1*e7b1675dSTing-Kang Chang // Copyright 2017 Google Inc.
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ////////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #include "tink/subtle/hkdf.h"
18*e7b1675dSTing-Kang Chang
19*e7b1675dSTing-Kang Chang #include <string>
20*e7b1675dSTing-Kang Chang #include <vector>
21*e7b1675dSTing-Kang Chang
22*e7b1675dSTing-Kang Chang #include "gtest/gtest.h"
23*e7b1675dSTing-Kang Chang #include "absl/strings/escaping.h"
24*e7b1675dSTing-Kang Chang #include "tink/subtle/common_enums.h"
25*e7b1675dSTing-Kang Chang #include "tink/util/secret_data.h"
26*e7b1675dSTing-Kang Chang #include "tink/util/status.h"
27*e7b1675dSTing-Kang Chang #include "tink/util/statusor.h"
28*e7b1675dSTing-Kang Chang
29*e7b1675dSTing-Kang Chang namespace crypto {
30*e7b1675dSTing-Kang Chang namespace tink {
31*e7b1675dSTing-Kang Chang namespace subtle {
32*e7b1675dSTing-Kang Chang namespace {
33*e7b1675dSTing-Kang Chang
34*e7b1675dSTing-Kang Chang class HkdfTest : public ::testing::Test {};
35*e7b1675dSTing-Kang Chang
36*e7b1675dSTing-Kang Chang struct TestVector {
37*e7b1675dSTing-Kang Chang HashType hash_type;
38*e7b1675dSTing-Kang Chang std::string ikm_hex;
39*e7b1675dSTing-Kang Chang std::string salt_hex;
40*e7b1675dSTing-Kang Chang std::string info_hex;
41*e7b1675dSTing-Kang Chang size_t out_len;
42*e7b1675dSTing-Kang Chang std::string out_key_hex;
43*e7b1675dSTing-Kang Chang };
44*e7b1675dSTing-Kang Chang
45*e7b1675dSTing-Kang Chang // Tests vectors from RFC 5869.
46*e7b1675dSTing-Kang Chang static const std::vector<TestVector> test_vector(
47*e7b1675dSTing-Kang Chang {{
48*e7b1675dSTing-Kang Chang HashType::SHA256, "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
49*e7b1675dSTing-Kang Chang "000102030405060708090a0b0c", "f0f1f2f3f4f5f6f7f8f9", 42,
50*e7b1675dSTing-Kang Chang "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007"
51*e7b1675dSTing-Kang Chang "208"
52*e7b1675dSTing-Kang Chang "d5b887185865",
53*e7b1675dSTing-Kang Chang },
54*e7b1675dSTing-Kang Chang {
55*e7b1675dSTing-Kang Chang HashType::SHA256,
56*e7b1675dSTing-Kang Chang "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"
57*e7b1675dSTing-Kang Chang "202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f"
58*e7b1675dSTing-Kang Chang "404142434445464748494a4b4c4d4e4f",
59*e7b1675dSTing-Kang Chang "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f"
60*e7b1675dSTing-Kang Chang "808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f"
61*e7b1675dSTing-Kang Chang "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
62*e7b1675dSTing-Kang Chang "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf"
63*e7b1675dSTing-Kang Chang "d0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef"
64*e7b1675dSTing-Kang Chang "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
65*e7b1675dSTing-Kang Chang 82,
66*e7b1675dSTing-Kang Chang "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c"
67*e7b1675dSTing-Kang Chang "59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71"
68*e7b1675dSTing-Kang Chang "cc30c58179ec3e87c14c01d5c1f3434f1d87",
69*e7b1675dSTing-Kang Chang },
70*e7b1675dSTing-Kang Chang {HashType::SHA256, "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", "", "",
71*e7b1675dSTing-Kang Chang 42,
72*e7b1675dSTing-Kang Chang "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d"
73*e7b1675dSTing-Kang Chang "9d201395faa4b61a96c8"},
74*e7b1675dSTing-Kang Chang {HashType::SHA1, "0b0b0b0b0b0b0b0b0b0b0b", "000102030405060708090a0b0c",
75*e7b1675dSTing-Kang Chang "f0f1f2f3f4f5f6f7f8f9", 42,
76*e7b1675dSTing-Kang Chang "085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e4224"
77*e7b1675dSTing-Kang Chang "78d305f3f896"},
78*e7b1675dSTing-Kang Chang {HashType::SHA1,
79*e7b1675dSTing-Kang Chang "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"
80*e7b1675dSTing-Kang Chang "202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f"
81*e7b1675dSTing-Kang Chang "404142434445464748494a4b4c4d4e4f",
82*e7b1675dSTing-Kang Chang "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f"
83*e7b1675dSTing-Kang Chang "808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f"
84*e7b1675dSTing-Kang Chang "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
85*e7b1675dSTing-Kang Chang "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf"
