OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "crypto/hkdf.h" |
| 6 |
| 7 #include <string> |
| 8 |
| 9 #include "base/strings/string_number_conversions.h" |
| 10 #include "testing/gtest/include/gtest/gtest.h" |
| 11 |
| 12 using crypto::HKDF; |
| 13 |
| 14 namespace test { |
| 15 namespace { |
| 16 |
| 17 struct HKDFTest { |
| 18 const char* key_hex; |
| 19 const char* salt_hex; |
| 20 const char* info_hex; |
| 21 const char* output_hex; |
| 22 }; |
| 23 |
| 24 // These test cases are taken from |
| 25 // https://tools.ietf.org/html/rfc5869#appendix-A. |
| 26 static const HKDFTest kHKDFTests[] = {{ |
| 27 "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", |
| 28 "000102030405060708090a0b0c", |
| 29 "f0f1f2f3f4f5f6f7f8f9", |
| 30 "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5" |
| 31 "b887185865", |
| 32 }, { |
| 33 "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021222324" |
| 34 "25262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f40414243444546474849" |
| 35 "4a4b4c4d4e4f", |
| 36 "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f8081828384" |
| 37 "85868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9" |
| 38 "aaabacadaeaf", |
| 39 "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4" |
| 40 "d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9" |
| 41 "fafbfcfdfeff", |
| 42 "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99ca" |
| 43 "c7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c" |
| 44 "01d5c1f3434f1d87", |
| 45 }, { |
| 46 "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", |
| 47 "", |
| 48 "", |
| 49 "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395fa" |
| 50 "a4b61a96c8", |
| 51 }, |
| 52 }; |
| 53 |
| 54 TEST(HKDFTest, HKDFConstruct) { |
| 55 for (size_t i = 0; i < arraysize(kHKDFTests); i++) { |
| 56 const HKDFTest& test(kHKDFTests[i]); |
| 57 SCOPED_TRACE(i); |
| 58 |
| 59 std::vector<uint8> data; |
| 60 base::HexStringToBytes(test.key_hex, &data); |
| 61 const std::string key(reinterpret_cast<char *>(&data[0]), data.size()); |
| 62 |
| 63 data.clear(); |
| 64 base::HexStringToBytes(test.salt_hex, &data); |
| 65 const std::string salt(reinterpret_cast<char *>(&data[0]), data.size()); |
| 66 |
| 67 data.clear(); |
| 68 base::HexStringToBytes(test.info_hex, &data); |
| 69 const std::string info(reinterpret_cast<char *>(&data[0]), data.size()); |
| 70 |
| 71 data.clear(); |
| 72 base::HexStringToBytes(test.output_hex, &data); |
| 73 const std::string expected(reinterpret_cast<char *>(&data[0]), data.size()); |
| 74 |
| 75 // We set the key_length to the length of the expected output and then take |
| 76 // the result from the first key, which is the client write key. |
| 77 HKDF hkdf(key, salt, info, expected.size(), 0); |
| 78 |
| 79 ASSERT_EQ(expected.size(), hkdf.client_write_key().size()); |
| 80 EXPECT_EQ(0, memcmp(expected.data(), hkdf.client_write_key().data(), |
| 81 expected.size())); |
| 82 } |
| 83 } |
| 84 |
| 85 } // namespace |
| 86 } // namespace test |
OLD | NEW |