OLD | NEW |
---|---|
(Empty) | |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "crypto/hkdf.h" | |
6 | |
7 #include <string> | |
8 | |
9 #include "base/strings/string_number_conversions.h" | |
10 #include "testing/gtest/include/gtest/gtest.h" | |
11 | |
12 using crypto::HKDF; | |
13 | |
14 namespace test { | |
15 namespace { | |
16 | |
17 struct HKDFTest { | |
18 const char* key_hex; | |
19 const char* salt_hex; | |
20 const char* info_hex; | |
21 const char* output_hex; | |
22 }; | |
23 | |
24 // These test cases are taken from | |
25 // https://tools.ietf.org/html/rfc5869#appendix-A. | |
26 static const HKDFTest kHKDFTests[] = {{ | |
27 "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", | |
28 "000102030405060708090a0b0c", | |
29 "f0f1f2f3f4f5f6f7f8f9", | |
30 "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5" | |
31 "b887185865", | |
32 }, { | |
33 "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021222324" | |
34 "25262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40414243444546474849" | |
35 "4a4b4c4d4e4f", | |
36 "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f8081828384" | |
37 "85868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9" | |
38 "aaabacadaeaf", | |
39 "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4" | |
40 "d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9" | |
41 "fafbfcfdfeff", | |
42 "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99ca" | |
43 "c7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c" | |
44 "01d5c1f3434f1d87", | |
45 }, { | |
46 "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", | |
47 "", | |
48 "", | |
49 "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395fa" | |
50 "a4b61a96c8", | |
51 }, | |
52 }; | |
53 | |
54 TEST(HKDFTest, HKDF) { | |
55 for (size_t i = 0; i < arraysize(kHKDFTests); i++) { | |
56 const HKDFTest& test(kHKDFTests[i]); | |
57 SCOPED_TRACE(i); | |
58 | |
59 std::vector<uint8> data; | |
60 ASSERT_TRUE(base::HexStringToBytes(test.key_hex, &data)); | |
61 const std::string key(reinterpret_cast<char *>(&data[0]), data.size()); | |
Ryan Sleevi
2013/02/23 00:44:06
style: reinterpret_cast<char *> -> reinterpret_cas
ramant (doing other things)
2013/02/23 00:50:40
Done.
| |
62 | |
63 data.clear(); | |
64 // |salt_hex| could be optional. | |
Ryan Sleevi
2013/02/23 00:44:06
// |salt_hex| is optional and may be empty.
That
ramant (doing other things)
2013/02/23 00:50:40
Done.
| |
65 std::string salt(test.salt_hex); | |
66 if (!salt.empty()) { | |
67 ASSERT_TRUE(base::HexStringToBytes(salt, &data)); | |
68 salt.assign(reinterpret_cast<char *>(&data[0]), data.size()); | |
69 } | |
70 | |
71 data.clear(); | |
72 // |info_hex| could be optional. | |
73 std::string info(test.info_hex); | |
74 if (!info.empty()) { | |
75 ASSERT_TRUE(base::HexStringToBytes(info, &data)); | |
76 info.assign(reinterpret_cast<char *>(&data[0]), data.size()); | |
77 } | |
78 | |
79 data.clear(); | |
80 ASSERT_TRUE(base::HexStringToBytes(test.output_hex, &data)); | |
81 const std::string expected(reinterpret_cast<char *>(&data[0]), data.size()); | |
82 | |
83 // We set the key_length to the length of the expected output and then take | |
84 // the result from the first key, which is the client write key. | |
85 HKDF hkdf(key, salt, info, expected.size(), 0); | |
86 | |
87 ASSERT_EQ(expected.size(), hkdf.client_write_key().size()); | |
88 EXPECT_EQ(0, memcmp(expected.data(), hkdf.client_write_key().data(), | |
89 expected.size())); | |
90 } | |
91 } | |
92 | |
93 } // namespace | |
94 } // namespace test | |
OLD | NEW |