blob: 0aefca5615513646be3ab800db21614191f53fa0 [file] [log] [blame]
Thomas Fossati656864b2016-07-17 08:51:22 +01001/* BEGIN_HEADER */
2#include "mbedtls/hkdf.h"
Jaeden Amero10e0e4d2018-05-23 19:44:26 +01003#include "mbedtls/md_internal.h"
Thomas Fossati656864b2016-07-17 08:51:22 +01004/* END_HEADER */
5
6/* BEGIN_DEPENDENCIES
7 * depends_on:MBEDTLS_HKDF_C
8 * END_DEPENDENCIES
9 */
10
11/* BEGIN_CASE */
12void test_hkdf( int md_alg, char *hex_ikm_string, char *hex_salt_string,
Ronald Cron40308332020-06-25 10:26:42 +020013 char *hex_info_string, char *hex_expected_okm_string )
Thomas Fossati656864b2016-07-17 08:51:22 +010014{
15 int ret;
Ronald Cron40308332020-06-25 10:26:42 +020016 size_t ikm_len, salt_len, info_len, expected_okm_len;
Ron Eldor732ccc42018-11-13 18:59:17 +020017 unsigned char ikm[128] = { '\0' };
18 unsigned char salt[128] = { '\0' };
19 unsigned char info[128] = { '\0' };
Ron Eldorae3a6312018-11-14 20:22:03 +020020 unsigned char expected_okm[128] = { '\0' };
21 unsigned char okm[128] = { '\0' };
Ron Eldor1a3a7e52019-01-28 15:01:53 +020022 /*
Ronald Cron40308332020-06-25 10:26:42 +020023 * okm_string is the ASCII string representation of okm,
Ron Eldor17233f52019-01-28 15:18:15 +020024 * so its size is twice the size of okm, and an extra null-termination.
Ron Eldor1a3a7e52019-01-28 15:01:53 +020025 */
Ronald Cron40308332020-06-25 10:26:42 +020026 unsigned char okm_string[257] = { '\0' };
Thomas Fossati656864b2016-07-17 08:51:22 +010027
28 const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
29 TEST_ASSERT( md != NULL );
30
Ronald Cron72d628f2020-06-08 17:05:57 +020031 ikm_len = mbedtls_test_unhexify( ikm, hex_ikm_string );
32 salt_len = mbedtls_test_unhexify( salt, hex_salt_string );
33 info_len = mbedtls_test_unhexify( info, hex_info_string );
Ronald Cron40308332020-06-25 10:26:42 +020034 expected_okm_len = mbedtls_test_unhexify( expected_okm,
35 hex_expected_okm_string );
36
37 TEST_ASSERT( expected_okm_len <= sizeof( okm ) );
Thomas Fossati656864b2016-07-17 08:51:22 +010038
39 ret = mbedtls_hkdf( md, salt, salt_len, ikm, ikm_len, info, info_len, okm,
Ronald Cron40308332020-06-25 10:26:42 +020040 expected_okm_len);
Thomas Fossati656864b2016-07-17 08:51:22 +010041 TEST_ASSERT( ret == 0 );
42
Ronald Cronff31eab2020-06-08 17:20:59 +020043 /*
44 * Run mbedtls_test_hexify on it so that it looks nicer if the assertion
45 * fails.
