blob: f38545c6aea0b19b175863d2f79c1bd6958090e1 [file] [log] [blame]
Thomas Fossati656864b2016-07-17 08:51:22 +01001/* BEGIN_HEADER */
2#include "mbedtls/hkdf.h"
3/* END_HEADER */
4
5/* BEGIN_DEPENDENCIES
6 * depends_on:MBEDTLS_HKDF_C
7 * END_DEPENDENCIES
8 */
9
10/* BEGIN_CASE */
11void test_hkdf( int md_alg, char *hex_ikm_string, char *hex_salt_string,
12 char *hex_info_string, char *hex_okm_string )
13{
14 int ret;
15 size_t ikm_len, salt_len, info_len, okm_len;
16 unsigned char ikm[1024] = { '\0' };
17 unsigned char salt[1024] = { '\0' };
18 unsigned char info[1024] = { '\0' };
19 unsigned char expected_okm[1024] = { '\0' };
20 unsigned char okm[1024] = { '\0' };
21 unsigned char okm_string[1000] = { '\0' };
22
23 const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
24 TEST_ASSERT( md != NULL );
25
26 ikm_len = unhexify( ikm, hex_ikm_string );
27 salt_len = unhexify( salt, hex_salt_string );
28 info_len = unhexify( info, hex_info_string );
29 okm_len = unhexify( expected_okm, hex_okm_string );
30
31 ret = mbedtls_hkdf( md, salt, salt_len, ikm, ikm_len, info, info_len, okm,
32 okm_len);
33 TEST_ASSERT( ret == 0 );
34
35 // Run hexify on it so that it looks nicer if the assertion fails
36 hexify( okm_string, okm, okm_len );
37 TEST_ASSERT( !strcmp( (char *)okm_string, hex_okm_string ) );
38}
39/* END_CASE */
Jaeden Amero36189622018-05-23 18:55:47 +010040
41/* BEGIN_CASE */
42void test_hkdf_extract( int md_alg, char *hex_ikm_string,
43 char *hex_salt_string, char *hex_prk_string )
44{
45 int ret;
46 unsigned char *ikm = NULL;
47 unsigned char *salt = NULL;
48 unsigned char *prk = NULL;
49 unsigned char *output_prk = NULL;
50 size_t ikm_len, salt_len, prk_len, output_prk_len;
51
52 const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
53 TEST_ASSERT( md != NULL );
54
55 output_prk_len = mbedtls_md_get_size( md );
56 output_prk = mbedtls_calloc( 1, output_prk_len );
57
58 ikm = unhexify_alloc( hex_ikm_string, &ikm_len );
59 salt = unhexify_alloc( hex_salt_string, &salt_len );
60 prk = unhexify_alloc( hex_prk_string, &prk_len );
61 TEST_ASSERT( prk_len == output_prk_len );
62
63 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, output_prk );
64 TEST_ASSERT( ret == 0 );
65
66 TEST_ASSERT( !memcmp( output_prk, prk, prk_len ) );
67
68exit:
69 mbedtls_free(ikm);
70 mbedtls_free(salt);
71 mbedtls_free(prk);
72 mbedtls_free(output_prk);
73}
74/* END_CASE */
75
76/* BEGIN_CASE */
77void test_hkdf_expand( int md_alg, char *hex_info_string,
78 char *hex_prk_string, char *hex_okm_string )
79{
80 enum { OKM_LEN = 1024 };
81 int ret;
82 unsigned char *info = NULL;
83 unsigned char *prk = NULL;
84 unsigned char *okm = NULL;
85 unsigned char *output_okm = NULL;
86 size_t info_len, prk_len, okm_len;
87
88 const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
89 TEST_ASSERT( md != NULL );
90
91 output_okm = mbedtls_calloc( OKM_LEN, 1 );
92
93 prk = unhexify_alloc( hex_prk_string, &prk_len );
94 info = unhexify_alloc( hex_info_string, &info_len );
95 okm = unhexify_alloc( hex_okm_string, &okm_len );
96 TEST_ASSERT( prk_len == mbedtls_md_get_size( md ) );
97 TEST_ASSERT( okm_len < OKM_LEN );
98
99 ret = mbedtls_hkdf_expand( md, prk, prk_len, info, info_len,
100 output_okm, OKM_LEN );
101 TEST_ASSERT( ret == 0 );
102 TEST_ASSERT( !memcmp( output_okm, okm, okm_len ) );
103
104exit:
105 mbedtls_free(info);
106 mbedtls_free(prk);
107 mbedtls_free(okm);
108 mbedtls_free(output_okm);
109}
110/* END_CASE */