/* Copyright (c) (2014,2015,2016,2017,2018,2019) Apple Inc. All rights reserved. * * corecrypto is licensed under Apple Inc.’s Internal Use License Agreement (which * is contained in the License.txt file distributed with corecrypto) and only to * people who accept that license. IMPORTANT: Any license rights granted to you by * Apple Inc. (if any) are limited to internal use within your organization only on * devices and computers you own or control, for the sole purpose of verifying the * security characteristics and correct functioning of the Apple Software. You may * not, directly or indirectly, redistribute the Apple Software or any portions thereof. */ #include "testmore.h" #include "testbyteBuffer.h" #include "testccnBuffer.h" #if (CCHKDF == 0) entryPoint(cchkdf_tests, "cchkdf test") #else #include #include #include #include static int verbose = 0; #define type_sha1 1 #define type_sha256 256 #define type_sha512 512 typedef struct { int type; const char *ikm; const char *salt; const char *info; size_t len; const char *prk; const char *okm; } test_vector_t; static const test_vector_t hkdf_sha256_tests[] = { // RFC 5869 Test Case 1 { /* Type */ type_sha256, /* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", /* Salt */ "000102030405060708090a0b0c", /* Info */ "f0f1f2f3f4f5f6f7f8f9", /* Len */ 42, /* PRK */ "077709362c2e32df0ddc3f0dc47bba63" "90b6c73bb50f9c3122ec844ad7c2b3e5", /* OKM */ "3cb25f25faacd57a90434f64d0362f2a" "2d2d0a90cf1a5a4c5db02d56ecc4c5bf" "34007208d5b887185865" }, // RFC 5869 Test Case 2 { /* Type */ type_sha256, /* IKM */ "000102030405060708090a0b0c0d0e0f" "101112131415161718191a1b1c1d1e1f" "202122232425262728292a2b2c2d2e2f" "303132333435363738393a3b3c3d3e3f" "404142434445464748494a4b4c4d4e4f", /* Salt */ "606162636465666768696a6b6c6d6e6f" "707172737475767778797a7b7c7d7e7f" "808182838485868788898a8b8c8d8e8f" "909192939495969798999a9b9c9d9e9f" "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf", /* Info */ "b0b1b2b3b4b5b6b7b8b9babbbcbdbebf" "c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" "d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" "e0e1e2e3e4e5e6e7e8e9eaebecedeeef" "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff", /* Len */ 82, /* PRK */ "06a6b88c5853361a06104c9ceb35b45c" "ef760014904671014a193f40c15fc244", /* OKM */ "b11e398dc80327a1c8e7f78c596a4934" "4f012eda2d4efad8a050cc4c19afa97c" "59045a99cac7827271cb41c65e590e09" "da3275600c2f09b8367793a9aca3db71" "cc30c58179ec3e87c14c01d5c1f3434f" "1d87" }, // RFC 5869 Test Case 3 { /* Type */ type_sha256, /* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", /* Salt */ "", /* Info */ "", /* Len */ 42, /* PRK */ "19ef24a32c717b167f33a91d6f648bdf" "96596776afdb6377ac434c1c293ccb04", /* OKM */ "8da4e775a563c18f715f802a063c5a31" "b8a11f5c5ee1879ec3454e5f3c738d2d" "9d201395faa4b61a96c8" }, // RFC 5869 Test Case 4 { /* Type */ type_sha1, /* IKM */ "0b0b0b0b0b0b0b0b0b0b0b", /* Salt */ "000102030405060708090a0b0c", /* Info */ "f0f1f2f3f4f5f6f7f8f9", /* Len */ 42, /* PRK */ "9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243", /* OKM */ "085a01ea1b10f36933068b56efa5ad81" "a4f14b822f5b091568a9cdd4f155fda2" "c22e422478d305f3f896" }, // RFC 5869 Test Case 5 { /* Type */ type_sha1, /* IKM */ "000102030405060708090a0b0c0d0e0f" "101112131415161718191a1b1c1d1e1f" "202122232425262728292a2b2c2d2e2f" "303132333435363738393a3b3c3d3e3f" "404142434445464748494a4b4c4d4e4f", /* Salt */ "606162636465666768696a6b6c6d6e6f" "707172737475767778797a7b7c7d7e7f" "808182838485868788898a8b8c8d8e8f" "909192939495969798999a9b9c9d9e9f" "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf", /* Info */ "b0b1b2b3b4b5b6b7b8b9babbbcbdbebf" "c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" "d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" "e0e1e2e3e4e5e6e7e8e9eaebecedeeef" "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff", /* Len */ 82, /* PRK */ "8adae09a2a307059478d309b26c4115a224cfaf6", /* OKM */ "0bd770a74d1160f7c9f12cd5912a06eb" "ff6adcae899d92191fe4305673ba2ffe" "8fa3f1a4e5ad79f3f334b3b202b2173c" "486ea37ce3d397ed034c7f9dfeb15c5e" "927336d0441f4c4300e2cff0d0900b52" "d3b4" }, // RFC 