290 lines
9.7 KiB
C
290 lines
9.7 KiB
C
/* Copyright (c) (2014,2015,2016,2017,2018,2019) Apple Inc. All rights reserved.
|
||
*
|
||
* corecrypto is licensed under Apple Inc.’s Internal Use License Agreement (which
|
||
* is contained in the License.txt file distributed with corecrypto) and only to
|
||
* people who accept that license. IMPORTANT: Any license rights granted to you by
|
||
* Apple Inc. (if any) are limited to internal use within your organization only on
|
||
* devices and computers you own or control, for the sole purpose of verifying the
|
||
* security characteristics and correct functioning of the Apple Software. You may
|
||
* not, directly or indirectly, redistribute the Apple Software or any portions thereof.
|
||
*/
|
||
|
||
#include "testmore.h"
|
||
#include "testbyteBuffer.h"
|
||
#include "testccnBuffer.h"
|
||
|
||
#if (CCHKDF == 0)
|
||
entryPoint(cchkdf_tests, "cchkdf test")
|
||
#else
|
||
#include <corecrypto/ccdigest.h>
|
||
#include <corecrypto/cchkdf.h>
|
||
#include <corecrypto/ccsha1.h>
|
||
#include <corecrypto/ccsha2.h>
|
||
|
||
static int verbose = 0;
|
||
|
||
#define type_sha1 1
|
||
#define type_sha256 256
|
||
#define type_sha512 512
|
||
|
||
typedef struct {
|
||
int type;
|
||
const char *ikm;
|
||
const char *salt;
|
||
const char *info;
|
||
size_t len;
|
||
const char *prk;
|
||
const char *okm;
|
||
} test_vector_t;
|
||
|
||
static const test_vector_t hkdf_sha256_tests[] = {
|
||
// RFC 5869 Test Case 1
|
||
{ /* Type */ type_sha256,
|
||
/* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
||
/* Salt */ "000102030405060708090a0b0c",
|
||
/* Info */ "f0f1f2f3f4f5f6f7f8f9",
|
||
/* Len */ 42,
|
||
/* PRK */
|
||
"077709362c2e32df0ddc3f0dc47bba63"
|
||
"90b6c73bb50f9c3122ec844ad7c2b3e5",
|
||
/* OKM */
|
||
"3cb25f25faacd57a90434f64d0362f2a"
|
||
"2d2d0a90cf1a5a4c5db02d56ecc4c5bf"
|
||
"34007208d5b887185865" },
|
||
// RFC 5869 Test Case 2
|
||
{ /* Type */ type_sha256,
|
||
/* IKM */
|
||
"000102030405060708090a0b0c0d0e0f"
|
||
"101112131415161718191a1b1c1d1e1f"
|
||
"202122232425262728292a2b2c2d2e2f"
|
||
"303132333435363738393a3b3c3d3e3f"
|
||
"404142434445464748494a4b4c4d4e4f",
|
||
/* Salt */
|
||
"606162636465666768696a6b6c6d6e6f"
|
||
"707172737475767778797a7b7c7d7e7f"
|
||
"808182838485868788898a8b8c8d8e8f"
|
||
"909192939495969798999a9b9c9d9e9f"
|
||
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
|
||
/* Info */
|
||
"b0b1b2b3b4b5b6b7b8b9babbbcbdbebf"
|
||
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf"
|
||
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf"
|
||
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef"
|
||
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
|
||
/* Len */ 82,
|
||
/* PRK */
|
||
"06a6b88c5853361a06104c9ceb35b45c"
|
||
"ef760014904671014a193f40c15fc244",
|
||
/* OKM */
|
||
"b11e398dc80327a1c8e7f78c596a4934"
|
||
"4f012eda2d4efad8a050cc4c19afa97c"
|
||
"59045a99cac7827271cb41c65e590e09"
|
||
"da3275600c2f09b8367793a9aca3db71"
|
||
"cc30c58179ec3e87c14c01d5c1f3434f"
|
||
"1d87" },
|
||
// RFC 5869 Test Case 3
|
||
{ /* Type */ type_sha256,
|
||
/* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
||
/* Salt */ "",
|
||
/* Info */ "",
|
||
/* Len */ 42,
|
||
/* PRK */