46 */
Ronald Cron40308332020-06-25 10:26:42 +020047 mbedtls_test_hexify( okm_string, okm, expected_okm_len );
48 TEST_ASSERT( !strcmp( (char *)okm_string, hex_expected_okm_string ) );
Thomas Fossati656864b2016-07-17 08:51:22 +010049}
50/* END_CASE */
Jaeden Amero36189622018-05-23 18:55:47 +010051
52/* BEGIN_CASE */
53void test_hkdf_extract( int md_alg, char *hex_ikm_string,
54 char *hex_salt_string, char *hex_prk_string )
55{
56 int ret;
57 unsigned char *ikm = NULL;
58 unsigned char *salt = NULL;
59 unsigned char *prk = NULL;
60 unsigned char *output_prk = NULL;
61 size_t ikm_len, salt_len, prk_len, output_prk_len;
62
63 const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
64 TEST_ASSERT( md != NULL );
65
66 output_prk_len = mbedtls_md_get_size( md );
67 output_prk = mbedtls_calloc( 1, output_prk_len );
68
Ronald Crona256c702020-06-10 10:53:11 +020069 ikm = mbedtls_test_unhexify_alloc( hex_ikm_string, &ikm_len );
70 salt = mbedtls_test_unhexify_alloc( hex_salt_string, &salt_len );
71 prk = mbedtls_test_unhexify_alloc( hex_prk_string, &prk_len );
Jaeden Amero36189622018-05-23 18:55:47 +010072 TEST_ASSERT( prk_len == output_prk_len );
73
74 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, output_prk );
75 TEST_ASSERT( ret == 0 );
76
77 TEST_ASSERT( !memcmp( output_prk, prk, prk_len ) );
78
79exit:
80 mbedtls_free(ikm);
81 mbedtls_free(salt);
82 mbedtls_free(prk);
83 mbedtls_free(output_prk);
84}
85/* END_CASE */
86
87/* BEGIN_CASE */
88void test_hkdf_expand( int md_alg, char *hex_info_string,
89 char *hex_prk_string, char *hex_okm_string )
90{
91 enum { OKM_LEN = 1024 };
92 int ret;
93 unsigned char *info = NULL;
94 unsigned char *prk = NULL;
95 unsigned char *okm = NULL;
96 unsigned char *output_okm = NULL;
97 size_t info_len, prk_len, okm_len;
98
99 const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
100 TEST_ASSERT( md != NULL );
101
102 output_okm = mbedtls_calloc( OKM_LEN, 1 );
103
Ronald Crona256c702020-06-10 10:53:11 +0200104 prk = mbedtls_test_unhexify_alloc( hex_prk_string, &prk_len );
105 info = mbedtls_test_unhexify_alloc( hex_info_string, &info_len );
106 okm = mbedtls_test_unhexify_alloc( hex_okm_string, &okm_len );
Jaeden Amero36189622018-05-23 18:55:47 +0100107 TEST_ASSERT( prk_len == mbedtls_md_get_size( md ) );
108 TEST_ASSERT( okm_len < OKM_LEN );
109
110 ret = mbedtls_hkdf_expand( md, prk, prk_len, info, info_len,
111 output_okm, OKM_LEN );
112 TEST_ASSERT( ret == 0 );
113 TEST_ASSERT( !memcmp( output_okm, okm, okm_len ) );
114
115exit:
116 mbedtls_free(info);
117 mbedtls_free(prk);
118 mbedtls_free(okm);
119 mbedtls_free(output_okm);
120}
121/* END_CASE */
Jaeden Amero10e0e4d2018-05-23 19:44:26 +0100122
123/* BEGIN_CASE */
124void test_hkdf_extract_ret( int hash_len, int ret )
125{
126 int output_ret;
127 unsigned char *salt = NULL;
128 unsigned char *ikm = NULL;
129 unsigned char *prk = NULL;
130 size_t salt_len, ikm_len;
131 struct mbedtls_md_info_t fake_md_info;
132
133 memset( &fake_md_info, 0, sizeof( fake_md_info ) );
134 fake_md_info.type = MBEDTLS_MD_NONE;
135 fake_md_info.size = hash_len;
136
137 prk = mbedtls_calloc( MBEDTLS_MD_MAX_SIZE, 1 );
138 salt_len = 0;
139 ikm_len = 0;
140
141 output_ret = mbedtls_hkdf_extract( &fake_md_info, salt, salt_len,
142 ikm, ikm_len, prk );
143 TEST_ASSERT( output_ret == ret );
144
145exit:
146 mbedtls_free(prk);
147}
148/* END_CASE */
149
150/* BEGIN_CASE */
151void test_hkdf_expand_ret( int hash_len, int prk_len, int okm_len, int ret )
152{
153 int output_ret;
154 unsigned char *info = NULL;
155 unsigned char *prk = NULL;
156 unsigned char *okm = NULL;
157 size_t info_len;
158 struct mbedtls_md_info_t fake_md_info;
159
160 memset( &fake_md_info, 0, sizeof( fake_md_info ) );
161 fake_md_info.type = MBEDTLS_MD_NONE;
162 fake_md_info.size = hash_len;
163
164 info_len = 0;
165
166 if (prk_len > 0)
167 prk = mbedtls_calloc( prk_len, 1 );
168
169 if (okm_len > 0)
170 okm = mbedtls_calloc( okm_len, 1 );
171
172 output_ret = mbedtls_hkdf_expand( &fake_md_info, prk, prk_len,
173 info, info_len, okm, okm_len );
174 TEST_ASSERT( output_ret == ret );
175
176exit:
177 mbedtls_free(prk);
178 mbedtls_free(okm);
179}
180/* END_CASE */