| // Copyright 2022 Google LLC |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| /// Tests for both openssl and rust-crypto crypto_provider impls |
| use crypto_provider::hkdf::Hkdf as _; |
| use crypto_provider::CryptoProvider; |
| use crypto_provider_openssl::Openssl; |
| use crypto_provider_rustcrypto::RustCrypto; |
| use hex_literal::hex; |
| use std::iter; |
| |
| struct Test<'a> { |
| ikm: &'a [u8], |
| salt: &'a [u8], |
| info: &'a [u8], |
| okm: &'a [u8], |
| } |
| |
| #[test] |
| fn basic_test_rc() { |
| basic_test_hkdf::<RustCrypto>(); |
| } |
| |
| #[test] |
| fn basic_test_openssl() { |
| basic_test_hkdf::<Openssl>(); |
| } |
| |
| /// data taken from sample code in Readme of crates.io page |
| fn basic_test_hkdf<C: CryptoProvider>() { |
| let ikm = hex!("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"); |
| let salt = hex!("000102030405060708090a0b0c"); |
| let info = hex!("f0f1f2f3f4f5f6f7f8f9"); |
| |
| let hk = C::HkdfSha256::new(Some(&salt[..]), &ikm); |
| let mut okm = [0u8; 42]; |
| hk.expand(&info, &mut okm) |
| .expect("42 is a valid length for Sha256 to output"); |
| |
| let expected = hex!( |
| " |
| 3cb25f25faacd57a90434f64d0362f2a |
| 2d2d0a90cf1a5a4c5db02d56ecc4c5bf |
| 34007208d5b887185865 |
| " |
| ); |
| assert_eq!(okm, expected); |
| } |
| |
| #[test] |
| fn rfc5869_sha256_rc() { |
| test_rfc5869_sha256::<RustCrypto>(); |
| } |
| |
| #[test] |
| fn rfc5869_sha256_openssl() { |
| test_rfc5869_sha256::<Openssl>(); |
| } |
| |
| // Test Vectors from https://tools.ietf.org/html/rfc5869. |
| #[rustfmt::skip] |
| fn test_rfc5869_sha256<C: CryptoProvider>() { |
| let tests = [ |
| Test { |
| // Test Case 1 |
| ikm: &hex!("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"), |
| salt: &hex!("000102030405060708090a0b0c"), |
| info: &hex!("f0f1f2f3f4f5f6f7f8f9"), |
| okm: &hex!(" |
| 3cb25f25faacd57a90434f64d0362f2a |
| 2d2d0a90cf1a5a4c5db02d56ecc4c5bf |
| 34007208d5b887185865 |
| "), |
| }, |
| Test { |
| // Test Case 2 |
| ikm: &hex!(" |
| 000102030405060708090a0b0c0d0e0f |
| 101112131415161718191a1b1c1d1e1f |
| 202122232425262728292a2b2c2d2e2f |
| 303132333435363738393a3b3c3d3e3f |
| 404142434445464748494a4b4c4d4e4f |
| "), |
| salt: &hex!(" |
| 606162636465666768696a6b6c6d6e6f |
| 707172737475767778797a7b7c7d7e7f |
| 808182838485868788898a8b8c8d8e8f |
| 909192939495969798999a9b9c9d9e9f |
| a0a1a2a3a4a5a6a7a8a9aaabacadaeaf |
| "), |
| info: &hex!(" |
| b0b1b2b3b4b5b6b7b8b9babbbcbdbebf |
| c0c1c2c3c4c5c6c7c8c9cacbcccdcecf |
| d0d1d2d3d4d5d6d7d8d9dadbdcdddedf |
| e0e1e2e3e4e5e6e7e8e9eaebecedeeef |
| f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff |
| "), |
| okm: &hex!(" |
| b11e398dc80327a1c8e7f78c596a4934 |
| 4f012eda2d4efad8a050cc4c19afa97c |
| 59045a99cac7827271cb41c65e590e09 |
| da3275600c2f09b8367793a9aca3db71 |
| cc30c58179ec3e87c14c01d5c1f3434f |
| 1d87 |
| "), |
| }, |
| Test { |
| // Test Case 3 |
| ikm: &hex!("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"), |
| salt: &hex!(""), |
| info: &hex!(""), |
| okm: &hex!(" |
| 8da4e775a563c18f715f802a063c5a31 |
| b8a11f5c5ee1879ec3454e5f3c738d2d |