|
||
"19ef24a32c717b167f33a91d6f648bdf"
|
||
"96596776afdb6377ac434c1c293ccb04",
|
||
/* OKM */
|
||
"8da4e775a563c18f715f802a063c5a31"
|
||
"b8a11f5c5ee1879ec3454e5f3c738d2d"
|
||
"9d201395faa4b61a96c8" },
|
||
// RFC 5869 Test Case 4
|
||
{ /* Type */ type_sha1,
|
||
/* IKM */ "0b0b0b0b0b0b0b0b0b0b0b",
|
||
/* Salt */ "000102030405060708090a0b0c",
|
||
/* Info */ "f0f1f2f3f4f5f6f7f8f9",
|
||
/* Len */ 42,
|
||
/* PRK */ "9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243",
|
||
/* OKM */
|
||
"085a01ea1b10f36933068b56efa5ad81"
|
||
"a4f14b822f5b091568a9cdd4f155fda2"
|
||
"c22e422478d305f3f896" },
|
||
// RFC 5869 Test Case 5
|
||
{ /* Type */ type_sha1,
|
||
/* IKM */
|
||
"000102030405060708090a0b0c0d0e0f"
|
||
"101112131415161718191a1b1c1d1e1f"
|
||
"202122232425262728292a2b2c2d2e2f"
|
||
"303132333435363738393a3b3c3d3e3f"
|
||
"404142434445464748494a4b4c4d4e4f",
|
||
/* Salt */
|
||
"606162636465666768696a6b6c6d6e6f"
|
||
"707172737475767778797a7b7c7d7e7f"
|
||
"808182838485868788898a8b8c8d8e8f"
|
||
"909192939495969798999a9b9c9d9e9f"
|
||
"a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
|
||
/* Info */
|
||
"b0b1b2b3b4b5b6b7b8b9babbbcbdbebf"
|
||
"c0c1c2c3c4c5c6c7c8c9cacbcccdcecf"
|
||
"d0d1d2d3d4d5d6d7d8d9dadbdcdddedf"
|
||
"e0e1e2e3e4e5e6e7e8e9eaebecedeeef"
|
||
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
|
||
/* Len */ 82,
|
||
/* PRK */ "8adae09a2a307059478d309b26c4115a224cfaf6",
|
||
/* OKM */
|
||
"0bd770a74d1160f7c9f12cd5912a06eb"
|
||
"ff6adcae899d92191fe4305673ba2ffe"
|
||
"8fa3f1a4e5ad79f3f334b3b202b2173c"
|
||
"486ea37ce3d397ed034c7f9dfeb15c5e"
|
||
"927336d0441f4c4300e2cff0d0900b52"
|
||
"d3b4" },
|
||
// RFC 5869 Test Case 6
|
||
{ /* Type */ type_sha1,
|
||
/* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
|
||
/* Salt */ "",
|
||
/* Info */ "",
|
||
/* Len */ 42,
|
||
/* PRK */ "da8c8a73c7fa77288ec6f5e7c297786aa0d32d01",
|
||
/* OKM */
|
||
"0ac1af7002b3d761d1e55298da9d0506"
|
||
"b9ae52057220a306e07b6b87e8df21d0"
|
||
"ea00033de03984d34918" },
|
||
// RFC 5869 Test Case 7
|
||
{ /* Type */ type_sha1,
|
||
/* IKM */ "0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c",
|
||
/* Salt */ "",
|
||
/* Info */ "",
|
||
/* Len */ 42,
|
||
/* PRK */ "2adccada18779e7c2077ad2eb19d3f3e731385dd",
|
||
/* OKM */
|
||
"2c91117204d745f3500d636a62f64f0a"
|
||
"b3bae548aa53d423b0d1f27ebba6f5e5"
|
||
"673a081d70cce7acfc48" },
|
||
// RFC 5869 Test Case 1 (updated for SHA-512)
|
||
{ /* Type */ type_sha512,
|
||
/* IKM */ "0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B",
|
||
/* Salt */ "000102030405060708090A0B0C",
|
||
/* Info */ "F0F1F2F3F4F5F6F7F8F9",
|
||
/* Len */ 42,
|
||
/* PRK */ "",
|
||
/* OKM */
|
||
"832390086CDA71FB47625BB5CEB168E4"
|
||
"C8E26A1A16ED34D9FC7FE92C14815793"
|
||
"38DA362CB8D9F925D7CB" },
|
||
// RFC 5869 Test Case 2 (updated for SHA-512)
|
||
{ /* Type */ type_sha512,
|
||
/* IKM */
|
||
"000102030405060708090A0B0C0D0E0F"
|
||
"101112131415161718191A1B1C1D1E1F"
|
||
"202122232425262728292A2B2C2D2E2F"
|
||
"303132333435363738393A3B3C3D3E3F"
|
||
"404142434445464748494A4B4C4D4E4F",
|
||
/* Salt */
|
||
"606162636465666768696A6B6C6D6E6F"
|
||
"707172737475767778797A7B7C7D7E7F"
|
||
"808182838485868788898A8B8C8D8E8F"