86*e7b1675dSTing-Kang Chang "d0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef"
87*e7b1675dSTing-Kang Chang "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
88*e7b1675dSTing-Kang Chang 82,
89*e7b1675dSTing-Kang Chang "0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe"
90*e7b1675dSTing-Kang Chang "8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e"
91*e7b1675dSTing-Kang Chang "927336d0441f4c4300e2cff0d0900b52d3b4"},
92*e7b1675dSTing-Kang Chang {HashType::SHA1, "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", "", "",
93*e7b1675dSTing-Kang Chang 42,
94*e7b1675dSTing-Kang Chang "0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0"
95*e7b1675dSTing-Kang Chang "ea00033de03984d34918"}});
96*e7b1675dSTing-Kang Chang
TEST_F(HkdfTest,testBasic)97*e7b1675dSTing-Kang Chang TEST_F(HkdfTest, testBasic) {
98*e7b1675dSTing-Kang Chang for (const TestVector& test : test_vector) {
99*e7b1675dSTing-Kang Chang auto hkdf_or =
100*e7b1675dSTing-Kang Chang Hkdf::ComputeHkdf(test.hash_type, absl::HexStringToBytes(test.ikm_hex),
101*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.salt_hex),
102*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.info_hex), test.out_len);
103*e7b1675dSTing-Kang Chang ASSERT_TRUE(hkdf_or.ok());
104*e7b1675dSTing-Kang Chang EXPECT_EQ(absl::BytesToHexString(hkdf_or.value()), test.out_key_hex);
105*e7b1675dSTing-Kang Chang }
106*e7b1675dSTing-Kang Chang }
107*e7b1675dSTing-Kang Chang
TEST_F(HkdfTest,testBasicSecretData)108*e7b1675dSTing-Kang Chang TEST_F(HkdfTest, testBasicSecretData) {
109*e7b1675dSTing-Kang Chang for (const TestVector& test : test_vector) {
110*e7b1675dSTing-Kang Chang auto hkdf_or = Hkdf::ComputeHkdf(
111*e7b1675dSTing-Kang Chang test.hash_type,
112*e7b1675dSTing-Kang Chang util::SecretDataFromStringView(absl::HexStringToBytes(test.ikm_hex)),
113*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.salt_hex),
114*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.info_hex), test.out_len);
115*e7b1675dSTing-Kang Chang ASSERT_TRUE(hkdf_or.ok());
116*e7b1675dSTing-Kang Chang EXPECT_EQ(
117*e7b1675dSTing-Kang Chang absl::BytesToHexString(util::SecretDataAsStringView(hkdf_or.value())),
118*e7b1675dSTing-Kang Chang test.out_key_hex);
119*e7b1675dSTing-Kang Chang }
120*e7b1675dSTing-Kang Chang }
121*e7b1675dSTing-Kang Chang
TEST_F(HkdfTest,testLongOutput)122*e7b1675dSTing-Kang Chang TEST_F(HkdfTest, testLongOutput) {
123*e7b1675dSTing-Kang Chang TestVector test = test_vector[0];
124*e7b1675dSTing-Kang Chang auto status_or_string =
125*e7b1675dSTing-Kang Chang Hkdf::ComputeHkdf(test.hash_type, absl::HexStringToBytes(test.ikm_hex),
126*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.salt_hex),
127*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.info_hex),
128*e7b1675dSTing-Kang Chang 255 * 32 + 1 /* 255 * hashLength + 1 */);
129*e7b1675dSTing-Kang Chang EXPECT_FALSE(status_or_string.ok());
130*e7b1675dSTing-Kang Chang EXPECT_EQ(status_or_string.status().message(), "HKDF failed");
131*e7b1675dSTing-Kang Chang }
132*e7b1675dSTing-Kang Chang
TEST_F(HkdfTest,ComputeEciesHkdfSecretData)133*e7b1675dSTing-Kang Chang TEST_F(HkdfTest, ComputeEciesHkdfSecretData) {
134*e7b1675dSTing-Kang Chang for (const TestVector& test : test_vector) {
135*e7b1675dSTing-Kang Chang std::string ikm = absl::HexStringToBytes(test.ikm_hex);
136*e7b1675dSTing-Kang Chang std::string kem_bytes = ikm.substr(0, ikm.size() / 2);
137*e7b1675dSTing-Kang Chang util::SecretData shared_secret(ikm.begin() + ikm.size() / 2, ikm.end());
138*e7b1675dSTing-Kang Chang auto hkdf_or = Hkdf::ComputeEciesHkdfSymmetricKey(
139*e7b1675dSTing-Kang Chang test.hash_type, kem_bytes, shared_secret,
140*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.salt_hex),
141*e7b1675dSTing-Kang Chang absl::HexStringToBytes(test.info_hex), test.out_len);
142*e7b1675dSTing-Kang Chang ASSERT_TRUE(hkdf_or.ok());
143*e7b1675dSTing-Kang Chang EXPECT_EQ(
144*e7b1675dSTing-Kang Chang absl::BytesToHexString(util::SecretDataAsStringView(hkdf_or.value())),
145*e7b1675dSTing-Kang Chang test.out_key_hex);
146*e7b1675dSTing-Kang Chang }
147*e7b1675dSTing-Kang Chang }
148*e7b1675dSTing-Kang Chang
149*e7b1675dSTing-Kang Chang } // namespace
150*e7b1675dSTing-Kang Chang } // namespace subtle
151*e7b1675dSTing-Kang Chang } // namespace tink
152*e7b1675dSTing-Kang Chang } // namespace crypto
153*e7b1675dSTing-Kang Chang
154