blob: 453d1f5bc9d3c7061537ea0b65e6e461f03f7b9f [file] [log] [blame]
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "crypto/kdf.h"
#include <array>
#include <string>
#include "base/containers/span.h"
#include "base/strings/string_number_conversions.h"
#include "testing/gtest/include/gtest/gtest.h"
using KDFTest = ::testing::Test;
TEST(KDFTest, Pbkdf2HmacSha1KnownAnswers) {
struct TestCase {
std::string password;
std::string salt;
crypto::kdf::Pbkdf2HmacSha1Params params;
size_t len;
const char* result;
};
// RFC 6070 test vectors:
constexpr auto cases = std::to_array<TestCase>({
{"password", "salt", {1}, 20, "0c60c80f961f0e71f3a9b524af6012062fe037a6"},
{"password", "salt", {2}, 20, "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957"},
});
for (const auto& c : cases) {
std::vector<uint8_t> key(c.len);
crypto::kdf::DeriveKeyPbkdf2HmacSha1(
c.params, base::as_byte_span(c.password), base::as_byte_span(c.salt),
key, crypto::SubtlePassKey::ForTesting());
std::vector<uint8_t> result_bytes(c.len);
ASSERT_TRUE(base::HexStringToSpan(c.result, result_bytes));
EXPECT_EQ(key, result_bytes);
}
}
TEST(KDFTest, ScryptKnownAnswers) {
struct TestCase {
std::string password;
std::string salt;
crypto::kdf::ScryptParams params;
size_t len;
const char* result;
};
// RFC 7914 test vectors - note that RFC 7914 does not specify
// max_memory_bytes so we just pass 0 here and let BoringSSL figure it out for
// us.
constexpr auto cases = std::to_array<TestCase>({
{"password",
"NaCl",
{.cost = 1024, .block_size = 8, .parallelization = 16},
64,
"fdbabe1c9d3472007856e7190d01e9fe7c6ad7cbc8237830e77376634b373162"
"2eaf30d92e22a3886ff109279d9830dac727afb94a83ee6d8360cbdfa2cc0640"},
});
for (const auto& c : cases) {
std::vector<uint8_t> key(c.len);
crypto::kdf::DeriveKeyScrypt(c.params, base::as_byte_span(c.password),
base::as_byte_span(c.salt), key,
crypto::SubtlePassKey::ForTesting());
std::vector<uint8_t> result_bytes(c.len);
ASSERT_TRUE(base::HexStringToSpan(c.result, result_bytes));
EXPECT_EQ(key, result_bytes);
}
}
TEST(KDFTest, InvalidScryptParameters) {
constexpr auto cases = std::to_array<crypto::kdf::ScryptParams>({
// cost parameter is not a power of 2
{.cost = 1023, .block_size = 8, .parallelization = 16},
// TODO: others, after we document the exact constraints
});
for (const auto& c : cases) {
std::vector<uint8_t> key(64);
EXPECT_DEATH_IF_SUPPORTED(
crypto::kdf::DeriveKeyScrypt(c, base::as_byte_span("password"),
base::as_byte_span("NaCl"), key,
crypto::SubtlePassKey::ForTesting()),
"");
}
}
TEST(KDFTest, HkdfSha256KnownAnswer) {
// RFC 5869, Appendix A, Test Case 1
// clang-format off
constexpr auto kSecret = std::to_array<uint8_t>({
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
});
constexpr auto kSalt = std::to_array<uint8_t>({
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
0x0c,
});
constexpr auto kInfo = std::to_array<uint8_t>({
0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9,
});
constexpr auto kExpected = std::to_array<uint8_t>({
0x3c, 0xb2, 0x5f, 0x25, 0xfa, 0xac, 0xd5, 0x7a, 0x90, 0x43, 0x4f,
0x64, 0xd0, 0x36, 0x2f, 0x2a, 0x2d, 0x2d, 0x0a, 0x90, 0xcf, 0x1a,
0x5a, 0x4c, 0x5d, 0xb0, 0x2d, 0x56, 0xec, 0xc4, 0xc5, 0xbf, 0x34,
0x00, 0x72, 0x08, 0xd5, 0xb8, 0x87, 0x18, 0x58, 0x65
});
// clang-format on
{
std::array<uint8_t, std::size(kExpected)> out;
crypto::kdf::Hkdf(crypto::hash::kSha256, kSecret, kSalt, kInfo, out);
EXPECT_EQ(kExpected, out);
}
{
auto out = crypto::kdf::Hkdf<std::size(kExpected)>(crypto::hash::kSha256,
kSecret, kSalt, kInfo);
EXPECT_EQ(kExpected, out);
}
}