_MAC_update(MAC_CTX *ctx, const unsigned char *data,
3a273b
+                          size_t datalen)
3a273b
+{
3a273b
+    if (ctx->mac_type == EVP_KDF_KB_MAC_TYPE_HMAC)
3a273b
+        return HMAC_Update(ctx->m.hmac, data, datalen);
3a273b
+    else
3a273b
+        return CMAC_Update(ctx->m.cmac, data, datalen);
3a273b
+}
3a273b
+
3a273b
+static int EVP_MAC_final(MAC_CTX *ctx, unsigned char *out,
3a273b
+                         size_t *outl, size_t outsize)
3a273b
+{
3a273b
+    if (outsize != EVP_MAC_size(ctx))
3a273b
+        /* we do not cope with anything else */
3a273b
+        return 0;
3a273b
+
3a273b
+    if (ctx->mac_type == EVP_KDF_KB_MAC_TYPE_HMAC) {
3a273b
+        unsigned int intsize = (unsigned int)outsize;
3a273b
+        int ret;
3a273b
+
3a273b
+        ret = HMAC_Final(ctx->m.hmac, out, &intsize);
3a273b
+        if (outl != NULL)
3a273b
+            *outl = intsize;
3a273b
+        return ret;
3a273b
+    } else {
3a273b
+        size_t size = outsize;
3a273b
+        int ret;
3a273b
+
3a273b
+        ret = CMAC_Final(ctx->m.cmac, out, &size);
3a273b
+        if (outl != NULL)
3a273b
+            *outl = size;
3a273b
+        return ret;
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static int evp_mac_init(MAC_CTX *ctx, const EVP_MD *md,
3a273b
+                        const EVP_CIPHER *cipher, unsigned char *key, size_t keylen)
3a273b
+{
3a273b
+    if (ctx->mac_type == EVP_KDF_KB_MAC_TYPE_HMAC) {
3a273b
+        if (md == NULL)
3a273b
+            return 0;
3a273b
+        return HMAC_Init_ex(ctx->m.hmac, key, (int)keylen, md, NULL);
3a273b
+    } else {
3a273b
+        if (cipher == NULL)
3a273b
+            return 0;
3a273b
+        return CMAC_Init(ctx->m.cmac, key, keylen, cipher, NULL);
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static void kbkdf_reset(EVP_KDF_IMPL *ctx);
3a273b
+
3a273b
+/* Not all platforms have htobe32(). */
3a273b
+static uint32_t be32(uint32_t host)
3a273b
+{
3a273b
+    uint32_t big = 0;
3a273b
+    const union {
3a273b
+        long one;
3a273b
+        char little;
3a273b
+    } is_endian = { 1 };
3a273b
+
3a273b
+    if (!is_endian.little)
3a273b
+        return host;
3a273b
+
3a273b
+    big |= (host & 0xff000000) >> 24;
3a273b
+    big |= (host & 0x00ff0000) >> 8;
3a273b
+    big |= (host & 0x0000ff00) << 8;
3a273b
+    big |= (host & 0x000000ff) << 24;
3a273b
+    return big;
3a273b
+}
3a273b
+
3a273b
+static EVP_KDF_IMPL *kbkdf_new(void)
3a273b
+{
3a273b
+    EVP_KDF_IMPL *ctx;
3a273b
+
3a273b
+    ctx = OPENSSL_zalloc(sizeof(*ctx));
3a273b
+    if (ctx == NULL) {
3a273b
+        KDFerr(KDF_F_KBKDF_NEW, ERR_R_MALLOC_FAILURE);
3a273b
+        return NULL;
3a273b
+    }
3a273b
+
3a273b
+    return ctx;
3a273b
+}
3a273b
+
3a273b
+static void kbkdf_free(EVP_KDF_IMPL *ctx)
3a273b
+{
3a273b
+    kbkdf_reset(ctx);
3a273b
+    OPENSSL_free(ctx);
3a273b
+}
3a273b
+
3a273b
+static void kbkdf_reset(EVP_KDF_IMPL *ctx)
3a273b
+{
3a273b
+    EVP_MAC_CTX_free(ctx->ctx_init);
3a273b
+    OPENSSL_clear_free(ctx->context, ctx->context_len);
3a273b
+    OPENSSL_clear_free(ctx->label, ctx->label_len);
3a273b
+    OPENSSL_clear_free(ctx->ki, ctx->ki_len);
3a273b
+    OPENSSL_clear_free(ctx->iv, ctx->iv_len);
3a273b
+    memset(ctx, 0, sizeof(*ctx));
3a273b
+}
3a273b
+
3a273b
+/* SP800-108 section 5.1 or section 5.2 depending on mode. */
3a273b
+static int derive(MAC_CTX *ctx_init, int mode, unsigned char *iv,
3a273b
+                  size_t iv_len, unsigned char *label, size_t label_len,
3a273b
+                  unsigned char *context, size_t context_len,
3a273b
+                  unsigned char *k_i, size_t h, uint32_t l, unsigned char *ko,
3a273b
+                  size_t ko_len)
3a273b
+{
3a273b
+    int ret = 0;
3a273b
+    MAC_CTX *ctx = NULL;
3a273b
+    size_t written = 0, to_write, k_i_len = iv_len;
3a273b
+    const unsigned char zero = 0;
3a273b
+    uint32_t counter, i;
3a273b
+
3a273b
+    /* Setup K(0) for feedback mode. */
3a273b
+    if (iv_len > 0)
3a273b
+        memcpy(k_i, iv, iv_len);
3a273b
+
3a273b
+    for (counter = 1; written < ko_len; counter++) {
3a273b
+        i = be32(counter);
3a273b
+
3a273b
+        ctx = EVP_MAC_CTX_dup(ctx_init);
3a273b
+        if (ctx == NULL)
3a273b
+            goto done;
3a273b
+
3a273b
+        /* Perform feedback, if appropriate. */
3a273b
+        if (mode == EVP_KDF_KB_MODE_FEEDBACK && !EVP_MAC_update(ctx, k_i, k_i_len))
3a273b
+            goto done;
3a273b
+
3a273b
+        if (!EVP_MAC_update(ctx, (unsigned char *)&i, 4)
3a273b
+            || !EVP_MAC_update(ctx, label, label_len)
3a273b
+            || !EVP_MAC_update(ctx, &zero, 1)
3a273b
+            || !EVP_MAC_update(ctx, context, context_len)
3a273b
+            || !EVP_MAC_update(ctx, (unsigned char *)&l, 4)
3a273b
+            || !EVP_MAC_final(ctx, k_i, NULL, h))
3a273b
+            goto done;
3a273b
+
3a273b
+        to_write = ko_len - written;
3a273b
+        memcpy(ko + written, k_i, MIN(to_write, h));
3a273b
+        written += h;
3a273b
+
3a273b
+        k_i_len = h;
3a273b
+        EVP_MAC_CTX_free(ctx);
3a273b
+        ctx = NULL;
3a273b
+    }
3a273b
+
3a273b
+    ret = 1;
3a273b
+done:
3a273b
+    EVP_MAC_CTX_free(ctx);
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static int kbkdf_derive(EVP_KDF_IMPL *ctx, unsigned char *key, size_t keylen)
3a273b
+{
3a273b
+    int ret = 0;
3a273b
+    unsigned char *k_i = NULL;
3a273b
+    uint32_t l = be32(keylen * 8);
3a273b
+    size_t h = 0;
3a273b
+
3a273b
+    /* label, context, and iv are permitted to be empty.  Check everything
3a273b
+     * else. */
3a273b
+    if (ctx->ctx_init == NULL
3a273b
+        || evp_mac_init(ctx->ctx_init, ctx->md, ctx->cipher, ctx->ki, ctx->ki_len) <= 0) {
3a273b
+        if (ctx->ki_len == 0 || ctx->ki == NULL) {
3a273b
+            KDFerr(KDF_F_KBKDF_DERIVE, KDF_R_MISSING_KEY);
3a273b
+            return 0;
3a273b
+        }
3a273b
+        /* Could either be missing MAC or missing message digest or missing
3a273b
+         * cipher - arbitrarily, I pick this one. */
3a273b
+        KDFerr(KDF_F_KBKDF_DERIVE, KDF_R_MISSING_PARAMETER);
3a273b
+        return 0;
3a273b
+    }
3a273b
+
3a273b
+    h = EVP_MAC_size(ctx->ctx_init);
3a273b
+    if (h == 0)
3a273b
+        goto done;
3a273b
+    if (ctx->iv_len != 0 && ctx->iv_len != h) {
3a273b
+        KDFerr(KDF_F_KBKDF_DERIVE, KDF_R_INVALID_SEED_LENGTH);
3a273b
+        goto done;
3a273b
+    }
3a273b
+
3a273b
+    k_i = OPENSSL_zalloc(h);
3a273b
+    if (k_i == NULL)
3a273b
+        goto done;
3a273b
+
3a273b
+    ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label,
3a273b
+                 ctx->label_len, ctx->context, ctx->context_len, k_i, h, l,
3a273b
+                 key, keylen);
3a273b
+done:
3a273b
+    if (ret != 1)
3a273b
+        OPENSSL_cleanse(key, keylen);
3a273b
+    OPENSSL_clear_free(k_i, h);
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static size_t kbkdf_size(EVP_KDF_IMPL *ctx)
3a273b
+{
3a273b
+    return UINT32_MAX/8;
3a273b
+}
3a273b
+
3a273b
+static int kbkdf_parse_buffer_arg(unsigned char **dst, size_t *dst_len,
3a273b
+                                       va_list args)
3a273b
+{
3a273b
+    const unsigned char *p;
3a273b
+    size_t len;
3a273b
+
3a273b
+    p = va_arg(args, const unsigned char *);
3a273b
+    len = va_arg(args, size_t);
3a273b
+    OPENSSL_clear_free(*dst, *dst_len);
3a273b
+    if (len == 0) {
3a273b
+        *dst = NULL;
3a273b
+        *dst_len = 0;
3a273b
+        return 1;
3a273b
+    }
3a273b
+
3a273b
+    *dst = OPENSSL_memdup(p, len);
3a273b
+    if (*dst == NULL)
3a273b
+        return 0;
3a273b
+
3a273b
+    *dst_len = len;
3a273b
+    return 1;
3a273b
+}
3a273b
+
3a273b
+static int kbkdf_ctrl(EVP_KDF_IMPL *ctx, int cmd, va_list args)
3a273b
+{
3a273b
+    int t;
3a273b
+
3a273b
+    switch (cmd) {
3a273b
+    case EVP_KDF_CTRL_SET_MD:
3a273b
+        ctx->md = va_arg(args, const EVP_MD *);
3a273b
+        if (ctx->md == NULL)
3a273b
+            return 0;
3a273b
+
3a273b
+        return 1;
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_CIPHER:
3a273b
+        ctx->cipher = va_arg(args, const EVP_CIPHER *);
3a273b
+        if (ctx->cipher == NULL)
3a273b
+            return 0;
3a273b
+
3a273b
+        return 1;
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KEY:
3a273b
+        return kbkdf_parse_buffer_arg(&ctx->ki,
3a273b
+                                      &ctx->ki_len, args);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_SALT:
3a273b
+        return kbkdf_parse_buffer_arg(&ctx->label,
3a273b
+                                           &ctx->label_len, args);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KB_INFO:
3a273b
+        return kbkdf_parse_buffer_arg(&ctx->context,
3a273b
+                                           &ctx->context_len, args);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KB_SEED:
3a273b
+        return kbkdf_parse_buffer_arg(&ctx->iv,
3a273b
+                                           &ctx->iv_len, args);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KB_MODE:
3a273b
+        t = va_arg(args, int);
3a273b
+        if (t != EVP_KDF_KB_MODE_COUNTER && t != EVP_KDF_KB_MODE_FEEDBACK ) {
3a273b
+            KDFerr(KDF_F_KBKDF_CTRL, KDF_R_VALUE_ERROR);
3a273b
+            return 0;
3a273b
+        }
3a273b
+        ctx->mode = t;
3a273b
+        return 1;
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KB_MAC_TYPE:
3a273b
+        t = va_arg(args, int);
3a273b
+        if (t != EVP_KDF_KB_MAC_TYPE_HMAC && t != EVP_KDF_KB_MAC_TYPE_CMAC ) {
3a273b
+            KDFerr(KDF_F_KBKDF_CTRL, KDF_R_VALUE_ERROR);
3a273b
+            return 0;
3a273b
+        }
3a273b
+
3a273b
+        if (ctx->ctx_init != NULL) {
3a273b
+            EVP_MAC_CTX_free(ctx->ctx_init);
3a273b
+        }
3a273b
+        ctx->ctx_init = EVP_MAC_CTX_new(t);
3a273b
+        if (ctx->ctx_init == NULL) {
3a273b
+            KDFerr(KDF_F_KBKDF_CTRL, ERR_R_MALLOC_FAILURE);
3a273b
+            return 0;
3a273b
+        }
3a273b
+        return 1;
3a273b
+
3a273b
+    default:
3a273b
+        return -2;
3a273b
+
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static int kbkdf_ctrl_str(EVP_KDF_IMPL *ctx, const char *type,
3a273b
+                               const char *value)
3a273b
+{
3a273b
+    if (value == NULL) {
3a273b
+        KDFerr(KDF_F_KDF_SSHKDF_CTRL_STR, KDF_R_VALUE_MISSING);
3a273b
+        return 0;
3a273b
+    }
3a273b
+
3a273b
+    if (strcmp(type, "digest") == 0)
3a273b
+        return kdf_md2ctrl(ctx, kbkdf_ctrl, EVP_KDF_CTRL_SET_MD, value);
3a273b
+    /* alias, for historical reasons */
3a273b
+    if (strcmp(type, "md") == 0)
3a273b
+        return kdf_md2ctrl(ctx, kbkdf_ctrl, EVP_KDF_CTRL_SET_MD, value);
3a273b
+
3a273b
+    if (strcmp(type, "cipher") == 0)
3a273b
+        return kdf_cipher2ctrl(ctx, kbkdf_ctrl, EVP_KDF_CTRL_SET_CIPHER, value);
3a273b
+
3a273b
+    if (strcmp(type, "key") == 0)
3a273b
+        return kdf_str2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KEY, value);
3a273b
+
3a273b
+    if (strcmp(type, "hexkey") == 0)
3a273b
+        return kdf_hex2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KEY, value);
3a273b
+
3a273b
+    if (strcmp(type, "salt") == 0)
3a273b
+        return kdf_str2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_SALT, value);
3a273b
+
3a273b
+    if (strcmp(type, "hexsalt") == 0)
3a273b
+        return kdf_hex2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_SALT, value);
3a273b
+
3a273b
+    if (strcmp(type, "info") == 0)
3a273b
+        return kdf_str2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KB_INFO, value);
3a273b
+
3a273b
+    if (strcmp(type, "hexinfo") == 0)
3a273b
+        return kdf_hex2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KB_INFO, value);
3a273b
+
3a273b
+    if (strcmp(type, "seed") == 0)
3a273b
+        return kdf_str2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KB_SEED, value);
3a273b
+
3a273b
+    if (strcmp(type, "hexseed") == 0)
3a273b
+        return kdf_hex2ctrl(ctx, kbkdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KB_SEED, value);
3a273b
+
3a273b
+    if (strcmp(type, "mode") == 0) {
3a273b
+        int mode;
3a273b
+
3a273b
+        if (strcasecmp(value, "counter") == 0) {
3a273b
+            mode = EVP_KDF_KB_MODE_COUNTER;
3a273b
+        } else if (strcasecmp(value, "feedback") == 0) {
3a273b
+            mode = EVP_KDF_KB_MODE_FEEDBACK;
3a273b
+        } else {
3a273b
+            KDFerr(KDF_F_KBKDF_CTRL_STR, KDF_R_VALUE_ERROR);
3a273b
+            return 0;
3a273b
+        }
3a273b
+
3a273b
+        return call_ctrl(kbkdf_ctrl, ctx, EVP_KDF_CTRL_SET_KB_MODE,
3a273b
+                         mode);
3a273b
+    }
3a273b
+
3a273b
+    if (strcmp(type, "mac_type") == 0) {
3a273b
+        int mac_type;
3a273b
+
3a273b
+        if (strcasecmp(value, "hmac") == 0) {
3a273b
+            mac_type = EVP_KDF_KB_MAC_TYPE_HMAC;
3a273b
+        } else if (strcasecmp(value, "cmac") == 0) {
3a273b
+            mac_type = EVP_KDF_KB_MAC_TYPE_CMAC;
3a273b
+        } else {
3a273b
+            KDFerr(KDF_F_KBKDF_CTRL_STR, KDF_R_VALUE_ERROR);
3a273b
+            return 0;
3a273b
+        }
3a273b
+
3a273b
+        return call_ctrl(kbkdf_ctrl, ctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE,
3a273b
+                         mac_type);
3a273b
+    }
3a273b
+
3a273b
+    KDFerr(KDF_F_KBKDF_CTRL_STR, KDF_R_UNKNOWN_PARAMETER_TYPE);
3a273b
+    return -2;
3a273b
+}
3a273b
+
3a273b
+const EVP_KDF_METHOD kb_kdf_meth = {
3a273b
+    EVP_KDF_KB,
3a273b
+    kbkdf_new,
3a273b
+    kbkdf_free,
3a273b
+    kbkdf_reset,
3a273b
+    kbkdf_ctrl,
3a273b
+    kbkdf_ctrl_str,
3a273b
+    kbkdf_size,
3a273b
+    kbkdf_derive,
3a273b
+};
3a273b
+
c95581
diff -up openssl-1.1.1d/crypto/kdf/kdf_err.c.krb5-kdf openssl-1.1.1d/crypto/kdf/kdf_err.c
c95581
--- openssl-1.1.1d/crypto/kdf/kdf_err.c.krb5-kdf	2019-11-14 15:07:05.320094521 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/kdf_err.c	2019-11-14 15:07:05.343094112 +0100
3a273b
@@ -15,6 +15,11 @@
3a273b
 
