@@ -75,17 +75,10 @@ pub static HKDF_SHA512: Algorithm = Algorithm(hmac::HMAC_SHA512);
75
75
/// We set the limit to something tolerable, so that the Salt structure can be stack allocatable.
76
76
const MAX_HKDF_SALT_LEN : usize = 80 ;
77
77
78
- // This is needed so that the precise value can be provided in the documentation.
79
- macro_rules! max_hkdf_info_len {
80
- ( ) => {
81
- 102
82
- } ;
83
- }
84
-
85
78
/// General Info length's for HKDF don't normally exceed 256 bits.
86
- /// We set the limit to something tolerable, so that the memory passed into |`HKDF_expand`| is
87
- /// allocated on the stack .
88
- const MAX_HKDF_INFO_LEN : usize = max_hkdf_info_len ! ( ) ;
79
+ /// We set the default capacity to a value larger than should be needed
80
+ /// so that the value passed to |`HKDF_expand`| is only allocated once .
81
+ const HKDF_INFO_DEFAULT_CAPACITY_LEN : usize = 300 ;
89
82
90
83
/// The maximum output size of a PRK computed by |`HKDF_extract`| is the maximum digest
91
84
/// size that can be outputted by *AWS-LC*.
@@ -350,9 +343,8 @@ impl Prk {
350
343
/// [HKDF-Expand]: https://tools.ietf.org/html/rfc5869#section-2.3
351
344
///
352
345
/// # Errors
353
- /// Returns `error::Unspecified` if either :
346
+ /// Returns `error::Unspecified` if:
354
347
/// * `len` is more than 255 times the digest algorithm's output length.
355
- #[ doc = concat ! ( " * the combined lengths of the `info` slices is more than " , max_hkdf_info_len!( ) , " bytes." ) ]
356
348
// # FIPS
357
349
// The following conditions must be met:
358
350
// * `Prk` must be constructed using `Salt::extract` prior to calling
@@ -368,16 +360,13 @@ impl Prk {
368
360
if len_cached > 255 * self . algorithm . 0 . digest_algorithm ( ) . output_len {
369
361
return Err ( Unspecified ) ;
370
362
}
371
- let mut info_bytes = [ 0u8 ; MAX_HKDF_INFO_LEN ] ;
363
+ let mut info_bytes: Vec < u8 > = Vec :: with_capacity ( HKDF_INFO_DEFAULT_CAPACITY_LEN ) ;
372
364
let mut info_len = 0 ;
373
- for byte_ary in info {
374
- let new_info_len = info_len + byte_ary. len ( ) ;
375
- if new_info_len > MAX_HKDF_INFO_LEN {
376
- return Err ( Unspecified ) ;
377
- }
378
- info_bytes[ info_len..new_info_len] . copy_from_slice ( byte_ary) ;
379
- info_len = new_info_len;
365
+ for & byte_ary in info {
366
+ info_bytes. extend_from_slice ( byte_ary) ;
367
+ info_len += byte_ary. len ( ) ;
380
368
}
369
+ let info_bytes = info_bytes. into_boxed_slice ( ) ;
381
370
Ok ( Okm {
382
371
prk : self ,
383
372
info_bytes,
@@ -407,7 +396,7 @@ impl From<Okm<'_, Algorithm>> for Prk {
407
396
/// use once.
408
397
pub struct Okm < ' a , L : KeyType > {
409
398
prk : & ' a Prk ,
410
- info_bytes : [ u8 ; MAX_HKDF_INFO_LEN ] ,
399
+ info_bytes : Box < [ u8 ] > ,
411
400
info_len : usize ,
412
401
len : L ,
413
402
}
0 commit comments