blob: 0412703d4f9e4ac89d8f3241cd00296413233f31 [file] [log] [blame]
[email protected]48b581d2013-02-23 06:47:221// Copyright (c) 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "crypto/hkdf.h"
6
avidd373b8b2015-12-21 21:34:437#include <stddef.h>
8#include <stdint.h>
9
[email protected]48b581d2013-02-23 06:47:2210#include <string>
11
avidd373b8b2015-12-21 21:34:4312#include "base/macros.h"
[email protected]48b581d2013-02-23 06:47:2213#include "base/strings/string_number_conversions.h"
14#include "testing/gtest/include/gtest/gtest.h"
15
16using crypto::HKDF;
17
18namespace test {
19namespace {
20
21struct HKDFTest {
22 const char* key_hex;
23 const char* salt_hex;
24 const char* info_hex;
25 const char* output_hex;
26};
27
28// These test cases are taken from
29// https://tools.ietf.org/html/rfc5869#appendix-A.
30static const HKDFTest kHKDFTests[] = {{
31 "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
32 "000102030405060708090a0b0c",
33 "f0f1f2f3f4f5f6f7f8f9",
34 "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5"
35 "b887185865",
36 }, {
37 "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021222324"
38 "25262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40414243444546474849"
39 "4a4b4c4d4e4f",
40 "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f8081828384"
41 "85868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9"
42 "aaabacadaeaf",
43 "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4"
44 "d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9"
45 "fafbfcfdfeff",
46 "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99ca"
47 "c7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c"
48 "01d5c1f3434f1d87",
49 }, {
50 "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
51 "",
52 "",
53 "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395fa"
54 "a4b61a96c8",
55 },
56};
57
58TEST(HKDFTest, HKDF) {
59 for (size_t i = 0; i < arraysize(kHKDFTests); i++) {
60 const HKDFTest& test(kHKDFTests[i]);
61 SCOPED_TRACE(i);
62
avidd373b8b2015-12-21 21:34:4363 std::vector<uint8_t> data;
[email protected]48b581d2013-02-23 06:47:2264 ASSERT_TRUE(base::HexStringToBytes(test.key_hex, &data));
65 const std::string key(reinterpret_cast<char*>(&data[0]), data.size());
66
67 data.clear();
68 // |salt_hex| is optional and may be empty.
69 std::string salt(test.salt_hex);
70 if (!salt.empty()) {
71 ASSERT_TRUE(base::HexStringToBytes(salt, &data));
72 salt.assign(reinterpret_cast<char*>(&data[0]), data.size());
73 }
74
75 data.clear();
76 // |info_hex| is optional and may be empty.
77 std::string info(test.info_hex);
78 if (!info.empty()) {
79 ASSERT_TRUE(base::HexStringToBytes(info, &data));
80 info.assign(reinterpret_cast<char*>(&data[0]), data.size());
81 }
82
83 data.clear();
84 ASSERT_TRUE(base::HexStringToBytes(test.output_hex, &data));
85 const std::string expected(reinterpret_cast<char*>(&data[0]), data.size());
86
87 // We set the key_length to the length of the expected output and then take
88 // the result from the first key, which is the client write key.
[email protected]2fe8b632014-07-31 11:36:3789 HKDF hkdf(key, salt, info, expected.size(), 0, 0);
[email protected]48b581d2013-02-23 06:47:2290
91 ASSERT_EQ(expected.size(), hkdf.client_write_key().size());
92 EXPECT_EQ(0, memcmp(expected.data(), hkdf.client_write_key().data(),
93 expected.size()));
94 }
95}
96
97} // namespace
98} // namespace test