3a273b
 static const ERR_STRING_DATA KDF_str_functs[] = {
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_HKDF_EXTRACT, 0), "HKDF_Extract"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KBKDF_CTRL, 0), "kbkdf_ctrl"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KBKDF_CTRL_STR, 0), "kbkdf_ctrl_str"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KBKDF_DERIVE, 0), "kbkdf_derive"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KBKDF_NEW, 0), "kbkdf_new"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KDF_CIPHER2CTRL, 0), "kdf_cipher2ctrl"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_KDF_HKDF_DERIVE, 0), "kdf_hkdf_derive"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_KDF_HKDF_NEW, 0), "kdf_hkdf_new"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_KDF_HKDF_SIZE, 0), "kdf_hkdf_size"},
3a273b
@@ -41,6 +46,8 @@ static const ERR_STRING_DATA KDF_str_fun
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_KDF_TLS1_PRF_DERIVE, 0),
3a273b
      "kdf_tls1_prf_derive"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_KDF_TLS1_PRF_NEW, 0), "kdf_tls1_prf_new"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KRB5KDF, 0), "KRB5KDF"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_KRB5KDF_DERIVE, 0), "krb5kdf_derive"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_PBKDF2_SET_MEMBUF, 0), "pbkdf2_set_membuf"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_PKEY_HKDF_CTRL_STR, 0), "pkey_hkdf_ctrl_str"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_PKEY_HKDF_DERIVE, 0), "pkey_hkdf_derive"},
3a273b
@@ -59,12 +66,22 @@ static const ERR_STRING_DATA KDF_str_fun
3a273b
      "pkey_tls1_prf_derive"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_PKEY_TLS1_PRF_INIT, 0), "pkey_tls1_prf_init"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_SCRYPT_SET_MEMBUF, 0), "scrypt_set_membuf"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_SSKDF_DERIVE, 0), "sskdf_derive"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_SSKDF_NEW, 0), "sskdf_new"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, KDF_F_SSKDF_SIZE, 0), "sskdf_size"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, KDF_F_TLS1_PRF_ALG, 0), "tls1_prf_alg"},
3a273b
     {0, NULL}
3a273b
 };
3a273b
 
3a273b
 static const ERR_STRING_DATA KDF_str_reasons[] = {
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_FAILED_TO_GENERATE_KEY),
3a273b
+    "failed to generate key"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_INVALID_CIPHER), "invalid cipher"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_INVALID_CONSTANT_LENGTH), "invalid constant length"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_INVALID_DIGEST), "invalid digest"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_INVALID_SEED_LENGTH), "invalid seed length"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_MISSING_CIPHER), "missing cipher"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_MISSING_CONSTANT), "missing constant"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_MISSING_ITERATION_COUNT),
3a273b
     "missing iteration count"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_MISSING_KEY), "missing key"},
3a273b
@@ -82,6 +99,8 @@ static const ERR_STRING_DATA KDF_str_rea
3a273b
     "unknown parameter type"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_VALUE_ERROR), "value error"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_VALUE_MISSING), "value missing"},
3a273b
+    {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_WRONG_FINAL_BLOCK_LENGTH),
3a273b
+    "wrong final block length"},
3a273b
     {ERR_PACK(ERR_LIB_KDF, 0, KDF_R_WRONG_OUTPUT_BUFFER_SIZE),
3a273b
     "wrong output buffer size"},
3a273b
     {0, NULL}
c95581
diff -up openssl-1.1.1d/crypto/kdf/kdf_local.h.krb5-kdf openssl-1.1.1d/crypto/kdf/kdf_local.h
c95581
--- openssl-1.1.1d/crypto/kdf/kdf_local.h.krb5-kdf	2019-11-14 15:07:05.313094646 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/kdf_local.h	2019-11-14 15:07:05.344094093 +0100
3a273b
@@ -19,4 +19,6 @@ int kdf_hex2ctrl(EVP_KDF_IMPL *impl,
3a273b
 int kdf_md2ctrl(EVP_KDF_IMPL *impl,
3a273b
                 int (*ctrl)(EVP_KDF_IMPL *impl, int cmd, va_list args),
3a273b
                 int cmd, const char *md_name);
3a273b
-
3a273b
+int kdf_cipher2ctrl(EVP_KDF_IMPL *impl,
3a273b
+                    int (*ctrl)(EVP_KDF_IMPL *impl, int cmd, va_list args),
3a273b
+                    int cmd, const char *cipher_name);
c95581
diff -up openssl-1.1.1d/crypto/kdf/kdf_util.c.krb5-kdf openssl-1.1.1d/crypto/kdf/kdf_util.c
c95581
--- openssl-1.1.1d/crypto/kdf/kdf_util.c.krb5-kdf	2019-11-14 15:07:05.313094646 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/kdf_util.c	2019-11-14 15:07:05.344094093 +0100
3a273b
@@ -71,3 +71,16 @@ int kdf_md2ctrl(EVP_KDF_IMPL *impl,
3a273b
     return call_ctrl(ctrl, impl, cmd, md);
3a273b
 }
3a273b
 