5869 Test Case 6 { /* Type */ type_sha1, /* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", /* Salt */ "", /* Info */ "", /* Len */ 42, /* PRK */ "da8c8a73c7fa77288ec6f5e7c297786aa0d32d01", /* OKM */ "0ac1af7002b3d761d1e55298da9d0506" "b9ae52057220a306e07b6b87e8df21d0" "ea00033de03984d34918" }, // RFC 5869 Test Case 7 { /* Type */ type_sha1, /* IKM */ "0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c", /* Salt */ "", /* Info */ "", /* Len */ 42, /* PRK */ "2adccada18779e7c2077ad2eb19d3f3e731385dd", /* OKM */ "2c91117204d745f3500d636a62f64f0a" "b3bae548aa53d423b0d1f27ebba6f5e5" "673a081d70cce7acfc48" }, // RFC 5869 Test Case 1 (updated for SHA-512) { /* Type */ type_sha512, /* IKM */ "0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B", /* Salt */ "000102030405060708090A0B0C", /* Info */ "F0F1F2F3F4F5F6F7F8F9", /* Len */ 42, /* PRK */ "", /* OKM */ "832390086CDA71FB47625BB5CEB168E4" "C8E26A1A16ED34D9FC7FE92C14815793" "38DA362CB8D9F925D7CB" }, // RFC 5869 Test Case 2 (updated for SHA-512) { /* Type */ type_sha512, /* IKM */ "000102030405060708090A0B0C0D0E0F" "101112131415161718191A1B1C1D1E1F" "202122232425262728292A2B2C2D2E2F" "303132333435363738393A3B3C3D3E3F" "404142434445464748494A4B4C4D4E4F", /* Salt */ "606162636465666768696A6B6C6D6E6F" "707172737475767778797A7B7C7D7E7F" "808182838485868788898A8B8C8D8E8F" "909192939495969798999A9B9C9D9E9F" "A0A1A2A3A4A5A6A7A8A9AAABACADAEAF", /* Info */ "B0B1B2B3B4B5B6B7B8B9BABBBCBDBEBF" "C0C1C2C3C4C5C6C7C8C9CACBCCCDCECF" "D0D1D2D3D4D5D6D7D8D9DADBDCDDDEDF" "E0E1E2E3E4E5E6E7E8E9EAEBECEDEEEF" "F0F1F2F3F4F5F6F7F8F9FAFBFCFDFEFF", /* Len */ 82, /* PRK */ "", /* OKM */ "CE6C97192805B346E6161E821ED16567" "3B84F400A2B514B2FE23D84CD189DDF1" "B695B48CBD1C8388441137B3CE28F16A" "A64BA33BA466B24DF6CFCB021ECFF235" "F6A2056CE3AF1DE44D572097A8505D9E" "7A93" }, // RFC 5869 Test Case 3 (updated for SHA-512) { /* Type */ type_sha512, /* IKM */ "0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B", /* Salt */ "", /* Info */ "", /* Len */ 42, /* PRK */ "", /* OKM */ "F5FA02B18298A72A8C23898A8703472C" "6EB179DC204C03425C970E3B164BF90F" "FF22D04836D0E2343BAC" }, }; int cchkdf_tests(TM_UNUSED int argc, TM_UNUSED char *const *argv) { size_t i, n; int err; plan_tests(10 * 2 // cchkdf + 4 * 7 // cchkdf_extract + cchkdf_expand ); if (verbose) diag("Starting hkdf tests\n"); n = sizeof(hkdf_sha256_tests) / sizeof(*hkdf_sha256_tests); for (i = 0; i < n; ++i) { const test_vector_t *tv = &hkdf_sha256_tests[i]; const struct ccdigest_info *di; if (tv->type == type_sha1) di = ccsha1_di(); else if (tv->type == type_sha256) di = ccsha256_di(); else if (tv->type == type_sha512) di = ccsha512_di(); else abort(); byteBuffer ikm = hexStringToBytes(tv->ikm); byteBuffer salt = hexStringToBytes(tv->salt); byteBuffer info = hexStringToBytes(tv->info); byteBuffer prkActual = mallocByteBuffer(di->output_size); byteBuffer prkExpected = hexStringToBytes(tv->prk); byteBuffer okmDecoupledActual = mallocByteBuffer(tv->len); byteBuffer okmActual = mallocByteBuffer(tv->len); byteBuffer okmExpected = hexStringToBytes(tv->okm); // If the test vector has known answers for the Extract and Expand steps, use them. if (prkExpected->len > 0) { err = cchkdf_extract(di, salt->len, salt->bytes, ikm->len, ikm->bytes, prkActual->bytes); ok(!err, "cchkdf_extract failed"); ok(bytesAreEqual(prkActual, prkExpected), "PRK expected does not equal actual"); err = cchkdf_expand(di, prkActual->len, prkActual->bytes, info->len, info->bytes, okmActual->len, okmDecoupledActual->bytes); ok(!err, "cchkdf_expand failed"); ok(bytesAreEqual(okmDecoupledActual, okmExpected), "Output key does not equal actual"); } err = cchkdf(di, ikm->len, ikm->bytes, salt->len, salt->bytes, info->len, info->bytes, okmActual->len, okmActual->bytes); ok(!err, "check return value"); ok(bytesAreEqual(okmActual, okmExpected), "compare memory of answer"); free(ikm); free(salt); free(info); free(okmActual); free(okmExpected); free(okmDecoupledActual); free(prkActual); free(prkExpected); } return 0; } #endif // CCHKDFTEST