Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2015 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include "hkdf.h" |
| 18 | |
| 19 | #include <gtest/gtest.h> |
| 20 | #include <string.h> |
| 21 | |
Shawn Willden | b6837e7 | 2015-05-16 09:20:59 -0600 | [diff] [blame] | 22 | #include "android_keymaster_test_utils.h" |
Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 23 | |
| 24 | using std::string; |
| 25 | |
Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 26 | namespace keymaster { |
| 27 | |
| 28 | namespace test { |
| 29 | |
| 30 | struct HkdfTest { |
| 31 | const char* key_hex; |
| 32 | const char* salt_hex; |
| 33 | const char* info_hex; |
| 34 | const char* output_hex; |
| 35 | }; |
| 36 | |
| 37 | // These test cases are taken from |
| 38 | // https://tools.ietf.org/html/rfc5869#appendix-A. |
| 39 | static const HkdfTest kHkdfTests[] = { |
| 40 | { |
| 41 | "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", "000102030405060708090a0b0c", |
| 42 | "f0f1f2f3f4f5f6f7f8f9", |
| 43 | "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5" |
| 44 | "b887185865", |
| 45 | }, |
| 46 | { |
| 47 | "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021222324" |
| 48 | "25262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40414243444546474849" |
| 49 | "4a4b4c4d4e4f", |
| 50 | "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f8081828384" |
| 51 | "85868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9" |
| 52 | "aaabacadaeaf", |
| 53 | "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4" |
| 54 | "d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9" |
| 55 | "fafbfcfdfeff", |
| 56 | "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99ca" |
| 57 | "c7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c" |
| 58 | "01d5c1f3434f1d87", |
| 59 | }, |
| 60 | { |
| 61 | "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", "", "", |
| 62 | "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395fa" |
| 63 | "a4b61a96c8", |
| 64 | }, |
| 65 | }; |
| 66 | |
| 67 | TEST(HkdfTest, Hkdf) { |
Thai Duong | 4199898 | 2015-03-25 20:14:57 -0700 | [diff] [blame^] | 68 | for (auto& test : kHkdfTests) { |
Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 69 | const string key = hex2str(test.key_hex); |
| 70 | const string salt = hex2str(test.salt_hex); |
| 71 | const string info = hex2str(test.info_hex); |
| 72 | const string expected = hex2str(test.output_hex); |
Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 73 | // We set the key_length to the length of the expected output and then take |
| 74 | // the result. |
Thai Duong | 4199898 | 2015-03-25 20:14:57 -0700 | [diff] [blame^] | 75 | Rfc5869Sha256Kdf hkdf; |
| 76 | ASSERT_TRUE(hkdf.Init(reinterpret_cast<const uint8_t*>(key.data()), key.size(), |
| 77 | reinterpret_cast<const uint8_t*>(salt.data()), salt.size(), |
| 78 | reinterpret_cast<const uint8_t*>(info.data()), info.size(), |
| 79 | expected.size())); |
| 80 | |
Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 81 | Buffer secret_key; |
Thai Duong | 60eebdc | 2015-03-25 17:20:24 -0700 | [diff] [blame] | 82 | bool result = hkdf.secret_key(&secret_key); |
| 83 | ASSERT_TRUE(result); |
Thai Duong | 7689ed6 | 2015-03-20 16:50:18 -0700 | [diff] [blame] | 84 | ASSERT_EQ(expected.size(), secret_key.available_read()); |
| 85 | EXPECT_EQ(0, memcmp(expected.data(), secret_key.peek_read(), expected.size())); |
| 86 | } |
| 87 | } |
| 88 | |
| 89 | } // namespace test |
| 90 | } // namespace keymaster |