3a273b
+/* Pass a cipher to a ctrl */
3a273b
+int kdf_cipher2ctrl(EVP_KDF_IMPL *impl,
3a273b
+                    int (*ctrl)(EVP_KDF_IMPL *impl, int cmd, va_list args),
3a273b
+                    int cmd, const char *cipher_name)
3a273b
+{
3a273b
+    const EVP_CIPHER *cipher;
3a273b
+
3a273b
+    if (cipher_name == NULL || (cipher = EVP_get_cipherbyname(cipher_name)) == NULL) {
3a273b
+        KDFerr(KDF_F_KDF_CIPHER2CTRL, KDF_R_INVALID_CIPHER);
3a273b
+        return 0;
3a273b
+    }
3a273b
+    return call_ctrl(ctrl, impl, cmd, cipher);
3a273b
+}
c95581
diff -up openssl-1.1.1d/crypto/kdf/krb5kdf.c.krb5-kdf openssl-1.1.1d/crypto/kdf/krb5kdf.c
c95581
--- openssl-1.1.1d/crypto/kdf/krb5kdf.c.krb5-kdf	2019-11-14 15:07:05.344094093 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/krb5kdf.c	2019-11-18 17:18:13.056604404 +0100
3a273b
@@ -0,0 +1,423 @@
3a273b
+/*
3a273b
+ * Copyright 2018-2019 The OpenSSL Project Authors. All Rights Reserved.
3a273b
+ *
3a273b
+ * Licensed under the OpenSSL license (the "License").  You may not use
3a273b
+ * this file except in compliance with the License.  You can obtain a copy
3a273b
+ * in the file LICENSE in the source distribution or at
3a273b
+ * https://www.openssl.org/source/license.html
3a273b
+ */
3a273b
+
3a273b
+#include <stdlib.h>
3a273b
+#include <stdarg.h>
3a273b
+#include <string.h>
3a273b
+
3a273b
+#include <openssl/des.h>
3a273b
+#include <openssl/evp.h>
3a273b
+#include <openssl/kdf.h>
3a273b
+
3a273b
+#include "internal/cryptlib.h"
c95581
+#include "crypto/evp.h"
3a273b
+#include "kdf_local.h"
3a273b
+
3a273b
+/* KRB5 KDF defined in RFC 3961, Section 5.1 */
3a273b
+
3a273b
+static int KRB5KDF(const EVP_CIPHER *cipher,
3a273b
+                   const unsigned char *key, size_t key_len,
3a273b
+                   const unsigned char *constant, size_t constant_len,
3a273b
+                   unsigned char *okey, size_t okey_len);
3a273b
+
3a273b
+struct evp_kdf_impl_st {
3a273b
+    const EVP_CIPHER *cipher;
3a273b
+    unsigned char *key;
3a273b
+    size_t key_len;
3a273b
+    unsigned char *constant;
3a273b
+    size_t constant_len;
3a273b
+};
3a273b
+
3a273b
+static void krb5kdf_reset(EVP_KDF_IMPL *ctx);
3a273b
+
3a273b
+static EVP_KDF_IMPL *krb5kdf_new(void)
3a273b
+{
3a273b
+    EVP_KDF_IMPL *ctx;
3a273b
+
3a273b
+    if ((ctx = OPENSSL_zalloc(sizeof(*ctx))) == NULL)
3a273b
+        KDFerr(KDF_F_KBKDF_NEW, ERR_R_MALLOC_FAILURE);
3a273b
+    return ctx;
3a273b
+}
3a273b
+
3a273b
+static void krb5kdf_free(EVP_KDF_IMPL *ctx)
3a273b
+{
3a273b
+    krb5kdf_reset(ctx);
3a273b
+    OPENSSL_free(ctx);
3a273b
+}
3a273b
+
3a273b
+static void krb5kdf_reset(EVP_KDF_IMPL *ctx)
3a273b
+{
3a273b
+    OPENSSL_clear_free(ctx->key, ctx->key_len);
3a273b
+    OPENSSL_clear_free(ctx->constant, ctx->constant_len);
3a273b
+    memset(ctx, 0, sizeof(*ctx));
3a273b
+}
3a273b
+
3a273b
+static int krb5kdf_derive(EVP_KDF_IMPL *ctx, unsigned char *key,
3a273b
+                              size_t keylen)
3a273b
+{
3a273b
+    if (ctx->cipher == NULL) {
3a273b
+        KDFerr(KDF_F_KRB5KDF_DERIVE, KDF_R_MISSING_CIPHER);
3a273b
+        return 0;
3a273b
+    }
3a273b
+    if (ctx->key == NULL) {
3a273b
+        KDFerr(KDF_F_KRB5KDF_DERIVE, KDF_R_MISSING_KEY);
3a273b
+        return 0;
3a273b
+    }
3a273b
+    if (ctx->constant == NULL) {
3a273b
+        KDFerr(KDF_F_KRB5KDF_DERIVE, KDF_R_MISSING_CONSTANT);
3a273b
+        return 0;
3a273b
+    }
3a273b
+    return KRB5KDF(ctx->cipher, ctx->key, ctx->key_len,
3a273b
+                   ctx->constant, ctx->constant_len,
3a273b
+                   key, keylen);
3a273b
+}
3a273b
+
3a273b
+static size_t krb5kdf_size(EVP_KDF_IMPL *ctx)
3a273b
+{
3a273b
+    if (ctx->cipher != NULL)
3a273b
+        return EVP_CIPHER_key_length(ctx->cipher);
3a273b
+    else
3a273b
+        return EVP_MAX_KEY_LENGTH;
3a273b
+}
3a273b
+
3a273b
+
3a273b
+static int krb5kdf_parse_buffer_arg(unsigned char **dst, size_t *dst_len,
3a273b
+                                       va_list args)
3a273b
+{
3a273b
+    const unsigned char *p;
3a273b
+    size_t len;
3a273b
+
3a273b
+    p = va_arg(args, const unsigned char *);
3a273b
+    len = va_arg(args, size_t);
3a273b
+    OPENSSL_clear_free(*dst, *dst_len);
3a273b
+    if (len == 0) {
3a273b
+        *dst = NULL;
3a273b
+        *dst_len = 0;
3a273b
+        return 1;
3a273b
+    }
3a273b
+
3a273b
+    *dst = OPENSSL_memdup(p, len);
3a273b
+    if (*dst == NULL)
3a273b
+        return 0;
3a273b
+
3a273b
+    *dst_len = len;
3a273b
+    return 1;
3a273b
+}
3a273b
+
3a273b
+static int krb5kdf_ctrl(EVP_KDF_IMPL *ctx, int cmd, va_list args)
3a273b
+{
3a273b
+    switch (cmd) {
3a273b
+    case EVP_KDF_CTRL_SET_CIPHER:
3a273b
+        ctx->cipher = va_arg(args, const EVP_CIPHER *);
3a273b
+        if (ctx->cipher == NULL)
3a273b
+            return 0;
3a273b
+
3a273b
+        return 1;
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KEY:
3a273b
+        return krb5kdf_parse_buffer_arg(&ctx->key,
3a273b
+                                      &ctx->key_len, args);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT:
3a273b
+        return krb5kdf_parse_buffer_arg(&ctx->constant,
3a273b
+                                           &ctx->constant_len, args);
3a273b
+    default:
3a273b
+        return -2;
3a273b
+
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static int krb5kdf_ctrl_str(EVP_KDF_IMPL *ctx, const char *type,
3a273b
+                               const char *value)
3a273b
+{
3a273b
+    if (value == NULL) {
3a273b
+        KDFerr(KDF_F_KDF_SSHKDF_CTRL_STR, KDF_R_VALUE_MISSING);
3a273b
+        return 0;
3a273b
+    }
3a273b
+
3a273b
+    if (strcmp(type, "cipher") == 0)
3a273b
+        return kdf_cipher2ctrl(ctx, krb5kdf_ctrl, EVP_KDF_CTRL_SET_CIPHER, value);
3a273b
+
3a273b
+    if (strcmp(type, "key") == 0)
3a273b
+        return kdf_str2ctrl(ctx, krb5kdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KEY, value);
3a273b
+
3a273b
+    if (strcmp(type, "hexkey") == 0)
3a273b
+        return kdf_hex2ctrl(ctx, krb5kdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KEY, value);
3a273b
+
3a273b
+    if (strcmp(type, "constant") == 0)
3a273b
+        return kdf_str2ctrl(ctx, krb5kdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT, value);
3a273b
+
3a273b
+    if (strcmp(type, "hexconstant") == 0)
3a273b
+        return kdf_hex2ctrl(ctx, krb5kdf_ctrl,
3a273b
+                            EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT, value);
3a273b
+
3a273b
+    KDFerr(KDF_F_KBKDF_CTRL_STR, KDF_R_UNKNOWN_PARAMETER_TYPE);
3a273b
+    return -2;
3a273b
+}
3a273b
+
3a273b
+
3a273b
+#ifndef OPENSSL_NO_DES
3a273b
+/*
3a273b
+ * DES3 is a special case, it requires a random-to-key function and its
3a273b
+ * input truncated to 21 bytes of the 24 produced by the cipher.
3a273b
+ * See RFC3961 6.3.1
3a273b
+ */
3a273b
+static int fixup_des3_key(unsigned char *key)
3a273b
+{
3a273b
+    unsigned char *cblock;
3a273b
+    int i, j;
3a273b
+
3a273b
+    for (i = 2; i >= 0; i--) {
3a273b
+        cblock = &key[i * 8];
3a273b
+        memmove(cblock, &key[i * 7], 7);
3a273b
+        cblock[7] = 0;
3a273b
+        for (j = 0; j < 7; j++)
3a273b
+            cblock[7] |= (cblock[j] & 1) << (j + 1);
3a273b
+        DES_set_odd_parity((DES_cblock *)cblock);
3a273b
+    }
3a273b
+
3a273b
+    /* fail if keys are such that triple des degrades to single des */
3a273b
+    if (CRYPTO_memcmp(&key[0], &key[8], 8) == 0 ||
3a273b
+        CRYPTO_memcmp(&key[8], &key[16], 8) == 0) {
3a273b
+        return 0;
3a273b
+    }
3a273b
+
3a273b
+    return 1;
3a273b
+}
3a273b
+#endif
3a273b
+
3a273b
+/*
3a273b
+ * N-fold(K) where blocksize is N, and constant_len is K
3a273b
+ * Note: Here |= denotes concatenation
3a273b
+ *
3a273b
+ * L = lcm(N,K)
3a273b
+ * R = L/K
3a273b
+ *
3a273b
+ * for r: 1 -> R
3a273b
+ *   s |= constant rot 13*(r-1))
3a273b
+ *
3a273b
+ * block = 0
3a273b
+ * for k: 1 -> K
3a273b
+ *   block += s[N(k-1)..(N-1)k] (one's complement addition)
3a273b
+ *
3a273b
+ * Optimizing for space we compute:
3a273b
+ * for each l in L-1 -> 0:
3a273b
+ *   s[l] = (constant rot 13*(l/K))[l%k]
3a273b
+ *   block[l % N] += s[l] (with carry)
3a273b
+ * finally add carry if any
3a273b
+ */
3a273b
+static void n_fold(unsigned char *block, unsigned int blocksize,
3a273b
+                   const unsigned char *constant, size_t constant_len)
3a273b
+{
3a273b
+    unsigned int tmp, gcd, remainder, lcm, carry;
3a273b
+    int b, l;
3a273b
+
3a273b
+    if (constant_len == blocksize) {
3a273b
+        memcpy(block, constant, constant_len);
3a273b
+        return;
3a273b
+    }
3a273b
+
3a273b
+    /* Least Common Multiple of lengths: LCM(a,b)*/
3a273b
+    gcd = blocksize;
3a273b
+    remainder = constant_len;
3a273b
+    /* Calculate Great Common Divisor first GCD(a,b) */
3a273b
+    while (remainder != 0) {
3a273b
+        tmp = gcd % remainder;
3a273b
+        gcd = remainder;
3a273b
+        remainder = tmp;
3a273b
+    }
3a273b
+    /* resulting a is the GCD, LCM(a,b) = |a*b|/GCD(a,b) */
3a273b
+    lcm = blocksize * constant_len / gcd;
3a273b
+
3a273b
+    /* now spread out the bits */
3a273b
+    memset(block, 0, blocksize);
3a273b
+
3a273b
+    /* last to first to be able to bring carry forward */
3a273b
+    carry = 0;
3a273b
+    for (l = lcm - 1; l >= 0; l--) {
3a273b
+        unsigned int rotbits, rshift, rbyte;
3a273b
+
3a273b
+        /* destination byte in block is l % N */
3a273b
+        b = l % blocksize;
3a273b
+        /* Our virtual s buffer is R = L/K long (K = constant_len) */
3a273b
+        /* So we rotate backwards from R-1 to 0 (none) rotations */
3a273b
+        rotbits = 13 * (l / constant_len);
3a273b
+        /* find the byte on s where rotbits falls onto */
3a273b
+        rbyte = l - (rotbits / 8);
3a273b
+        /* calculate how much shift on that byte */
3a273b
+        rshift = rotbits & 0x07;
3a273b
+        /* rbyte % constant_len gives us the unrotated byte in the
3a273b
+         * constant buffer, get also the previous byte then
3a273b
+         * appropriately shift them to get the rotated byte we need */
3a273b
+        tmp = (constant[(rbyte-1) % constant_len] << (8 - rshift)
3a273b
+               | constant[rbyte % constant_len] >> rshift)
3a273b
+              & 0xff;
3a273b
+        /* add with carry to any value placed by previous passes */
3a273b
+        tmp += carry + block[b];
3a273b
+        block[b] = tmp & 0xff;
3a273b
+        /* save any carry that may be left */
3a273b
+        carry = tmp >> 8;
3a273b
+    }
3a273b
+
3a273b
+    /* if any carry is left at the end, add it through the number */
3a273b
+    for (b = blocksize - 1; b >= 0 && carry != 0; b--) {
3a273b
+        carry += block[b];
3a273b
+        block[b] = carry & 0xff;
3a273b
+        carry >>= 8;
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static int cipher_init(EVP_CIPHER_CTX *ctx,
3a273b
+                       const EVP_CIPHER *cipher,
3a273b
+                       const unsigned char *key, size_t key_len)
3a273b
+{
3a273b
+    int klen, ret;
3a273b
+
3a273b
+    ret = EVP_EncryptInit_ex(ctx, cipher, NULL, key, NULL);
3a273b
+    if (!ret)
3a273b
+        goto out;
3a273b
+    /* set the key len for the odd variable key len cipher */
3a273b
+    klen = EVP_CIPHER_CTX_key_length(ctx);
3a273b
+    if (key_len != (size_t)klen) {
3a273b
+        ret = EVP_CIPHER_CTX_set_key_length(ctx, key_len);
3a273b
+        if (!ret)
3a273b
+            goto out;
3a273b
+    }
3a273b
+    /* we never want padding, either the length requested is a multiple of
3a273b
+     * the cipher block size or we are passed a cipher that can cope with
3a273b
+     * partial blocks via techniques like cipher text stealing */
3a273b
+    ret = EVP_CIPHER_CTX_set_padding(ctx, 0);
3a273b
+    if (!ret)
3a273b
+        goto out;
3a273b
+
3a273b
+out:
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static int KRB5KDF(const EVP_CIPHER *cipher,
3a273b
+                   const unsigned char *key, size_t key_len,
3a273b
+                   const unsigned char *constant, size_t constant_len,
3a273b
+                   unsigned char *okey, size_t okey_len)
3a273b
+{
3a273b
+    EVP_CIPHER_CTX *ctx = NULL;
3a273b
+    unsigned char block[EVP_MAX_BLOCK_LENGTH * 2];
3a273b
+    unsigned char *plainblock, *cipherblock;
3a273b
+    size_t blocksize;
3a273b
+    size_t cipherlen;
3a273b
+    size_t osize;
3a273b
+    int des3_no_fixup = 0;
3a273b
+    int ret;
3a273b
+
3a273b
+    if (key_len != okey_len) {
3a273b
+        /* special case for 3des, where the caller may be requesting
3a273b
+         * the random raw key, instead of the fixed up key  */
3a273b
+        if (EVP_CIPHER_nid(cipher) == NID_des_ede3_cbc &&
3a273b
+            key_len == 24 && okey_len == 21) {
3a273b
+                des3_no_fixup = 1;
3a273b
+        } else {
3a273b
+            KDFerr(KDF_F_KRB5KDF, KDF_R_WRONG_OUTPUT_BUFFER_SIZE);
3a273b
+            return 0;
3a273b
+        }
3a273b
+    }
3a273b
+
3a273b
+    ctx = EVP_CIPHER_CTX_new();
3a273b
+    if (ctx == NULL)
3a273b
+        return 0;
3a273b
+
3a273b
+    ret = cipher_init(ctx, cipher, key, key_len);
3a273b
+    if (!ret)
3a273b
+        goto out;
3a273b
+
3a273b
+    /* Initialize input block */
3a273b
+    blocksize = EVP_CIPHER_CTX_block_size(ctx);
3a273b
+
3a273b
+    if (constant_len == 0 || constant_len > blocksize) {
3a273b
+        KDFerr(KDF_F_KRB5KDF, KDF_R_INVALID_CONSTANT_LENGTH);
3a273b
+        ret = 0;
3a273b
+        goto out;
3a273b
+    }
3a273b
+
3a273b
+    n_fold(block, blocksize, constant, constant_len);
3a273b