| 9d201395faa4b61a96c8 |
| "), |
| }, |
| ]; |
| for Test { ikm, salt, info, okm } in tests.iter() { |
| let salt = if salt.is_empty() { |
| None |
| } else { |
| Some(&salt[..]) |
| }; |
| let hkdf = C::HkdfSha256::new(salt, ikm); |
| let mut okm2 = vec![0u8; okm.len()]; |
| assert!(hkdf.expand(&info[..], &mut okm2).is_ok()); |
| assert_eq!(okm2[..], okm[..]); |
| } |
| } |
| |
| const MAX_SHA256_LENGTH: usize = 255 * (256 / 8); // =8160 |
| |
| #[test] |
| fn lengths_rc() { |
| test_lengths::<RustCrypto>() |
| } |
| |
| #[test] |
| fn lengths_openssl() { |
| test_lengths::<Openssl>() |
| } |
| |
| fn test_lengths<C: CryptoProvider>() { |
| let hkdf = C::HkdfSha256::new(None, &[]); |
| let mut longest = vec![0u8; MAX_SHA256_LENGTH]; |
| assert!(hkdf.expand(&[], &mut longest).is_ok()); |
| // Runtime is O(length), so exhaustively testing all legal lengths |
| // would take too long (at least without --release). Only test a |
| // subset: the first 500, the last 10, and every 100th in between. |
| // 0 is an invalid key length for openssl, so start at 1 |
| let lengths = (1..MAX_SHA256_LENGTH + 1) |
| .filter(|&len| !(500..=MAX_SHA256_LENGTH - 10).contains(&len) || len % 100 == 0); |
| |
| for length in lengths { |
| let mut okm = vec![0u8; length]; |
| |
| assert!(hkdf.expand(&[], &mut okm).is_ok()); |
| assert_eq!(okm.len(), length); |
| assert_eq!(okm[..], longest[..length]); |
| } |
| } |
| |
| #[test] |
| fn max_length_rc() { |
| test_max_length::<RustCrypto>(); |
| } |
| |
| #[test] |
| fn max_length_openssl() { |
| test_max_length::<Openssl>(); |
| } |
| |
| fn test_max_length<C: CryptoProvider>() { |
| let hkdf = C::HkdfSha256::new(Some(&[]), &[]); |
| let mut okm = vec![0u8; MAX_SHA256_LENGTH]; |
| assert!(hkdf.expand(&[], &mut okm).is_ok()); |
| } |
| |
| #[test] |
| fn max_length_exceeded_rc() { |
| test_max_length_exceeded::<RustCrypto>(); |
| } |
| |
| #[test] |
| fn max_length_exceeded_openssl() { |
| test_max_length_exceeded::<Openssl>(); |
| } |
| |
| fn test_max_length_exceeded<C: CryptoProvider>() { |
| let hkdf = C::HkdfSha256::new(Some(&[]), &[]); |
| let mut okm = vec![0u8; MAX_SHA256_LENGTH + 1]; |
| assert!(hkdf.expand(&[], &mut okm).is_err()); |
| } |
| |
| #[test] |
| fn unsupported_length_rc() { |
| test_unsupported_length::<RustCrypto>(); |
| } |
| |
| #[test] |
| fn unsupported_length_openssl() { |
| test_unsupported_length::<Openssl>(); |
| } |
| |
| fn test_unsupported_length<C: CryptoProvider>() { |
| let hkdf = C::HkdfSha256::new(Some(&[]), &[]); |
| let mut okm = vec![0u8; 90000]; |
| assert!(hkdf.expand(&[], &mut okm).is_err()); |
| } |
| |
| #[test] |
| fn expand_multi_info_rc() { |
| test_expand_multi_info::<RustCrypto>(); |
| } |
| |
| #[test] |
| fn expand_multi_info_openssl() { |
| test_expand_multi_info::<Openssl>(); |
| } |
| |
| fn test_expand_multi_info<C: CryptoProvider>() { |
| let info_components = &[ |
| &b"09090909090909090909090909090909090909090909"[..], |
| &b"8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a8a"[..], |
| &b"0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0"[..], |
