Hello,
In my S32K3 project, I need to use an AES key stored in NVM as the input key material (IKM) for the HSE PBKDF2 service.
AES Key usage was possible in HKDF.
However, according to the HSE Service API Reference Manual:
PBKDF2 requires the srcKeyHandle to be of type HSE_KEY_TYPE_SHARED_SECRET.
HSE_KEY_TYPE_SHARED_SECRET keys are only supported in RAM catalogs, not in NVM.
That means my AES key in NVM cannot be directly used as the PBKDF2 input.
To avoid exposing the key in plaintext, I tried:
Exporting the AES key as an enc&auth container,
Importing it into a RAM key slot,
Attempting to convert or copy it to a Shared-Secret slot (so it can be used as PBKDF2 input).
But the documentation does not describe any service to convert or copy an AES key to a Shared-Secret key type.
Key Derive – Copy Key and Import Key both require the same key type.
My question:
Is there any supported method to make an AES key (stored in NVM) usable as a PBKDF2 source without revealing it as plaintext?