+    plainblock = block;
3a273b
+    cipherblock = block + EVP_MAX_BLOCK_LENGTH;
3a273b
+
3a273b
+    for (osize = 0; osize < okey_len; osize += cipherlen) {
3a273b
+        int olen;
3a273b
+
3a273b
+        ret = EVP_EncryptUpdate(ctx, cipherblock, &olen,
3a273b
+                                plainblock, blocksize);
3a273b
+        if (!ret)
3a273b
+            goto out;
3a273b
+        cipherlen = olen;
3a273b
+        ret = EVP_EncryptFinal_ex(ctx, cipherblock, &olen);
3a273b
+        if (!ret)
3a273b
+            goto out;
3a273b
+        if (olen != 0) {
3a273b
+            KDFerr(KDF_F_KRB5KDF, KDF_R_WRONG_FINAL_BLOCK_LENGTH);
3a273b
+            ret = 0;
3a273b
+            goto out;
3a273b
+        }
3a273b
+
3a273b
+        /* write cipherblock out */
3a273b
+        if (cipherlen > okey_len - osize)
3a273b
+            cipherlen = okey_len - osize;
3a273b
+        memcpy(okey + osize, cipherblock, cipherlen);
3a273b
+
3a273b
+        if (okey_len > osize + cipherlen) {
3a273b
+            /* we need to reinitialize cipher context per spec */
3a273b
+            ret = EVP_CIPHER_CTX_reset(ctx);
3a273b
+            if (!ret)
3a273b
+                goto out;
3a273b
+            ret = cipher_init(ctx, cipher, key, key_len);
3a273b
+            if (!ret)
3a273b
+                goto out;
3a273b
+
3a273b
+            /* also swap block offsets so last ciphertext becomes new
3a273b
+             * plaintext */
3a273b
+            plainblock = cipherblock;
3a273b
+            if (cipherblock == block) {
3a273b
+                cipherblock += EVP_MAX_BLOCK_LENGTH;
3a273b
+            } else {
3a273b
+                cipherblock = block;
3a273b
+            }
3a273b
+        }
3a273b
+    }
3a273b
+
3a273b
+#ifndef OPENSSL_NO_DES
3a273b
+    if (EVP_CIPHER_nid(cipher) == NID_des_ede3_cbc && !des3_no_fixup) {
3a273b
+        ret = fixup_des3_key(okey);
3a273b
+        if (!ret) {
3a273b
+            KDFerr(KDF_F_KRB5KDF, KDF_R_FAILED_TO_GENERATE_KEY);
3a273b
+            goto out;
3a273b
+        }
3a273b
+    }
3a273b
+#endif
3a273b
+
3a273b
+    ret = 1;
3a273b
+
3a273b
+out:
3a273b
+    EVP_CIPHER_CTX_free(ctx);
3a273b
+    OPENSSL_cleanse(block, EVP_MAX_BLOCK_LENGTH * 2);
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+const EVP_KDF_METHOD krb5kdf_kdf_meth = {
3a273b
+    EVP_KDF_KRB5KDF,
3a273b
+    krb5kdf_new,
3a273b
+    krb5kdf_free,
3a273b
+    krb5kdf_reset,
3a273b
+    krb5kdf_ctrl,
3a273b
+    krb5kdf_ctrl_str,
3a273b
+    krb5kdf_size,
3a273b
+    krb5kdf_derive,
3a273b
+};
3a273b
+
c95581
diff -up openssl-1.1.1d/crypto/kdf/sshkdf.c.krb5-kdf openssl-1.1.1d/crypto/kdf/sshkdf.c
c95581
--- openssl-1.1.1d/crypto/kdf/sshkdf.c.krb5-kdf	2019-11-14 15:07:05.327094396 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/sshkdf.c	2019-11-18 17:18:25.343388314 +0100
c95581
@@ -12,6 +12,7 @@
c95581
 #include <string.h>
c95581
 #include <openssl/evp.h>
c95581
 #include <openssl/kdf.h>
c95581
+#include "internal/numbers.h"
c95581
 #include "internal/cryptlib.h"
c95581
 #include "crypto/evp.h"
c95581
 #include "kdf_local.h"
c95581
@@ -68,6 +69,12 @@ static int kdf_sshkdf_parse_buffer_arg(u
3a273b
     p = va_arg(args, const unsigned char *);
3a273b
     len = va_arg(args, size_t);
3a273b
     OPENSSL_clear_free(*dst, *dst_len);
3a273b
+    if (len == 0) {
3a273b
+        *dst = NULL;
3a273b
+        *dst_len = 0;
3a273b
+        return 1;
3a273b
+    }
3a273b
+
3a273b
     *dst = OPENSSL_memdup(p, len);
3a273b
     if (*dst == NULL)
3a273b
         return 0;
c95581
diff -up openssl-1.1.1d/crypto/kdf/sskdf.c.krb5-kdf openssl-1.1.1d/crypto/kdf/sskdf.c
c95581
--- openssl-1.1.1d/crypto/kdf/sskdf.c.krb5-kdf	2019-11-14 15:07:05.344094093 +0100
c95581
+++ openssl-1.1.1d/crypto/kdf/sskdf.c	2019-11-18 17:21:40.349952802 +0100
3a273b
@@ -0,0 +1,255 @@
3a273b
+/*
3a273b
+ * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
3a273b
+ * Copyright (c) 2019, Oracle and/or its affiliates.  All rights reserved.
3a273b
+ *
3a273b
+ * Licensed under the Apache License 2.0 (the "License").  You may not use
3a273b
+ * this file except in compliance with the License.  You can obtain a copy
3a273b
+ * in the file LICENSE in the source distribution or at
3a273b
+ * https://www.openssl.org/source/license.html
3a273b
+ */
3a273b
+
3a273b
+/*
3a273b
+ * Refer to https://csrc.nist.gov/publications/detail/sp/800-56c/rev-1/final
3a273b
+ * Section 4.1.
3a273b
+ *
3a273b
+ * The Single Step KDF algorithm is given by:
3a273b
+ *
3a273b
+ * Result(0) = empty bit string (i.e., the null string).
3a273b
+ * For i = 1 to reps, do the following:
3a273b
+ *   Increment counter by 1.
3a273b
+ *   Result(i) = Result(i – 1) || H(counter || Z || FixedInfo).
3a273b
+ * DKM = LeftmostBits(Result(reps), L))
3a273b
+ *
3a273b
+ * NOTES:
3a273b
+ *   Z is a shared secret required to produce the derived key material.
3a273b
+ *   counter is a 4 byte buffer.
3a273b
+ *   FixedInfo is a bit string containing context specific data.
3a273b
+ *   DKM is the output derived key material.
3a273b
+ *   L is the required size of the DKM.
3a273b
+ *   reps = [L / H_outputBits]
3a273b
+ *   H(x) is the auxiliary function that can be either a hash, HMAC or KMAC.
3a273b
+ *   This backported version supports only a hash.
3a273b
+ *   H_outputBits is the length of the output of the auxiliary function H(x).
3a273b
+ *
3a273b
+ * Currently there is not a comprehensive list of test vectors for this
3a273b
+ * algorithm, especially for H(x) = HMAC and H(x) = KMAC.
3a273b
+ * Test vectors for H(x) = Hash are indirectly used by CAVS KAS tests.
3a273b
+ */
3a273b
+#include <stdlib.h>
3a273b
+#include <stdarg.h>
3a273b
+#include <string.h>
3a273b
+#include <openssl/hmac.h>
3a273b
+#include <openssl/evp.h>
3a273b
+#include <openssl/kdf.h>
3a273b
+#include "internal/cryptlib.h"
c95581
+#include "crypto/evp.h"
3a273b
+#include "kdf_local.h"
3a273b
+
3a273b
+struct evp_kdf_impl_st {
3a273b
+    const EVP_MD *md;   /* H(x) = hash */
3a273b
+    unsigned char *secret;
3a273b
+    size_t secret_len;
3a273b
+    unsigned char *info;
3a273b
+    size_t info_len;
3a273b
+};
3a273b
+
3a273b
+#define SSKDF_MAX_INLEN (1<<30)
3a273b
+
3a273b
+/*
3a273b
+ * Refer to https://csrc.nist.gov/publications/detail/sp/800-56c/rev-1/final
3a273b
+ * Section 4. One-Step Key Derivation using H(x) = hash(x)
3a273b
+ */
3a273b
+static int SSKDF_hash_kdm(const EVP_MD *kdf_md,
3a273b
+                          const unsigned char *z, size_t z_len,
3a273b
+                          const unsigned char *info, size_t info_len,
3a273b
+                          unsigned char *derived_key, size_t derived_key_len)
3a273b
+{
3a273b
+    int ret = 0, hlen;
3a273b
+    size_t counter, out_len, len = derived_key_len;
3a273b
+    unsigned char c[4];
3a273b
+    unsigned char mac[EVP_MAX_MD_SIZE];
3a273b
+    unsigned char *out = derived_key;
3a273b
+    EVP_MD_CTX *ctx = NULL, *ctx_init = NULL;
3a273b
+
3a273b
+    if (z_len > SSKDF_MAX_INLEN || info_len > SSKDF_MAX_INLEN
3a273b
+            || derived_key_len > SSKDF_MAX_INLEN
3a273b
+            || derived_key_len == 0)
3a273b
+        return 0;
3a273b
+
3a273b
+    hlen = EVP_MD_size(kdf_md);
3a273b
+    if (hlen <= 0)
3a273b
+        return 0;
3a273b
+    out_len = (size_t)hlen;
3a273b
+
3a273b
+    ctx = EVP_MD_CTX_create();
3a273b
+    ctx_init = EVP_MD_CTX_create();
3a273b
+    if (ctx == NULL || ctx_init == NULL)
3a273b
+        goto end;
3a273b
+
3a273b
+    if (!EVP_DigestInit(ctx_init, kdf_md))
3a273b
+        goto end;
3a273b
+
3a273b
+    for (counter = 1;; counter++) {
3a273b
+        c[0] = (unsigned char)((counter >> 24) & 0xff);
3a273b
+        c[1] = (unsigned char)((counter >> 16) & 0xff);
3a273b
+        c[2] = (unsigned char)((counter >> 8) & 0xff);
3a273b
+        c[3] = (unsigned char)(counter & 0xff);
3a273b
+
3a273b
+        if (!(EVP_MD_CTX_copy_ex(ctx, ctx_init)
3a273b
+                && EVP_DigestUpdate(ctx, c, sizeof(c))
3a273b
+                && EVP_DigestUpdate(ctx, z, z_len)
3a273b
+                && EVP_DigestUpdate(ctx, info, info_len)))
3a273b
+            goto end;
3a273b
+        if (len >= out_len) {
3a273b
+            if (!EVP_DigestFinal_ex(ctx, out, NULL))
3a273b
+                goto end;
3a273b
+            out += out_len;
3a273b
+            len -= out_len;
3a273b
+            if (len == 0)
3a273b
+                break;
3a273b
+        } else {
3a273b
+            if (!EVP_DigestFinal_ex(ctx, mac, NULL))
3a273b
+                goto end;
3a273b
+            memcpy(out, mac, len);
3a273b
+            break;
3a273b
+        }
3a273b
+    }
3a273b
+    ret = 1;
3a273b
+end:
3a273b
+    EVP_MD_CTX_destroy(ctx);
3a273b
+    EVP_MD_CTX_destroy(ctx_init);
3a273b
+    OPENSSL_cleanse(mac, sizeof(mac));
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static EVP_KDF_IMPL *sskdf_new(void)
3a273b
+{
3a273b
+    EVP_KDF_IMPL *impl;
3a273b
+
3a273b
+    if ((impl = OPENSSL_zalloc(sizeof(*impl))) == NULL)
3a273b
+        KDFerr(KDF_F_SSKDF_NEW, ERR_R_MALLOC_FAILURE);
3a273b
+    return impl;
3a273b
+}
3a273b
+
3a273b
+static void sskdf_reset(EVP_KDF_IMPL *impl)
3a273b
+{
3a273b
+    OPENSSL_clear_free(impl->secret, impl->secret_len);
3a273b
+    OPENSSL_clear_free(impl->info, impl->info_len);
3a273b
+    memset(impl, 0, sizeof(*impl));
3a273b
+}
3a273b
+
3a273b
+static void sskdf_free(EVP_KDF_IMPL *impl)
3a273b
+{
3a273b
+    sskdf_reset(impl);
3a273b
+    OPENSSL_free(impl);
3a273b
+}
3a273b
+
3a273b
+static int sskdf_set_buffer(va_list args, unsigned char **out, size_t *out_len)
3a273b
+{
3a273b
+    const unsigned char *p;
3a273b
+    size_t len;
3a273b
+
3a273b
+    p = va_arg(args, const unsigned char *);
3a273b
+    len = va_arg(args, size_t);
3a273b
+    OPENSSL_clear_free(*out, *out_len);
3a273b
+    if (len == 0) {
3a273b
+        *out = NULL;
3a273b
+        *out_len = 0;
3a273b
+        return 1;
3a273b
+    }
3a273b
+
3a273b
+    *out = OPENSSL_memdup(p, len);
3a273b
+    if (*out == NULL)
3a273b
+        return 0;
3a273b
+
3a273b
+    *out_len = len;
3a273b
+    return 1;
3a273b
+}
3a273b
+
3a273b
+static int sskdf_ctrl(EVP_KDF_IMPL *impl, int cmd, va_list args)
3a273b
+{
3a273b
+    const EVP_MD *md;
3a273b
+
3a273b
+    switch (cmd) {
3a273b
+    case EVP_KDF_CTRL_SET_KEY:
3a273b
+        return sskdf_set_buffer(args, &impl->secret, &impl->secret_len);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_SSKDF_INFO:
3a273b
+        return sskdf_set_buffer(args, &impl->info, &impl->info_len);
3a273b
+
3a273b
+    case EVP_KDF_CTRL_SET_MD:
3a273b
+        md = va_arg(args, const EVP_MD *);
3a273b
+        if (md == NULL)
3a273b
+            return 0;
3a273b
+
3a273b
+        impl->md = md;
3a273b
+        return 1;
3a273b
+
3a273b
+    default:
3a273b
+        return -2;
3a273b
+    }
3a273b
+}
3a273b
+
3a273b
+static int sskdf_ctrl_str(EVP_KDF_IMPL *impl, const char *type,
3a273b
+                          const char *value)
3a273b
+{
3a273b
+    if (strcmp(type, "secret") == 0 || strcmp(type, "key") == 0)
3a273b
+         return kdf_str2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_KEY,
3a273b
+                             value);
3a273b
+
3a273b
+    if (strcmp(type, "hexsecret") == 0 || strcmp(type, "hexkey") == 0)
3a273b
+        return kdf_hex2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_KEY,
3a273b
+                            value);
3a273b
+
3a273b
+    if (strcmp(type, "info") == 0)
3a273b
+        return kdf_str2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_SSKDF_INFO,
3a273b
+                            value);
3a273b
+
3a273b
+    if (strcmp(type, "hexinfo") == 0)
3a273b
+        return kdf_hex2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_SSKDF_INFO,
3a273b
+                            value);
3a273b
+
3a273b
+    if (strcmp(type, "digest") == 0)
3a273b
+        return kdf_md2ctrl(impl, sskdf_ctrl, EVP_KDF_CTRL_SET_MD, value);
3a273b
+
3a273b
+    return -2;
3a273b
+}
3a273b
+
3a273b
+static size_t sskdf_size(EVP_KDF_IMPL *impl)
3a273b
+{
3a273b
+    int len;
3a273b
+
3a273b
+    if (impl->md == NULL) {
3a273b
+        KDFerr(KDF_F_SSKDF_SIZE, KDF_R_MISSING_MESSAGE_DIGEST);
3a273b
+        return 0;
3a273b
+    }
3a273b
+    len = EVP_MD_size(impl->md);
3a273b
+    return (len <= 0) ? 0 : (size_t)len;
3a273b
+}
3a273b
+
3a273b
+static int sskdf_derive(EVP_KDF_IMPL *impl, unsigned char *key, size_t keylen)
3a273b
+{
3a273b
+    if (impl->secret == NULL) {
3a273b
+        KDFerr(KDF_F_SSKDF_DERIVE, KDF_R_MISSING_SECRET);
3a273b
+        return 0;
3a273b
+    }
3a273b
+
3a273b
+    /* H(x) = hash */
3a273b
+    if (impl->md == NULL) {
3a273b
+        KDFerr(KDF_F_SSKDF_DERIVE, KDF_R_MISSING_MESSAGE_DIGEST);
3a273b
+        return 0;
3a273b
+    }
3a273b
+    return SSKDF_hash_kdm(impl->md, impl->secret, impl->secret_len,
3a273b
+                          impl->info, impl->info_len, key, keylen);
3a273b
+}
3a273b
+
3a273b
+const EVP_KDF_METHOD ss_kdf_meth = {
3a273b
+    EVP_KDF_SS,
3a273b
+    sskdf_new,
3a273b
+    sskdf_free,
3a273b
+    sskdf_reset,
3a273b
+    sskdf_ctrl,
3a273b
+    sskdf_ctrl_str,
3a273b
+    sskdf_size,
3a273b
+    sskdf_derive
3a273b
+};
c95581
diff -up openssl-1.1.1d/crypto/objects/obj_dat.h.krb5-kdf openssl-1.1.1d/crypto/objects/obj_dat.h
c95581
--- openssl-1.1.1d/crypto/objects/obj_dat.h.krb5-kdf	2019-11-14 15:07:05.322094485 +0100
c95581
+++ openssl-1.1.1d/crypto/objects/obj_dat.h	2019-11-14 15:07:05.345094076 +0100
3a273b
@@ -1078,7 +1078,7 @@ static const unsigned char so[7762] = {
3a273b
     0x2A,0x86,0x48,0x86,0xF7,0x0D,0x02,0x0D,       /* [ 7753] OBJ_hmacWithSHA512_256 */
3a273b
 };
3a273b
 