|
||
"909192939495969798999A9B9C9D9E9F"
|
||
"A0A1A2A3A4A5A6A7A8A9AAABACADAEAF",
|
||
/* Info */
|
||
"B0B1B2B3B4B5B6B7B8B9BABBBCBDBEBF"
|
||
"C0C1C2C3C4C5C6C7C8C9CACBCCCDCECF"
|
||
"D0D1D2D3D4D5D6D7D8D9DADBDCDDDEDF"
|
||
"E0E1E2E3E4E5E6E7E8E9EAEBECEDEEEF"
|
||
"F0F1F2F3F4F5F6F7F8F9FAFBFCFDFEFF",
|
||
/* Len */ 82,
|
||
/* PRK */ "",
|
||
/* OKM */
|
||
"CE6C97192805B346E6161E821ED16567"
|
||
"3B84F400A2B514B2FE23D84CD189DDF1"
|
||
"B695B48CBD1C8388441137B3CE28F16A"
|
||
"A64BA33BA466B24DF6CFCB021ECFF235"
|
||
"F6A2056CE3AF1DE44D572097A8505D9E"
|
||
"7A93" },
|
||
// RFC 5869 Test Case 3 (updated for SHA-512)
|
||
{ /* Type */ type_sha512,
|
||
/* IKM */ "0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B0B",
|
||
/* Salt */ "",
|
||
/* Info */ "",
|
||
/* Len */ 42,
|
||
/* PRK */ "",
|
||
/* OKM */
|
||
"F5FA02B18298A72A8C23898A8703472C"
|
||
"6EB179DC204C03425C970E3B164BF90F"
|
||
"FF22D04836D0E2343BAC" },
|
||
};
|
||
|
||
int cchkdf_tests(TM_UNUSED int argc, TM_UNUSED char *const *argv)
|
||
{
|
||
size_t i, n;
|
||
int err;
|
||
|
||
plan_tests(10 * 2 // cchkdf
|
||
+ 4 * 7 // cchkdf_extract + cchkdf_expand
|
||
);
|
||
|
||
if (verbose)
|
||
diag("Starting hkdf tests\n");
|
||
|
||
n = sizeof(hkdf_sha256_tests) / sizeof(*hkdf_sha256_tests);
|
||
for (i = 0; i < n; ++i) {
|
||
const test_vector_t *tv = &hkdf_sha256_tests[i];
|
||
|
||
const struct ccdigest_info *di;
|
||
if (tv->type == type_sha1)
|
||
di = ccsha1_di();
|
||
else if (tv->type == type_sha256)
|
||
di = ccsha256_di();
|
||
else if (tv->type == type_sha512)
|
||
di = ccsha512_di();
|
||
else
|
||
abort();
|
||
|
||
byteBuffer ikm = hexStringToBytes(tv->ikm);
|
||
byteBuffer salt = hexStringToBytes(tv->salt);
|
||
byteBuffer info = hexStringToBytes(tv->info);
|
||
byteBuffer prkActual = mallocByteBuffer(di->output_size);
|
||
byteBuffer prkExpected = hexStringToBytes(tv->prk);
|
||
byteBuffer okmDecoupledActual = mallocByteBuffer(tv->len);
|
||
byteBuffer okmActual = mallocByteBuffer(tv->len);
|
||
byteBuffer okmExpected = hexStringToBytes(tv->okm);
|
||
|
||
// If the test vector has known answers for the Extract and Expand steps, use them.
|
||
if (prkExpected->len > 0) {
|
||
err =
|
||
cchkdf_extract(di, salt->len, salt->bytes, ikm->len, ikm->bytes, prkActual->bytes);
|
||
ok(!err, "cchkdf_extract failed");
|
||
ok(bytesAreEqual(prkActual, prkExpected), "PRK expected does not equal actual");
|
||
|
||
err = cchkdf_expand(di,
|
||
prkActual->len,
|
||
prkActual->bytes,
|
||
info->len,
|
||
info->bytes,
|
||
okmActual->len,
|
||
okmDecoupledActual->bytes);
|
||
ok(!err, "cchkdf_expand failed");
|
||
ok(bytesAreEqual(okmDecoupledActual, okmExpected), "Output key does not equal actual");
|
||
}
|
||
|
||
err = cchkdf(di,
|
||
ikm->len,
|
||
ikm->bytes,
|
||
salt->len,
|
||
salt->bytes,
|
||
info->len,
|
||
info->bytes,
|
||
okmActual->len,
|
||
okmActual->bytes);
|
||
ok(!err, "check return value");
|
||
ok(bytesAreEqual(okmActual, okmExpected), "compare memory of answer");
|
||
|
||
free(ikm);
|
||
free(salt);
|
||
free(info);
|
||
free(okmActual);
|
||
free(okmExpected);
|
||
free(okmDecoupledActual);
|
||
free(prkActual);
|
||
free(prkExpected);
|
||
}
|
||
return 0;
|
||
}
|
||
#endif // CCHKDFTEST
|