• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2015 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "hkdf.h"
18 
19 #include <gtest/gtest.h>
20 #include <string.h>
21 
22 #include "android_keymaster_test_utils.h"
23 
24 using std::string;
25 
26 namespace keymaster {
27 
28 namespace test {
29 
30 struct HkdfTest {
31     const char* key_hex;
32     const char* salt_hex;
33     const char* info_hex;
34     const char* output_hex;
35 };
36 
37 // These test cases are taken from
38 // https://tools.ietf.org/html/rfc5869#appendix-A.
39 static const HkdfTest kHkdfTests[] = {
40     {
41         "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", "000102030405060708090a0b0c",
42         "f0f1f2f3f4f5f6f7f8f9",
43         "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5"
44         "b887185865",
45     },
46     {
47         "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021222324"
48         "25262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40414243444546474849"
49         "4a4b4c4d4e4f",
50         "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f8081828384"
51         "85868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9"
52         "aaabacadaeaf",
53         "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4"
54         "d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9"
55         "fafbfcfdfeff",
56         "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99ca"
57         "c7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c"
58         "01d5c1f3434f1d87",
59     },
60     {
61         "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", "", "",
62         "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395fa"
63         "a4b61a96c8",
64     },
65 };
66 
TEST(HkdfTest,Hkdf)67 TEST(HkdfTest, Hkdf) {
68     for (size_t i = 0; i < 3; i++) {
69         const HkdfTest& test(kHkdfTests[i]);
70         const string key = hex2str(test.key_hex);
71         const string salt = hex2str(test.salt_hex);
72         const string info = hex2str(test.info_hex);
73         const string expected = hex2str(test.output_hex);
74         keymaster_error_t error;
75         // We set the key_length to the length of the expected output and then take
76         // the result.
77         Rfc5869HmacSha256Kdf hkdf(reinterpret_cast<const uint8_t*>(key.data()), key.size(),
78                                   reinterpret_cast<const uint8_t*>(salt.data()), salt.size(),
79                                   reinterpret_cast<const uint8_t*>(info.data()), info.size(),
80                                   expected.size(), &error);
81         ASSERT_EQ(error, KM_ERROR_OK);
82         Buffer secret_key;
83         bool result = hkdf.secret_key(&secret_key);
84         ASSERT_TRUE(result);
85         ASSERT_EQ(expected.size(), secret_key.available_read());
86         EXPECT_EQ(0, memcmp(expected.data(), secret_key.peek_read(), expected.size()));
87     }
88 }
89 
90 }  // namespace test
91 }  // namespace keymaster
92