3a273b
-#define NUM_NID 1196
3a273b
+#define NUM_NID 1199
3a273b
 static const ASN1_OBJECT nid_objs[NUM_NID] = {
3a273b
     {"UNDEF", "undefined", NID_undef},
3a273b
     {"rsadsi", "RSA Data Security, Inc.", NID_rsadsi, 6, &so[0]},
3a273b
@@ -2276,9 +2276,12 @@ static const ASN1_OBJECT nid_objs[NUM_NI
3a273b
     {"hmacWithSHA512-224", "hmacWithSHA512-224", NID_hmacWithSHA512_224, 8, &so[7745]},
3a273b
     {"hmacWithSHA512-256", "hmacWithSHA512-256", NID_hmacWithSHA512_256, 8, &so[7753]},
3a273b
     {"SSHKDF", "sshkdf", NID_sshkdf},
3a273b
+    {"KBKDF", "kbkdf", NID_kbkdf},
3a273b
+    {"KRB5KDF", "krb5kdf", NID_krb5kdf},
3a273b
+    {"SSKDF", "sskdf", NID_sskdf},
3a273b
 };
3a273b
 
3a273b
-#define NUM_SN 1187
3a273b
+#define NUM_SN 1190
3a273b
 static const unsigned int sn_objs[NUM_SN] = {
3a273b
      364,    /* "AD_DVCS" */
3a273b
      419,    /* "AES-128-CBC" */
3a273b
@@ -2442,7 +2445,9 @@ static const unsigned int sn_objs[NUM_SN
3a273b
      183,    /* "ISO-US" */
3a273b
      645,    /* "ITU-T" */
3a273b
      646,    /* "JOINT-ISO-ITU-T" */
3a273b
+    1196,    /* "KBKDF" */
3a273b
      773,    /* "KISA" */
3a273b
+    1197,    /* "KRB5KDF" */
3a273b
     1063,    /* "KxANY" */
3a273b
     1039,    /* "KxDHE" */
3a273b
     1041,    /* "KxDHE-PSK" */
3a273b
@@ -2557,6 +2562,7 @@ static const unsigned int sn_objs[NUM_SN
3a273b
      100,    /* "SN" */
3a273b
     1006,    /* "SNILS" */
3a273b
     1195,    /* "SSHKDF" */
3a273b
+    1198,    /* "SSKDF" */
3a273b
       16,    /* "ST" */
3a273b
      143,    /* "SXNetID" */
3a273b
     1062,    /* "SipHash" */
3a273b
@@ -3469,7 +3475,7 @@ static const unsigned int sn_objs[NUM_SN
3a273b
     1093,    /* "x509ExtAdmission" */
3a273b
 };
3a273b
 
3a273b
-#define NUM_LN 1187
3a273b
+#define NUM_LN 1190
3a273b
 static const unsigned int ln_objs[NUM_LN] = {
3a273b
      363,    /* "AD Time Stamping" */
3a273b
      405,    /* "ANSI X9.62" */
3a273b
@@ -4262,8 +4268,10 @@ static const unsigned int ln_objs[NUM_LN
3a273b
      957,    /* "jurisdictionCountryName" */
3a273b
      955,    /* "jurisdictionLocalityName" */
3a273b
      956,    /* "jurisdictionStateOrProvinceName" */
3a273b
+    1196,    /* "kbkdf" */
3a273b
      150,    /* "keyBag" */
3a273b
      773,    /* "kisa" */
3a273b
+    1197,    /* "krb5kdf" */
3a273b
     1063,    /* "kx-any" */
3a273b
     1039,    /* "kx-dhe" */
3a273b
     1041,    /* "kx-dhe-psk" */
3a273b
@@ -4612,6 +4620,7 @@ static const unsigned int ln_objs[NUM_LN
3a273b
     1133,    /* "sm4-ecb" */
3a273b
     1135,    /* "sm4-ofb" */
3a273b
     1195,    /* "sshkdf" */
3a273b
+    1198,    /* "sskdf" */
3a273b
       16,    /* "stateOrProvinceName" */
3a273b
      660,    /* "streetAddress" */
3a273b
      498,    /* "subtreeMaximumQuality" */
c95581
diff -up openssl-1.1.1d/crypto/objects/objects.txt.krb5-kdf openssl-1.1.1d/crypto/objects/objects.txt
c95581
--- openssl-1.1.1d/crypto/objects/objects.txt.krb5-kdf	2019-11-14 15:07:05.322094485 +0100
c95581
+++ openssl-1.1.1d/crypto/objects/objects.txt	2019-11-14 15:07:05.345094076 +0100
3a273b
@@ -1603,6 +1603,15 @@ secg-scheme 14 3 : dhSinglePass-cofactor
3a273b
 # NID for SSHKDF
3a273b
                             : SSHKDF            : sshkdf
3a273b
 