| &b"4c4c4c4c4c4c4c4c4c4c4c4c4c4c4c4c4c4c4"[..], |
| &b"1d1d1d1d1d1d1d1d1d1d1d1d1d1d1d1d1d"[..], |
| ]; |
| |
| let hkdf = C::HkdfSha256::new(None, b"some ikm here"); |
| |
| // Compute HKDF-Expand on the concatenation of all the info components |
| let mut oneshot_res = [0u8; 16]; |
| hkdf.expand(&info_components.concat(), &mut oneshot_res) |
| .unwrap(); |
| |
| // Now iteratively join the components of info_components until it's all 1 component. The value |
| // of HKDF-Expand should be the same throughout |
| let mut num_concatted = 0; |
| let mut info_head = Vec::new(); |
| |
| while num_concatted < info_components.len() { |
| info_head.extend(info_components[num_concatted]); |
| |
| // Build the new input to be the info head followed by the remaining components |
| let input: Vec<&[u8]> = iter::once(info_head.as_slice()) |
| .chain(info_components.iter().cloned().skip(num_concatted + 1)) |
| .collect(); |
| |
| // Compute and compare to the one-shot answer |
| let mut multipart_res = [0u8; 16]; |
| hkdf.expand_multi_info(&input, &mut multipart_res).unwrap(); |
| assert_eq!(multipart_res, oneshot_res); |
| num_concatted += 1; |
| } |
| } |
| |
| #[test] |
| fn hkdf_sha_256_wycheproof_test_vectors_rc() { |
| run_hkdf_test_vectors::<<RustCrypto as CryptoProvider>::HkdfSha256>(HashAlg::Sha256) |
| } |
| |
| #[test] |
| fn hkdf_sha_512_wycheproof_test_vectors_rc() { |
| run_hkdf_test_vectors::<<RustCrypto as CryptoProvider>::HkdfSha512>(HashAlg::Sha512) |
| } |
| |
| #[test] |
| fn hkdf_sha_256_wycheproof_test_vectors_openssl() { |
| run_hkdf_test_vectors::<<Openssl as CryptoProvider>::HkdfSha256>(HashAlg::Sha256) |
| } |
| |
| #[test] |
| fn hkdf_sha_512_wycheproof_test_vectors_openssl() { |
| run_hkdf_test_vectors::<<Openssl as CryptoProvider>::HkdfSha512>(HashAlg::Sha512) |
| } |
| |
| enum HashAlg { |
| Sha256, |
| Sha512, |
| } |
| |
| fn run_hkdf_test_vectors<K: crypto_provider::hkdf::Hkdf>(hash: HashAlg) { |
| let test_name = match hash { |
| HashAlg::Sha256 => wycheproof::hkdf::TestName::HkdfSha256, |
| HashAlg::Sha512 => wycheproof::hkdf::TestName::HkdfSha512, |
| }; |
| |
| let test_set = |
| wycheproof::hkdf::TestSet::load(test_name).expect("should be able to load test set"); |
| for test_group in test_set.test_groups { |
| for test in test_group.tests { |
| let ikm = test.ikm; |
| let salt = test.salt; |
| let info = test.info; |
| let okm = test.okm; |
| let tc_id = test.tc_id; |
| if let Some(desc) = run_test::<K>( |
| ikm.as_slice(), |
| salt.as_slice(), |
| info.as_slice(), |
| okm.as_slice(), |
| ) { |
| panic!( |
| "\n\ |
| Failed test {tc_id}: {desc}\n\ |
| ikm:\t{ikm:?}\n\ |
| salt:\t{salt:?}\n\ |
| info:\t{info:?}\n\ |
| okm:\t{okm:?}\n" |
| ); |
| } |
| } |
| } |
| } |
| |
| fn run_test<K: crypto_provider::hkdf::Hkdf>( |
| ikm: &[u8], |
| salt: &[u8], |
| info: &[u8], |
| okm: &[u8], |
| ) -> Option<&'static str> { |
| let prk = K::new(Some(salt), ikm); |
| let mut got_okm = vec![0; okm.len()]; |
| |
| if prk.expand(info, &mut got_okm).is_err() { |
| return Some("prk expand"); |
| } |
| if got_okm != okm { |
| return Some("mismatch in okm"); |
| } |
| None |
| } |