3a273b
+# NID for KBKDF
3a273b
+                            : KBKDF             : kbkdf
3a273b
+
3a273b
+# NID for KRB5KDF
3a273b
+                            : KRB5KDF           : krb5kdf
3a273b
+
3a273b
+# NID for SSKDF
3a273b
+                            : SSKDF              : sskdf
3a273b
+
3a273b
 # RFC 4556
3a273b
 1 3 6 1 5 2 3 : id-pkinit
3a273b
 id-pkinit 4                     : pkInitClientAuth      : PKINIT Client Auth
c95581
diff -up openssl-1.1.1d/crypto/objects/obj_mac.num.krb5-kdf openssl-1.1.1d/crypto/objects/obj_mac.num
c95581
--- openssl-1.1.1d/crypto/objects/obj_mac.num.krb5-kdf	2019-11-14 15:07:05.322094485 +0100
c95581
+++ openssl-1.1.1d/crypto/objects/obj_mac.num	2019-11-14 15:07:05.346094058 +0100
3a273b
@@ -1193,3 +1193,6 @@ magma_mac		1192
3a273b
 hmacWithSHA512_224		1193
3a273b
 hmacWithSHA512_256		1194
3a273b
 sshkdf		1195
3a273b
+kbkdf		1196
3a273b
+krb5kdf		1197
3a273b
+sskdf		1198
c95581
diff -up openssl-1.1.1d/doc/man3/EVP_KDF_CTX.pod.krb5-kdf openssl-1.1.1d/doc/man3/EVP_KDF_CTX.pod
c95581
--- openssl-1.1.1d/doc/man3/EVP_KDF_CTX.pod.krb5-kdf	2019-11-14 15:07:05.314094628 +0100
c95581
+++ openssl-1.1.1d/doc/man3/EVP_KDF_CTX.pod	2019-11-14 15:07:05.346094058 +0100
3a273b
@@ -140,7 +140,14 @@ The value string is expected to be a dec
3a273b
 This control expects one argument: C<EVP_MD *md>
3a273b
 
3a273b
 For MAC implementations that use a message digest as an underlying computation
3a273b
-algorithm, this control set what the digest algorithm should be.
3a273b
+algorithm, this control sets what the digest algorithm should be.
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_CIPHER>
3a273b
+
3a273b
+This control expects one argument: C<EVP_CIPHER *cipher>
3a273b
+
3a273b
+For MAC implementations that use a cipher as an underlying computation
3a273b
+algorithm, this control sets what the cipher algorithm should be.
3a273b
 
3a273b
 EVP_KDF_ctrl_str() type string: "md"
3a273b
 
c95581
diff -up openssl-1.1.1d/doc/man7/EVP_KDF_KB.pod.krb5-kdf openssl-1.1.1d/doc/man7/EVP_KDF_KB.pod
c95581
--- openssl-1.1.1d/doc/man7/EVP_KDF_KB.pod.krb5-kdf	2019-11-14 15:07:05.346094058 +0100
c95581
+++ openssl-1.1.1d/doc/man7/EVP_KDF_KB.pod	2019-11-14 15:07:05.346094058 +0100
3a273b
@@ -0,0 +1,173 @@
3a273b
+=pod
3a273b
+
3a273b
+=head1 NAME
3a273b
+
3a273b
+EVP_KDF_KB - The Key-Based EVP_KDF implementation
3a273b
+
3a273b
+=head1 DESCRIPTION
3a273b
+
3a273b
+The EVP_KDF_KB algorithm implements the Key-Based key derivation function
3a273b
+(KBKDF).  KBKDF derives a key from repeated application of a keyed MAC to an
3a273b
+input secret (and other optional values).
3a273b
+
3a273b
+=head2 Numeric identity
3a273b
+
3a273b
+B<EVP_KDF_KB> is the numeric identity for this implementation; it can be used with the
3a273b
+EVP_KDF_CTX_new_id() function.
3a273b
+
3a273b
+=head2 Supported controls
3a273b
+
3a273b
+The supported controls are:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KB_MODE>
3a273b
+
3a273b
+This control expects one argument: C<int mode>
3a273b
+
3a273b
+Sets the mode for the KBKDF operation. There are two supported modes:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item B<EVP_KDF_KB_MODE_COUNTER>
3a273b
+
3a273b
+The counter mode of KBKDF should be used. This is the default.
3a273b
+
3a273b
+=item B<EVP_KDF_KB_MODE_FEEDBACK>
3a273b
+
3a273b
+The feedback mode of KBKDF should be used.
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KB_MAC_TYPE>
3a273b
+
3a273b
+This control expects one argument: C<int mac_type>
3a273b
+
3a273b
+Sets the mac type for the KBKDF operation. There are two supported mac types:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item B<EVP_KDF_KB_MAC_TYPE_HMAC>
3a273b
+
3a273b
+The HMAC with the digest set by B<EVP_KDF_CTRL_SET_MD> should be used as the mac.
3a273b
+
3a273b
+=item B<EVP_KDF_KB_MAC_TYPE_CMAC>
3a273b
+
3a273b
+The CMAC with the cipher set by B<EVP_KDF_CTRL_SET_CIPHER> should be used as the mac.
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_MD>
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_CIPHER>
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KEY>
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_SALT>
3a273b
+
3a273b
+These controls work as described in L<EVP_KDF_CTX(3)/CONTROLS>.
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KB_INFO>
3a273b
+
3a273b
+This control expects two arguments: C<unsigned char *info>, C<size_t infolen>
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KB_SEED>
3a273b
+
3a273b
+This control expects two arguments: C<unsigned char *seed>, C<size_t seedlen>
3a273b
+
3a273b
+It is used only in the feedback mode and the length must be the same
3a273b
+as the block length of the cipher in CMAC or the size of the digest in HMAC.
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+The controls B<EVP_KDF_CTRL_SET_KEY>, B<EVP_KDF_CTRL_SET_SALT>,
3a273b
+B<EVP_KDF_CTRL_SET_KB_INFO>, and B<EVP_KDF_CTRL_SET_KB_SEED> 
3a273b
+correspond to KI, Label, Context, and IV (respectively) in SP800-108.
3a273b
+As in that document, salt, info, and seed are optional and may be
3a273b
+omitted.
3a273b
+
3a273b
+Depending on whether mac is CMAC or HMAC, either digest or cipher is
3a273b
+required (respectively) and the other is unused.
3a273b
+
3a273b
+=head1 NOTES
3a273b
+
3a273b
+A context for KBKDF can be obtained by calling:
3a273b
+
3a273b
+ EVP_KDF_CTX *kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB);
3a273b
+
3a273b
+The output length of an KBKDF is specified via the C<keylen>
3a273b
+parameter to the L<EVP_KDF_derive(3)> function.
3a273b
+
3a273b
+Note that currently OpenSSL only implements counter and feedback modes.  Other
3a273b
+variants may be supported in the future.
3a273b
+
3a273b
+=head1 EXAMPLES
3a273b
+
3a273b
+This example derives 10 bytes using COUNTER-HMAC-SHA256, with KI "secret",
3a273b
+Label "label", and Context "context".
3a273b
+
3a273b
+ EVP_KDF_CTX *kctx;
3a273b
+ unsigned char out[10];
3a273b
+
3a273b
+ kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB);
3a273b
+
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha256());
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_HMAC);
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, "secret", strlen("secret"));
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, "label", strlen("label"));
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_INFO, "context", strlen("context"));
3a273b
+ if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0)
3a273b
+     error("EVP_KDF_derive");
3a273b
+
3a273b
+ EVP_KDF_CTX_free(kctx);
3a273b
+
3a273b
+This example derives 10 bytes using FEEDBACK-CMAC-AES256, with KI "secret",
3a273b
+Label "label", Context "context", and IV "sixteen bytes iv".
3a273b
+
3a273b
+ EVP_KDF_CTX *kctx;
3a273b
+ unsigned char out[10];
3a273b
+ unsigned char *iv = "sixteen bytes iv";
3a273b
+
3a273b
+ kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB);
3a273b
+
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_CIPHER, EVP_aes_256_cbc());
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_CMAC);
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MODE, EVP_KDF_KB_MODE_FEEDBACK);
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, "secret", strlen("secret"));
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, "label", strlen("label"));
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_INFO, "context", strlen("context"));
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_SEED, iv, strlen(iv));
3a273b
+ if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0)
3a273b
+     error("EVP_KDF_derive");
3a273b
+
3a273b
+ EVP_KDF_CTX_free(kctx);
3a273b
+
3a273b
+=head1 CONFORMING TO
3a273b
+
3a273b
+NIST SP800-108, IETF RFC 6803, IETF RFC 8009.
3a273b
+
3a273b
+=head1 SEE ALSO
3a273b
+
3a273b
+L<EVP_KDF_CTX(3)>,
3a273b
+L<EVP_KDF_CTX_new_id(3)>,
3a273b
+L<EVP_KDF_CTX_free(3)>,
3a273b
+L<EVP_KDF_ctrl(3)>,
3a273b
+L<EVP_KDF_size(3)>,
3a273b
+L<EVP_KDF_derive(3)>,
3a273b
+L<EVP_KDF_CTX(3)/CONTROLS>
3a273b
+
3a273b
+=head1 HISTORY
3a273b
+
3a273b
+This functionality was added to OpenSSL 3.0.
3a273b
+
3a273b
+=head1 COPYRIGHT
3a273b
+
3a273b
+Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
3a273b
+Copyright 2019 Red Hat, Inc.
3a273b
+
3a273b
+Licensed under the Apache License 2.0 (the "License").  You may not use
3a273b
+this file except in compliance with the License.  You can obtain a copy
3a273b
+in the file LICENSE in the source distribution or at
3a273b
+L<https://www.openssl.org/source/license.html>.
3a273b
+
3a273b
+=cut
c95581
diff -up openssl-1.1.1d/doc/man7/EVP_KDF_KRB5KDF.pod.krb5-kdf openssl-1.1.1d/doc/man7/EVP_KDF_KRB5KDF.pod
c95581
--- openssl-1.1.1d/doc/man7/EVP_KDF_KRB5KDF.pod.krb5-kdf	2019-11-14 15:07:05.346094058 +0100
c95581
+++ openssl-1.1.1d/doc/man7/EVP_KDF_KRB5KDF.pod	2019-11-14 15:07:05.346094058 +0100
3a273b
@@ -0,0 +1,107 @@
3a273b
+=pod
3a273b
+
3a273b
+=head1 NAME
3a273b
+
3a273b
+EVP_KDF_KRB5KDF - The RFC3961 Krb5 KDF EVP_KDF implementation
3a273b
+
3a273b
+=head1 DESCRIPTION
3a273b
+
3a273b
+Support for computing the B<KRB5KDF> KDF through the B<EVP_KDF> API.
3a273b
+
3a273b
+The B<EVP_KDF_KRB5KDF> algorithm implements the key derivation function defined
3a273b
+in RFC 3961, section 5.1 and is used by Krb5 to derive session keys.
3a273b
+Three inputs are required to perform key derivation: a cipher, (for example
3a273b
+AES-128-CBC), the initial key, and a constant.
3a273b
+
3a273b
+=head2 Numeric identity
3a273b
+
3a273b
+B<EVP_KDF_KRB5KDF> is the numeric identity for this implementation; it can be used with the
3a273b
+EVP_KDF_CTX_new_id() function.
3a273b
+
3a273b
+=head2 Supported controls
3a273b
+
3a273b
+The supported controls are:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_CIPHER>
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KEY>
3a273b
+
3a273b
+These controls work as described in L<EVP_KDF_CTX(3)/CONTROLS>.
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT>
3a273b
+
3a273b
+This control expects two arguments: C<unsigned char *constant>, C<size_t constantlen>
3a273b
+
3a273b
+This control sets the I<constant> value for the KDF.
3a273b
+If a value is already set, the contents are replaced.
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+
3a273b
+=head1 NOTES
3a273b
+
3a273b
+A context for KRB5KDF can be obtained by calling:
3a273b
+
3a273b
+ EVP_KDF_CTX *kctx = EVP_KDF_CTX_new_id(EVP_KDF_KRB5KDF);
3a273b
+
3a273b
+The output length of the KRB5KDF derivation is specified via the I<keylen>
3a273b
+parameter to the L<EVP_KDF_derive(3)> function, and MUST match the key
3a273b
+length for the chosen cipher or an error is returned. Moreover the
3a273b
+I<constant>'s length must not exceed the block size of the cipher.
3a273b
+Since the KRB5KDF output length depends on the chosen cipher, calling
3a273b
+L<EVP_KDF_size()> to obtain the requisite length returns the correct length
3a273b
+only after the cipher is set. Prior to that B<EVP_MAX_KEY_LENGTH> is returned.
3a273b
+The caller must allocate a buffer of the correct length for the chosen
3a273b
+cipher, and pass that buffer to the L<EVP_KDF_derive(3)> function along
3a273b
+with that length.
3a273b
+
3a273b
+=head1 EXAMPLES
3a273b
+
3a273b
+This example derives a key using the AES-128-CBC cipher:
3a273b
+
3a273b
+ EVP_KDF_CTX *kctx;
3a273b
+ unsigned char key[16] = "01234...";
3a273b
+ unsigned char constant[] = "I'm a constant";
3a273b
+ unsigned char out[16];
3a273b
+ size_t outlen = sizeof(out);
3a273b
+
3a273b
+ kctx = EVP_KDF_CTX_new_id(EVP_KDF_KRB5KDF);
3a273b
+
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_CIPHER, EVP_aes_128_cbc());
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, key, (size_t)16);
3a273b
+ EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT, constant, strlen(constant));
3a273b
+ if (EVP_KDF_derive(kctx, out, outlen) <= 0)
3a273b
+     /* Error */
3a273b
+ EVP_KDF_CTX_free(kctx);
3a273b
+
3a273b
+=head1 CONFORMING TO
3a273b
+
3a273b
+RFC 3961
3a273b
+
3a273b
+=head1 SEE ALSO
3a273b
+
3a273b
+L<EVP_KDF_CTX(3)>,
3a273b
+L<EVP_KDF_CTX_new_id(3)>,
3a273b
+L<EVP_KDF_CTX_free(3)>,
3a273b
+L<EVP_KDF_ctrl(3)>,
3a273b
+L<EVP_KDF_size(3)>,
3a273b
+L<EVP_KDF_derive(3)>,
3a273b
+L<EVP_KDF_CTX(3)/CONTROLS>
3a273b
+
3a273b
+=head1 HISTORY
3a273b
+
3a273b
+This functionality was added to OpenSSL 3.0.
3a273b
+
3a273b
+=head1 COPYRIGHT
3a273b
+
3a273b
+Copyright 2016-2019 The OpenSSL Project Authors. All Rights Reserved.
3a273b
+
3a273b
+Licensed under the OpenSSL license (the "License").  You may not use
3a273b
+this file except in compliance with the License.  You can obtain a copy
3a273b
+in the file LICENSE in the source distribution or at
3a273b
+L<https://www.openssl.org/source/license.html>.
3a273b
+
3a273b
+=cut
3a273b
+
c95581
diff -up openssl-1.1.1d/doc/man7/EVP_KDF_SS.pod.krb5-kdf openssl-1.1.1d/doc/man7/EVP_KDF_SS.pod
c95581
--- openssl-1.1.1d/doc/man7/EVP_KDF_SS.pod.krb5-kdf	2019-11-14 15:07:05.346094058 +0100
c95581
+++ openssl-1.1.1d/doc/man7/EVP_KDF_SS.pod	2019-11-14 15:07:05.346094058 +0100
3a273b
@@ -0,0 +1,146 @@
3a273b
+=pod
3a273b
+
3a273b
+=head1 NAME
3a273b
+
3a273b
+EVP_KDF_SS - The Single Step / One Step EVP_KDF implementation
3a273b
+
3a273b
+=head1 DESCRIPTION
3a273b
+
3a273b
+The EVP_KDF_SS algorithm implements the Single Step key derivation function (SSKDF).
3a273b
+SSKDF derives a key using input such as a shared secret key (that was generated
3a273b
+during the execution of a key establishment scheme) and fixedinfo.
3a273b
+SSKDF is also informally referred to as 'Concat KDF'.
3a273b
+
3a273b
+=head2 Auxilary function
3a273b
+
3a273b
+The implementation uses a selectable auxiliary function H, which can be in the
3a273b
+backported version only a:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item B<H(x) = hash(x, digest=md)>
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+=head2 Numeric identity
3a273b
+
3a273b
+B<EVP_KDF_SS> is the numeric identity for this implementation; it
3a273b
+can be used with the EVP_KDF_CTX_new_id() function.
3a273b
+
3a273b
+=head2 Supported controls
3a273b
+
3a273b
+The supported controls are:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_MD>
3a273b
+
3a273b
+This control works as described in L<EVP_KDF_CTX(3)/CONTROLS>.
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_KEY>
3a273b
+
3a273b
+This control expects two arguments: C<unsigned char *secret>, C<size_t secretlen>
3a273b
+
3a273b
+The shared secret used for key derivation.  This control sets the secret.
3a273b
+
3a273b
+EVP_KDF_ctrl_str() takes two type strings for this control:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item "secret"
3a273b
+
3a273b
+The value string is used as is.
3a273b
+
3a273b
+=item "hexsecret"
3a273b
+
3a273b
+The value string is expected to be a hexadecimal number, which will be
3a273b
+decoded before being passed on as the control value.
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+=item B<EVP_KDF_CTRL_SET_SSKDF_INFO>
3a273b
+
3a273b
+This control expects two arguments: C<unsigned char *info>, C<size_t infolen>
3a273b
+
3a273b
+An optional value for fixedinfo, also known as otherinfo. This control sets the fixedinfo.
3a273b
+
3a273b
+EVP_KDF_ctrl_str() takes two type strings for this control:
3a273b
+
3a273b
+=over 4
3a273b
+
3a273b
+=item "info"
3a273b
+
3a273b
+The value string is used as is.
3a273b
+
3a273b
+=item "hexinfo"
3a273b
+
3a273b
+The value string is expected to be a hexadecimal number, which will be
3a273b
+decoded before being passed on as the control value.
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+=back
3a273b
+
3a273b
+=head1 NOTES
3a273b
+
3a273b
+A context for SSKDF can be obtained by calling:
3a273b
+
3a273b
+EVP_KDF_CTX *kctx = EVP_KDF_CTX_new_id(EVP_KDF_SS);
3a273b
+
3a273b
+The output length of an SSKDF is specified via the C<keylen>
3a273b
+parameter to the L<EVP_KDF_derive(3)> function.
3a273b
+
3a273b
+=head1 EXAMPLE
3a273b
+
3a273b
+This example derives 10 bytes using H(x) = SHA-256, with the secret key "secret"
3a273b
+and fixedinfo value "label":
3a273b
+
3a273b
+  EVP_KDF_CTX *kctx;
3a273b
+  unsigned char out[10];
3a273b
+
3a273b
+  kctx = EVP_KDF_CTX_new_id(EVP_KDF_SS);
3a273b
+
3a273b
+  if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha256()) <= 0) {
3a273b
+      error("EVP_KDF_CTRL_SET_MD");
3a273b
+  }
3a273b
+  if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, "secret", (size_t)6) <= 0) {
3a273b
+      error("EVP_KDF_CTRL_SET_KEY");
3a273b
+  }
3a273b
+  if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SSKDF_INFO, "label", (size_t)5) <= 0) {
3a273b
+      error("EVP_KDF_CTRL_SET_SSKDF_INFO");
3a273b
+  }
3a273b
+  if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
3a273b
+      error("EVP_KDF_derive");
3a273b
+  }
3a273b
+
3a273b
+  EVP_KDF_CTX_free(kctx);
3a273b
+
3a273b
+=head1 CONFORMING TO
3a273b
+
3a273b
+NIST SP800-56Cr1.
3a273b
+
3a273b
+=head1 SEE ALSO
3a273b
+
3a273b
+L<EVP_KDF_CTX>,
3a273b
+L<EVP_KDF_CTX_new_id(3)>,
3a273b
+L<EVP_KDF_CTX_free(3)>,
3a273b
+L<EVP_KDF_ctrl(3)>,
3a273b
+L<EVP_KDF_size(3)>,
3a273b
+L<EVP_KDF_derive(3)>,
3a273b
+L<EVP_KDF_CTX(3)/CONTROLS>
3a273b
+
3a273b
+=head1 HISTORY
3a273b
+
3a273b
+This functionality was added to OpenSSL 3.0.0.
3a273b
+
3a273b
+=head1 COPYRIGHT
3a273b
+
3a273b
+Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.  Copyright
3a273b
+(c) 2019, Oracle and/or its affiliates.  All rights reserved.
3a273b
+
3a273b
+Licensed under the Apache License 2.0 (the "License").  You may not use
3a273b
+this file except in compliance with the License.  You can obtain a copy
3a273b
+in the file LICENSE in the source distribution or at
3a273b
+L<https://www.openssl.org/source/license.html>.
3a273b
+
3a273b
+=cut
c95581
diff -up openssl-1.1.1d/include/openssl/kdferr.h.krb5-kdf openssl-1.1.1d/include/openssl/kdferr.h
c95581
--- openssl-1.1.1d/include/openssl/kdferr.h.krb5-kdf	2019-11-14 15:07:05.323094468 +0100
c95581
+++ openssl-1.1.1d/include/openssl/kdferr.h	2019-11-14 15:07:05.347094040 +0100
c95581
@@ -24,6 +24,11 @@ int ERR_load_KDF_strings(void);
3a273b
  * KDF function codes.
3a273b
  */
3a273b
 # define KDF_F_HKDF_EXTRACT                               112
3a273b
+# define KDF_F_KBKDF_CTRL                                 134
3a273b
+# define KDF_F_KBKDF_CTRL_STR                             135
3a273b
+# define KDF_F_KBKDF_DERIVE                               136
3a273b
+# define KDF_F_KBKDF_NEW                                  137
3a273b
+# define KDF_F_KDF_CIPHER2CTRL                            138
3a273b
 # define KDF_F_KDF_HKDF_DERIVE                            113
3a273b
 # define KDF_F_KDF_HKDF_NEW                               114
3a273b
 # define KDF_F_KDF_HKDF_SIZE                              115
c95581
@@ -43,6 +48,8 @@ int ERR_load_KDF_strings(void);
3a273b
 # define KDF_F_KDF_TLS1_PRF_CTRL_STR                      125
3a273b
 # define KDF_F_KDF_TLS1_PRF_DERIVE                        126
3a273b
 # define KDF_F_KDF_TLS1_PRF_NEW                           127
3a273b
+# define KDF_F_KRB5KDF                                    139
3a273b
+# define KDF_F_KRB5KDF_DERIVE                             140
3a273b
 # define KDF_F_PBKDF2_SET_MEMBUF                          128
3a273b
 # define KDF_F_PKEY_HKDF_CTRL_STR                         103
3a273b
 # define KDF_F_PKEY_HKDF_DERIVE                           102
c95581
@@ -56,12 +63,21 @@ int ERR_load_KDF_strings(void);
3a273b
 # define KDF_F_PKEY_TLS1_PRF_DERIVE                       101
3a273b
 # define KDF_F_PKEY_TLS1_PRF_INIT                         110
3a273b
 # define KDF_F_SCRYPT_SET_MEMBUF                          129
3a273b
+# define KDF_F_SSKDF_DERIVE                               141
3a273b
+# define KDF_F_SSKDF_NEW                                  142
3a273b
+# define KDF_F_SSKDF_SIZE                                 143
3a273b
 # define KDF_F_TLS1_PRF_ALG                               111
3a273b
 
3a273b
 /*
3a273b
  * KDF reason codes.
3a273b
  */
3a273b
+# define KDF_R_FAILED_TO_GENERATE_KEY                     118
3a273b
+# define KDF_R_INVALID_CIPHER                             116
3a273b
+# define KDF_R_INVALID_CONSTANT_LENGTH                    119
3a273b
 # define KDF_R_INVALID_DIGEST                             100
3a273b
+# define KDF_R_INVALID_SEED_LENGTH                        117
3a273b
+# define KDF_R_MISSING_CIPHER                             120
3a273b
+# define KDF_R_MISSING_CONSTANT                           121
3a273b
 # define KDF_R_MISSING_ITERATION_COUNT                    109
3a273b
 # define KDF_R_MISSING_KEY                                104
3a273b
 # define KDF_R_MISSING_MESSAGE_DIGEST                     105
c95581
@@ -76,6 +92,7 @@ int ERR_load_KDF_strings(void);
3a273b
 # define KDF_R_UNKNOWN_PARAMETER_TYPE                     103
3a273b
 # define KDF_R_VALUE_ERROR                                108
3a273b
 # define KDF_R_VALUE_MISSING                              102
3a273b
+# define KDF_R_WRONG_FINAL_BLOCK_LENGTH                   122
3a273b
 # define KDF_R_WRONG_OUTPUT_BUFFER_SIZE                   112
3a273b
 
3a273b
 #endif
c95581
diff -up openssl-1.1.1d/include/openssl/kdf.h.krb5-kdf openssl-1.1.1d/include/openssl/kdf.h
c95581
--- openssl-1.1.1d/include/openssl/kdf.h.krb5-kdf	2019-11-14 15:07:05.323094468 +0100
c95581
+++ openssl-1.1.1d/include/openssl/kdf.h	2019-11-14 15:07:05.347094040 +0100
3a273b
@@ -21,6 +21,9 @@ extern "C" {
3a273b
 # define EVP_KDF_TLS1_PRF   NID_tls1_prf
3a273b
 # define EVP_KDF_HKDF       NID_hkdf
3a273b
 # define EVP_KDF_SSHKDF     NID_sshkdf
3a273b
+# define EVP_KDF_KB         NID_kbkdf
3a273b
+# define EVP_KDF_KRB5KDF    NID_krb5kdf
3a273b
+# define EVP_KDF_SS         NID_sskdf
3a273b
 
3a273b
 EVP_KDF_CTX *EVP_KDF_CTX_new_id(int id);
3a273b
 void EVP_KDF_CTX_free(EVP_KDF_CTX *ctx);
3a273b
@@ -51,6 +54,13 @@ int EVP_KDF_derive(EVP_KDF_CTX *ctx, uns
3a273b
 # define EVP_KDF_CTRL_SET_SSHKDF_XCGHASH    0x10 /* unsigned char *, size_t */
3a273b
 # define EVP_KDF_CTRL_SET_SSHKDF_SESSION_ID 0x11 /* unsigned char *, size_t */
3a273b
 # define EVP_KDF_CTRL_SET_SSHKDF_TYPE       0x12 /* int */
3a273b
+# define EVP_KDF_CTRL_SET_KB_MODE       0x13 /* int */
3a273b
+# define EVP_KDF_CTRL_SET_KB_MAC_TYPE   0x14 /* int */
3a273b
+# define EVP_KDF_CTRL_SET_CIPHER        0x15 /* EVP_CIPHER * */
3a273b
+# define EVP_KDF_CTRL_SET_KB_INFO       0x16 /* unsigned char *, size_t */
3a273b
+# define EVP_KDF_CTRL_SET_KB_SEED       0x17 /* unsigned char *, size_t */
3a273b
+# define EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT  0x18 /* unsigned char *, size_t */
3a273b
+# define EVP_KDF_CTRL_SET_SSKDF_INFO    0x19 /* unsigned char *, size_t */
3a273b
 
3a273b
 # define EVP_KDF_HKDF_MODE_EXTRACT_AND_EXPAND  0
3a273b
 # define EVP_KDF_HKDF_MODE_EXTRACT_ONLY        1
3a273b
@@ -63,6 +73,12 @@ int EVP_KDF_derive(EVP_KDF_CTX *ctx, uns
3a273b
 #define EVP_KDF_SSHKDF_TYPE_INTEGRITY_KEY_CLI_TO_SRV 69
3a273b
 #define EVP_KDF_SSHKDF_TYPE_INTEGRITY_KEY_SRV_TO_CLI 70
3a273b
 
3a273b
+#define EVP_KDF_KB_MODE_COUNTER     0
3a273b
+#define EVP_KDF_KB_MODE_FEEDBACK    1
3a273b
+
3a273b
+#define EVP_KDF_KB_MAC_TYPE_HMAC    0
3a273b
+#define EVP_KDF_KB_MAC_TYPE_CMAC    1
3a273b
+
3a273b
 /**** The legacy PKEY-based KDF API follows. ****/
3a273b
 
3a273b
 # define EVP_PKEY_CTRL_TLS_MD                   (EVP_PKEY_ALG_CTRL)
c95581
diff -up openssl-1.1.1d/include/openssl/obj_mac.h.krb5-kdf openssl-1.1.1d/include/openssl/obj_mac.h
c95581
--- openssl-1.1.1d/include/openssl/obj_mac.h.krb5-kdf	2019-11-14 15:07:05.323094468 +0100
c95581
+++ openssl-1.1.1d/include/openssl/obj_mac.h	2019-11-14 15:07:05.347094040 +0100
3a273b
@@ -4974,6 +4974,18 @@
3a273b
 #define LN_sshkdf               "sshkdf"
3a273b
 #define NID_sshkdf              1203
3a273b
 
3a273b
+#define SN_kbkdf               "KBKDF"
3a273b
+#define LN_kbkdf               "kbkdf"
3a273b
+#define NID_kbkdf              1204
3a273b
+
3a273b
+#define SN_krb5kdf             "KRB5KDF"
3a273b
+#define LN_krb5kdf             "krb5kdf"
3a273b
+#define NID_krb5kdf            1205
3a273b
+
3a273b
+#define SN_sskdf                "SSKDF"
3a273b
+#define LN_sskdf                "sskdf"
3a273b
+#define NID_sskdf               1206
3a273b
+
3a273b
 #define SN_id_pkinit            "id-pkinit"
3a273b
 #define NID_id_pkinit           1031
3a273b
 #define OBJ_id_pkinit           1L,3L,6L,1L,5L,2L,3L
c95581
diff -up openssl-1.1.1d/test/evp_kdf_test.c.krb5-kdf openssl-1.1.1d/test/evp_kdf_test.c
c95581
--- openssl-1.1.1d/test/evp_kdf_test.c.krb5-kdf	2019-11-14 15:07:05.315094610 +0100
c95581
+++ openssl-1.1.1d/test/evp_kdf_test.c	2019-11-14 15:07:05.348094022 +0100
3a273b
@@ -225,13 +225,358 @@ err:
3a273b
 }
3a273b
 #endif
3a273b
 
3a273b
+/*
3a273b
+ * KBKDF test vectors from RFC 6803 (Camellia Encryption for Kerberos 5)
3a273b
+ * section 10.
3a273b
+ */
3a273b
+static int test_kdf_kbkdf_6803_128(void)
3a273b
+{
3a273b
+    int ret = 0, i;
3a273b
+    EVP_KDF_CTX *kctx;
3a273b
+    static unsigned char input_key[] = {
3a273b
+        0x57, 0xD0, 0x29, 0x72, 0x98, 0xFF, 0xD9, 0xD3,
3a273b
+        0x5D, 0xE5, 0xA4, 0x7F, 0xB4, 0xBD, 0xE2, 0x4B,
3a273b
+    };
3a273b
+    static unsigned char constants[][5] = {
3a273b
+        { 0x00, 0x00, 0x00, 0x02, 0x99 },
3a273b
+        { 0x00, 0x00, 0x00, 0x02, 0xaa },
3a273b
+        { 0x00, 0x00, 0x00, 0x02, 0x55 },
3a273b
+    };
3a273b
+    static unsigned char outputs[][16] = {
3a273b
+        {0xD1, 0x55, 0x77, 0x5A, 0x20, 0x9D, 0x05, 0xF0,
3a273b
+         0x2B, 0x38, 0xD4, 0x2A, 0x38, 0x9E, 0x5A, 0x56},
3a273b
+        {0x64, 0xDF, 0x83, 0xF8, 0x5A, 0x53, 0x2F, 0x17,
3a273b
+         0x57, 0x7D, 0x8C, 0x37, 0x03, 0x57, 0x96, 0xAB},
3a273b
+        {0x3E, 0x4F, 0xBD, 0xF3, 0x0F, 0xB8, 0x25, 0x9C,
3a273b
+         0x42, 0x5C, 0xB6, 0xC9, 0x6F, 0x1F, 0x46, 0x35}
3a273b
+    };
3a273b
+    static unsigned char iv[16] = { 0 };
3a273b
+    unsigned char result[16] = { 0 };
3a273b
+
3a273b
+    for (i = 0; i < 3; i++) {
3a273b
+        ret = 0;
3a273b
+        if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB)) == NULL) {
3a273b
+            TEST_error("EVP_KDF_KB");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_CMAC) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KB_MAC_TYPE");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MODE, EVP_KDF_KB_MODE_FEEDBACK) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KB_MODE");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_CIPHER, EVP_camellia_128_cbc()) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_CIPHER");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, input_key, sizeof(input_key)) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KEY");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, constants[i], sizeof(constants[i])) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_SALT");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_SEED, iv, sizeof(iv)) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KB_SEED");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        ret = TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
3a273b
+            && TEST_mem_eq(result, sizeof(result), outputs[i],
3a273b
+                           sizeof(outputs[i]));
3a273b
+err:
3a273b
+        EVP_KDF_CTX_free(kctx);
3a273b
+        if (ret != 1)
3a273b
+            return ret;
3a273b
+    }
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static int test_kdf_kbkdf_6803_256(void)
3a273b
+{
3a273b
+    int ret = 0, i;
3a273b
+    EVP_KDF_CTX *kctx;
3a273b
+    static unsigned char input_key[] = {
3a273b
+        0xB9, 0xD6, 0x82, 0x8B, 0x20, 0x56, 0xB7, 0xBE,
3a273b
+        0x65, 0x6D, 0x88, 0xA1, 0x23, 0xB1, 0xFA, 0xC6,
3a273b
+        0x82, 0x14, 0xAC, 0x2B, 0x72, 0x7E, 0xCF, 0x5F,
3a273b
+        0x69, 0xAF, 0xE0, 0xC4, 0xDF, 0x2A, 0x6D, 0x2C,
3a273b
+    };
3a273b
+    static unsigned char constants[][5] = {
3a273b
+        { 0x00, 0x00, 0x00, 0x02, 0x99 },
3a273b
+        { 0x00, 0x00, 0x00, 0x02, 0xaa },
3a273b
+        { 0x00, 0x00, 0x00, 0x02, 0x55 },
3a273b
+    };
3a273b
+    static unsigned char outputs[][32] = {
3a273b
+        {0xE4, 0x67, 0xF9, 0xA9, 0x55, 0x2B, 0xC7, 0xD3,
3a273b
+         0x15, 0x5A, 0x62, 0x20, 0xAF, 0x9C, 0x19, 0x22,
3a273b
+         0x0E, 0xEE, 0xD4, 0xFF, 0x78, 0xB0, 0xD1, 0xE6,
3a273b
+         0xA1, 0x54, 0x49, 0x91, 0x46, 0x1A, 0x9E, 0x50,
3a273b
+        },
3a273b
+        {0x41, 0x2A, 0xEF, 0xC3, 0x62, 0xA7, 0x28, 0x5F,
3a273b
+         0xC3, 0x96, 0x6C, 0x6A, 0x51, 0x81, 0xE7, 0x60,
3a273b
+         0x5A, 0xE6, 0x75, 0x23, 0x5B, 0x6D, 0x54, 0x9F,
3a273b
+         0xBF, 0xC9, 0xAB, 0x66, 0x30, 0xA4, 0xC6, 0x04,
3a273b
+        },
3a273b
+        {0xFA, 0x62, 0x4F, 0xA0, 0xE5, 0x23, 0x99, 0x3F,
3a273b
+         0xA3, 0x88, 0xAE, 0xFD, 0xC6, 0x7E, 0x67, 0xEB,
3a273b
+         0xCD, 0x8C, 0x08, 0xE8, 0xA0, 0x24, 0x6B, 0x1D,
3a273b
+         0x73, 0xB0, 0xD1, 0xDD, 0x9F, 0xC5, 0x82, 0xB0,
3a273b
+        },
3a273b
+    };
3a273b
+    static unsigned char iv[16] = { 0 };
3a273b
+    unsigned char result[32] = { 0 };
3a273b
+
3a273b
+    for (i = 0; i < 3; i++) {
3a273b
+        ret = 0;
3a273b
+        if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB)) == NULL) {
3a273b
+            TEST_error("EVP_KDF_KB");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_CMAC) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KB_MAC_TYPE");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MODE, EVP_KDF_KB_MODE_FEEDBACK) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KB_MODE");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_CIPHER, EVP_camellia_256_cbc()) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_CIPHER");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, input_key, sizeof(input_key)) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KEY");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, constants[i], sizeof(constants[i])) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_SALT");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_SEED, iv, sizeof(iv)) <= 0) {
3a273b
+            TEST_error("EVP_KDF_CTRL_SET_KB_SEED");
3a273b
+            goto err;
3a273b
+        }
3a273b
+        ret = TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
3a273b
+            && TEST_mem_eq(result, sizeof(result), outputs[i],
3a273b
+                           sizeof(outputs[i]));
3a273b
+err:
3a273b
+        EVP_KDF_CTX_free(kctx);
3a273b
+        if (ret != 1)
3a273b
+            return ret;
3a273b
+    }
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+/* Two test vectors from RFC 8009 (AES Encryption with HMAC-SHA2 for Kerberos
3a273b
+ * 5) appendix A. */
3a273b
+static int test_kdf_kbkdf_8009_prf1(void)
3a273b
+{
3a273b
+    int ret = 0;
3a273b
+    EVP_KDF_CTX *kctx;
3a273b
+    char *label = "prf", *prf_input = "test";
3a273b
+    static unsigned char input_key[] = {
3a273b
+        0x37, 0x05, 0xD9, 0x60, 0x80, 0xC1, 0x77, 0x28,
3a273b
+        0xA0, 0xE8, 0x00, 0xEA, 0xB6, 0xE0, 0xD2, 0x3C,
3a273b
+    };
3a273b
+    static unsigned char output[] = {
3a273b
+        0x9D, 0x18, 0x86, 0x16, 0xF6, 0x38, 0x52, 0xFE,
3a273b
+        0x86, 0x91, 0x5B, 0xB8, 0x40, 0xB4, 0xA8, 0x86,
3a273b
+        0xFF, 0x3E, 0x6B, 0xB0, 0xF8, 0x19, 0xB4, 0x9B,
3a273b
+        0x89, 0x33, 0x93, 0xD3, 0x93, 0x85, 0x42, 0x95,
3a273b
+    };
3a273b
+    unsigned char result[sizeof(output)] = { 0 };
3a273b
+
3a273b
+    if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB)) == NULL) {
3a273b
+        TEST_error("EVP_KDF_KB");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_HMAC) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KB_MAC_TYPE");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha256()) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_MD");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, input_key, sizeof(input_key)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KEY");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, label, strlen(label)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_SALT");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_INFO, prf_input, strlen(prf_input)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KB_INFO");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    ret = TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
3a273b
+        && TEST_mem_eq(result, sizeof(result), output,
3a273b
+                           sizeof(output));
3a273b
+err:
3a273b
+    EVP_KDF_CTX_free(kctx);
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static int test_kdf_kbkdf_8009_prf2(void)
3a273b
+{
3a273b
+    int ret = 0;
3a273b
+    EVP_KDF_CTX *kctx;
3a273b
+    char *label = "prf", *prf_input = "test";
3a273b
+    static unsigned char input_key[] = {
3a273b
+        0x6D, 0x40, 0x4D, 0x37, 0xFA, 0xF7, 0x9F, 0x9D,
3a273b
+        0xF0, 0xD3, 0x35, 0x68, 0xD3, 0x20, 0x66, 0x98,
3a273b
+        0x00, 0xEB, 0x48, 0x36, 0x47, 0x2E, 0xA8, 0xA0,
3a273b
+        0x26, 0xD1, 0x6B, 0x71, 0x82, 0x46, 0x0C, 0x52,
3a273b
+    };
3a273b
+    static unsigned char output[] = {
3a273b
+        0x98, 0x01, 0xF6, 0x9A, 0x36, 0x8C, 0x2B, 0xF6,
3a273b
+        0x75, 0xE5, 0x95, 0x21, 0xE1, 0x77, 0xD9, 0xA0,
3a273b
+        0x7F, 0x67, 0xEF, 0xE1, 0xCF, 0xDE, 0x8D, 0x3C,
3a273b
+        0x8D, 0x6F, 0x6A, 0x02, 0x56, 0xE3, 0xB1, 0x7D,
3a273b
+        0xB3, 0xC1, 0xB6, 0x2A, 0xD1, 0xB8, 0x55, 0x33,
3a273b
+        0x60, 0xD1, 0x73, 0x67, 0xEB, 0x15, 0x14, 0xD2,
3a273b
+    };
3a273b
+    unsigned char result[sizeof(output)] = { 0 };
3a273b
+
3a273b
+    if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB)) == NULL) {
3a273b
+        TEST_error("EVP_KDF_KB");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_HMAC) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KB_MAC_TYPE");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha384()) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_MD");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, input_key, sizeof(input_key)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KEY");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, label, strlen(label)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_SALT");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_INFO, prf_input, strlen(prf_input)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KB_INFO");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    ret = TEST_int_gt(EVP_KDF_derive(kctx, result, sizeof(result)), 0)
3a273b
+        && TEST_mem_eq(result, sizeof(result), output,
3a273b
+                           sizeof(output));
3a273b
+err:
3a273b
+    EVP_KDF_CTX_free(kctx);
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static int test_kdf_krb5kdf(void)
3a273b
+{
3a273b
+    int ret = 0;
3a273b
+    EVP_KDF_CTX *kctx;
3a273b
+    unsigned char out[16];
3a273b
+    static unsigned char key[] = {
3a273b
+        0x42, 0x26, 0x3C, 0x6E, 0x89, 0xF4, 0xFC, 0x28,
3a273b
+        0xB8, 0xDF, 0x68, 0xEE, 0x09, 0x79, 0x9F, 0x15
3a273b
+    };
3a273b
+    static unsigned char constant[] = {
3a273b
+        0x00, 0x00, 0x00, 0x02, 0x99
3a273b
+    };
3a273b
+    static const unsigned char expected[sizeof(out)] = {
3a273b
+        0x34, 0x28, 0x0A, 0x38, 0x2B, 0xC9, 0x27, 0x69,
3a273b
+        0xB2, 0xDA, 0x2F, 0x9E, 0xF0, 0x66, 0x85, 0x4B
3a273b
+    };
3a273b
+
3a273b
+    if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_KRB5KDF)) == NULL) {
3a273b
+        TEST_error("EVP_KDF_KRB5KDF");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_CIPHER, EVP_aes_128_cbc()) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_CIPHER");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, key, sizeof(key)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KEY");
3a273b
+        goto err;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT, constant, sizeof(constant)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KRB5KDF_CONSTANT");
3a273b
+        goto err;
3a273b
+    }
3a273b
+
3a273b
+    ret =
3a273b
+        TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out)), 0)
3a273b
+        && TEST_mem_eq(out, sizeof(out), expected, sizeof(expected));
3a273b
+
3a273b
+err:
3a273b
+    EVP_KDF_CTX_free(kctx);
3a273b
+    return ret;
3a273b
+}
3a273b
+
3a273b
+static int test_kdf_ss_hash(void)
3a273b
+{
3a273b
+    EVP_KDF_CTX *kctx;
3a273b
+    const unsigned char z[] = {
3a273b
+        0x6d,0xbd,0xc2,0x3f,0x04,0x54,0x88,0xe4,0x06,0x27,0x57,0xb0,0x6b,0x9e,
3a273b
+        0xba,0xe1,0x83,0xfc,0x5a,0x59,0x46,0xd8,0x0d,0xb9,0x3f,0xec,0x6f,0x62,
3a273b
+        0xec,0x07,0xe3,0x72,0x7f,0x01,0x26,0xae,0xd1,0x2c,0xe4,0xb2,0x62,0xf4,
3a273b
+        0x7d,0x48,0xd5,0x42,0x87,0xf8,0x1d,0x47,0x4c,0x7c,0x3b,0x18,0x50,0xe9
3a273b
+    };
3a273b
+    const unsigned char other[] = {
3a273b
+        0xa1,0xb2,0xc3,0xd4,0xe5,0x43,0x41,0x56,0x53,0x69,0x64,0x3c,0x83,0x2e,
3a273b
+        0x98,0x49,0xdc,0xdb,0xa7,0x1e,0x9a,0x31,0x39,0xe6,0x06,0xe0,0x95,0xde,
3a273b
+        0x3c,0x26,0x4a,0x66,0xe9,0x8a,0x16,0x58,0x54,0xcd,0x07,0x98,0x9b,0x1e,
3a273b
+        0xe0,0xec,0x3f,0x8d,0xbe
3a273b
+    };
3a273b
+    const unsigned char expected[] = {
3a273b
+        0xa4,0x62,0xde,0x16,0xa8,0x9d,0xe8,0x46,0x6e,0xf5,0x46,0x0b,0x47,0xb8
3a273b
+    };
3a273b
+    unsigned char out[14];
3a273b
+
3a273b
+    kctx = EVP_KDF_CTX_new_id(EVP_KDF_SS);
3a273b
+
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha224()) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_MD");
3a273b
+        return 0;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, z, sizeof(z)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_KEY");
3a273b
+        return 0;
3a273b
+    }
3a273b
+    if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SSKDF_INFO, other,
3a273b
+                     sizeof(other)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_CTRL_SET_SSKDF_INFO");
3a273b
+        return 0;
3a273b
+    }
3a273b
+    if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
3a273b
+        TEST_error("EVP_KDF_derive");
3a273b
+        return 0;
3a273b
+    }
3a273b
+
3a273b
+    if (!TEST_mem_eq(out, sizeof(out), expected, sizeof(expected)))
3a273b
+        return 0;
3a273b
+
3a273b
+    EVP_KDF_CTX_free(kctx);
3a273b
+    return 1;
3a273b
+}
3a273b
+
3a273b
 int setup_tests(void)
3a273b
 {
3a273b
+    ADD_TEST(test_kdf_kbkdf_6803_128);
3a273b
+    ADD_TEST(test_kdf_kbkdf_6803_256);
3a273b
+    ADD_TEST(test_kdf_kbkdf_8009_prf1);
3a273b
+    ADD_TEST(test_kdf_kbkdf_8009_prf2);
3a273b
     ADD_TEST(test_kdf_tls1_prf);
3a273b
     ADD_TEST(test_kdf_hkdf);
3a273b
     ADD_TEST(test_kdf_pbkdf2);
3a273b
 #ifndef OPENSSL_NO_SCRYPT
3a273b
     ADD_TEST(test_kdf_scrypt);
3a273b
 #endif
3a273b
+    ADD_TEST(test_kdf_krb5kdf);
3a273b
+    ADD_TEST(test_kdf_ss_hash);
3a273b
     return 1;
3a273b
 }
c95581
diff -up openssl-1.1.1d/test/recipes/30-test_evp_data/evpkdf.txt.krb5-kdf openssl-1.1.1d/test/recipes/30-test_evp_data/evpkdf.txt
c95581
--- openssl-1.1.1d/test/recipes/30-test_evp_data/evpkdf.txt.krb5-kdf	2019-11-14 15:07:05.327094396 +0100
c95581
+++ openssl-1.1.1d/test/recipes/30-test_evp_data/evpkdf.txt	2019-11-14 15:07:05.349094005 +0100
3a273b
@@ -5286,3 +5286,559 @@ Ctrl.hexsession_id = hexsession_id:a4ebd
3a273b
 Ctrl.type = type:A
3a273b
 Output = FF
3a273b
 Result = KDF_MISMATCH
3a273b
+
3a273b
+Title = KRB5KDF tests (from RFC 3961 test vectors and krb5 sources)
3a273b
+
3a273b
+#RFC3961
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:dce06b1f64c857a11c3db57c51899b2cc1791008ce973b92
3a273b
+Ctrl.hexconstant = hexconstant:0000000155
3a273b
+Output = 925179d04591a79b5d3192c4a7e9c289b049c71f6ee604cd
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:5e13d31c70ef765746578531cb51c15bf11ca82c97cee9f2
3a273b
+Ctrl.hexconstant = hexconstant:00000001aa
3a273b
+Output = 9e58e5a146d9942a101c469845d67a20e3c4259ed913f207
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:98e6fd8a04a4b6859b75a176540b9752bad3ecd610a252bc
3a273b
+Ctrl.hexconstant = hexconstant:0000000155
3a273b
+Output = 13fef80d763e94ec6d13fd2ca1d085070249dad39808eabf
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:622aec25a2fe2cad7094680b7c64940280084c1a7cec92b5
3a273b
+Ctrl.hexconstant = hexconstant:00000001aa
3a273b
+Output = f8dfbf04b097e6d9dc0702686bcb3489d91fd9a4516b703e
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:d3f8298ccb166438dcb9b93ee5a7629286a491f838f802fb
3a273b
+Ctrl.hexconstant = hexconstant:6b65726265726f73
3a273b
+Output = 2370da575d2a3da864cebfdc5204d56df779a7df43d9da43
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:c1081649ada74362e6a1459d01dfd30d67c2234c940704da
3a273b
+Ctrl.hexconstant = hexconstant:0000000155
3a273b
+Output = 348057ec98fdc48016161c2a4c7a943e92ae492c989175f7
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:5d154af238f46713155719d55e2f1f790dd661f279a7917c
3a273b
+Ctrl.hexconstant = hexconstant:00000001aa
3a273b
+Output = a8808ac267dada3dcbe9a7c84626fbc761c294b01315e5c1
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:798562e049852f57dc8c343ba17f2ca1d97394efc8adc443
3a273b
+Ctrl.hexconstant = hexconstant:0000000155
3a273b
+Output = c813f88a3be3b334f75425ce9175fbe3c8493b89c8703b49
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:26dce334b545292f2feab9a8701a89a4b99eb9942cecd016
3a273b
+Ctrl.hexconstant = hexconstant:00000001aa
3a273b
+Output = f48ffd6e83f83e7354e694fd252cf83bfe58f7d5ba37ec5d
3a273b
+
3a273b
+#Krb5 sources
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:850BB51358548CD05E86768C313E3BFEF7511937DCF72C3E
3a273b
+Ctrl.hexconstant = hexconstant:0000000299
3a273b
+Output = F78C496D16E6C2DAE0E0B6C24057A84C0426AEEF26FD6DCE
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:850BB51358548CD05E86768C313E3BFEF7511937DCF72C3E
3a273b
+Ctrl.hexconstant = hexconstant:00000002AA
3a273b
+Output = 5B5723D0B634CB684C3EBA5264E9A70D52E683231AD3C4CE
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:850BB51358548CD05E86768C313E3BFEF7511937DCF72C3E
3a273b
+Ctrl.hexconstant = hexconstant:0000000255
3a273b
+Output = A77C94980E9B7345A81525C423A737CE67F4CD91B6B3DA45
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:AES-128-CBC
3a273b
+Ctrl.hexkey = hexkey:42263C6E89F4FC28B8DF68EE09799F15
3a273b
+Ctrl.hexconstant = hexconstant:0000000299
3a273b
+Output = 34280A382BC92769B2DA2F9EF066854B
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:AES-128-CBC
3a273b
+Ctrl.hexkey = hexkey:42263C6E89F4FC28B8DF68EE09799F15
3a273b
+Ctrl.hexconstant = hexconstant:00000002AA
3a273b
+Output = 5B14FC4E250E14DDF9DCCF1AF6674F53
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:AES-128-CBC
3a273b
+Ctrl.hexkey = hexkey:42263C6E89F4FC28B8DF68EE09799F15
3a273b
+Ctrl.hexconstant = hexconstant:0000000255
3a273b
+Output = 4ED31063621684F09AE8D89991AF3E8F
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:AES-256-CBC
3a273b
+Ctrl.hexkey = hexkey:FE697B52BC0D3CE14432BA036A92E65BBB52280990A2FA27883998D72AF30161
3a273b
+Ctrl.hexconstant = hexconstant:0000000299
3a273b
+Output = BFAB388BDCB238E9F9C98D6A878304F04D30C82556375AC507A7A852790F4674
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:AES-256-CBC
3a273b
+Ctrl.hexkey = hexkey:FE697B52BC0D3CE14432BA036A92E65BBB52280990A2FA27883998D72AF30161
3a273b
+Ctrl.hexconstant = hexconstant:00000002AA
3a273b
+Output = C7CFD9CD75FE793A586A542D87E0D1396F1134A104BB1A9190B8C90ADA3DDF37
3a273b
+
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:AES-256-CBC
3a273b
+Ctrl.hexkey = hexkey:FE697B52BC0D3CE14432BA036A92E65BBB52280990A2FA27883998D72AF30161
3a273b
+Ctrl.hexconstant = hexconstant:0000000255
3a273b
+Output = 97151B4C76945063E2EB0529DC067D97D7BBA90776D8126D91F34F3101AEA8BA
3a273b
+
3a273b
+#Same as the first but with no "fixup"
3a273b
+KDF = KRB5KDF
3a273b
+Ctrl.cipher = cipher:DES-EDE3-CBC
3a273b
+Ctrl.hexkey = hexkey:dce06b1f64c857a11c3db57c51899b2cc1791008ce973b92
3a273b
+Ctrl.hexconstant = hexconstant:0000000155
3a273b
+Output = 935079d14490a75c3093c4a6e8c3b049c71e6ee705
3a273b
+
3a273b
+#There are currently no official test vectors for Single Step KDF
3a273b
+#https://github.com/patrickfav/singlestep-kdf/wiki/NIST-SP-800-56C-Rev1:-Non-Official-Test-Vectors
3a273b
+Title = Single Step KDF tests
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:d09a6b1a472f930db4f5e6b967900744
3a273b
+Ctrl.hexinfo = hexinfo:b117255ab5f1b6b96fc434b0
3a273b
+Output = b5a3c52e97ae6e8c5069954354eab3c7
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:343666c0dd34b756e70f759f14c304f5
3a273b
+Ctrl.hexinfo = hexinfo:722b28448d7eab85491bce09
3a273b
+Output = 1003b650ddd3f0891a15166db5ec881d
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:b84acf03ab08652dd7f82fa956933261
3a273b
+Ctrl.hexinfo = hexinfo:3d8773ec068c86053a918565
3a273b
+Output = 1635dcd1ce698f736831b4badb68ab2b
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:8cc24ca3f1d1a8b34783780b79890430
3a273b
+Ctrl.hexinfo = hexinfo:f08d4f2d9a8e6d7105c0bc16
3a273b
+Output = b8e716fb84a420aed4812cd76d9700ee
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:b616905a6f7562cd2689142ce21e42a3
3a273b
+Ctrl.hexinfo = hexinfo:ead310159a909da87e7b4b40
3a273b
+Output = 1b9201358c50fe5d5d42907c4a9fce78
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:3f57fd3fd56199b3eb33890f7ee28180
3a273b
+Ctrl.hexinfo = hexinfo:7a5056ba4fdb034c7cb6c4fe
3a273b
+Output = e51ebd30a8c4b8449b0fb29d9adc11af
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:fb9fb108d104e9f662d6593fc84cde69
3a273b
+Ctrl.hexinfo = hexinfo:5faf29211c1bdbf1b2696a7c
3a273b
+Output = 7a3a7e670656e48c390cdd7c51e167e0
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:237a39981794f4516dccffc3dda28396
3a273b
+Ctrl.hexinfo = hexinfo:62ed9528d104c241e0f66275
3a273b
+Output = 0c26fc9e90e1c5c5f943428301682045
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:b9b6c45f7279218fa09894e06366a3a1
3a273b
+Ctrl.hexinfo = hexinfo:0f384339670aaed4b89ecb7e
3a273b
+Output = ee5fad414e32fad5d52a2bf61a7f6c72
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:08b7140e2cd0a4abd79171e4d5a71cad
3a273b
+Ctrl.hexinfo = hexinfo:099211f0d8a2e02dbb5958c0
3a273b
+Output = 6162f5142e057efafd2c4f2bad5985a1
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a2
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f4853
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493d
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759a
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac704
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbe
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf1050
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f3
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8b
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f22
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f227688
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f2276885abf
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f2276885abfbc3e
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f2276885abfbc3e811a
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f2276885abfbc3e811a568d
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f2276885abfbc3e811a568d480d
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:ebe28edbae5a410b87a479243db3f690
3a273b
+Ctrl.hexinfo = hexinfo:e60dd8b28228ce5b9be74d3b
3a273b
+Output = b4a23963e07f485382cb358a493daec1759ac7043dbeac37152c6ddf105031f0f239f270b7f30616166f10e5d2b4cb11ba8bf4ba3f2276885abfbc3e811a568d480d9192
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:d7e6
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 31e798e9931b612a3ad1b9b1008faa8c
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:4646779d
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 139f68bcca879b490e268e569087d04d
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:d9811c81d4c6
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 914dc4f09cb633a76e6c389e04c64485
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:8838f9d99ec46f09
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 4f07dfb6f7a5bf348689e08b2e29c948
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:3e0939b33f34e779f30e
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = b42c7a98c23be19d1187ff960e87557f
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:f36230cacca4d245d303058c
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 50f2068d8010d355d56c5e34aaffbc67
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:7005d32c3d4284c73c3aefc70438
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 66fd712ccf5462bbd41e89041ea7ea26
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:c01c83150b7734f8dbd6efd6f54d7365
3a273b
+Ctrl.hexinfo = hexinfo:0bbe1fa8722023d7c3da4fff
3a273b
+Output = 5c5edb0ceda9cd0c7f1f3d9e239c67d5
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:9949
3a273b
+Output = 33c83f54ed00fb1bccd2113e88550941
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:17144da6
3a273b
+Output = a999c28961424cab35ec06015e8c376a
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:dffdee1062eb
3a273b
+Output = 4101ad50e626ed6f957bff926dfbb7db
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:9f365043e23b4648
3a273b
+Output = 4d3e4b971b88771f229df9f564984832
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:a885a0c4567ddc4f96da
3a273b
+Output = bebbc30f5a83df5e9c9b57db33c0c879
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:c9d86183295bfe4c3d85f0fd
3a273b
+Output = 87c947e45407db63eb94cbaa02d14e94
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:825fadce46964236a486732c5dad
3a273b
+Output = 192370a85ff78e3c0245129d9b398558
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:da69f1dbbebc837480af692e7e9ee6b9
3a273b
+Ctrl.hexinfo = hexinfo:5c0b5eb3ac9f342347d73d7a521723aa
3a273b
+Output = c7b7634fd809383e87c4b1b3e728be56
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:8d7a4e7d5cf34b3f74873b862aeb33b7
3a273b
+Output = 6a5594f402f74f69
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:9b208e7ee1e641fac1dff48fc1beb2d2
3a273b
+Output = 556ed67e24ac0c7c46cc432da8bdb23c
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:4d2572539fed433211da28c8a0eebac3
3a273b
+Output = 5a4054c59c5b92814025578f43c1b79fe84968fc284e240b
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:4e1e70c9886819a31bc29a537911add9
3a273b
+Output = ddbfc440449aab4131c6d8aec08ce1496f2702241d0e27cc155c5c7c3cda75b5
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:68f144c952528e540c686dc353b766f2
3a273b
+Output = 59ed66bb6f54a9688a0b891d0b2ea6743621d9e1b5cc098cf3a55e6f864f9af8a95e4d945d2f987f
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:b66c9d507c9f837fbe60b6675fdbf38b
3a273b
+Output = c282787ddf421a72fc88811be81b08d0d6ab66c92d1011974aa58335a6bbbd62e9e982bfae5929865ea1d517247089d2
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:34e730b49e46c7ed2fb25975a4cccd2d
3a273b
+Output = 39e76e6571cb00740260b9070accbdcc4a492c295cbef33d9e37dac21e5e9d07e0f12dc7063d2172641475d4e08b8e3712fb26a10c8376b8
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:e340d87e2d7adbc1b95ec2dbdc3b82be
3a273b
+Output = a660c0037a53f76f1e7667043f5869348ad07ac0e272e615ce31f16d4ab90d4b35fe5c370c0010ce79aff45682c6fb8b97f9a05b7d40b5af3c62999a10df9c6d
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA256
3a273b
+Ctrl.hexsecret = hexsecret:afc4e154498d4770aa8365f6903dc83b
3a273b
+Ctrl.hexinfo = hexinfo:662af20379b29d5ef813e655
3a273b
+Output = f0b80d6ae4c1e19e2105a37024e35dc6
3a273b
+
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA512
3a273b
+Ctrl.hexsecret = hexsecret:108cf63318555c787fa578731dd4f037
3a273b
+Ctrl.hexinfo = hexinfo:53191b1dd3f94d83084d61d6
3a273b
+Output = 0ad475c1826da3007637970c8b92b993
3a273b
+
3a273b
+Title = SSKDF Test vectors from RFC 8636 Section 8 (With precoumputed ASN.1 info)
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA1
3a273b
+Ctrl.hexsecret = hexsecret:00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
3a273b
+Ctrl.hexinfo = hexinfo:307e300a06082b06010502030601a01f041d301ba0071b0553552e5345a110300ea003020101a10730051b036c6861a12904273025a0071b0553552e5345a11a3018a003020101a111300f1b066b72627467741b0553552e5345a22404223020a003020112a10c040aaaaaaaaaaaaaaaaaaaaaa20b0409bbbbbbbbbbbbbbbbbb
3a273b
+Output = e6ab38c9413e035bb079201ed0b6b73d8d49a814a737c04ee6649614206f73ad
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA256
3a273b
+Ctrl.hexsecret = hexsecret:00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
3a273b
+Ctrl.hexinfo = hexinfo:307e300a06082b06010502030602a01f041d301ba0071b0553552e5345a110300ea003020101a10730051b036c6861a12904273025a0071b0553552e5345a11a3018a003020101a111300f1b066b72627467741b0553552e5345a22404223020a003020112a10c040aaaaaaaaaaaaaaaaaaaaaa20b0409bbbbbbbbbbbbbbbbbb
3a273b
+Output = 77ef4e48c420ae3fec75109d7981697eed5d295c90c62564f7bfd101fa9bc1d5
3a273b
+
3a273b
+KDF = SSKDF
3a273b
+Ctrl.digest = digest:SHA512
3a273b
+Ctrl.hexsecret = hexsecret:00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
3a273b
+Ctrl.hexinfo = hexinfo:307e300a06082b06010502030603a01f041d301ba0071b0553552e5345a110300ea003020101a10730051b036c6861a12904273025a0071b0553552e5345a11a3018a003020101a111300f1b066b72627467741b0553552e5345a22404223020a003020110a10c040aaaaaaaaaaaaaaaaaaaaaa20b0409bbbbbbbbbbbbbbbbbb
3a273b
+Output = d3c78b78d75313e9a926f75dfb012363fa17fa01db