|
6 | 6 | #include <crypto/chacha20.h>
|
7 | 7 | #include <crypto/chacha_poly_aead.h>
|
8 | 8 | #include <crypto/poly1305.h>
|
| 9 | +#include <crypto/hkdf_sha256_32.h> |
| 10 | +#include <crypto/hmac_sha256.h> |
| 11 | +#include <crypto/hmac_sha512.h> |
9 | 12 | #include <crypto/ripemd160.h>
|
10 | 13 | #include <crypto/sha1.h>
|
11 | 14 | #include <crypto/sha256.h>
|
12 | 15 | #include <crypto/sha3.h>
|
13 | 16 | #include <crypto/sha512.h>
|
14 |
| -#include <crypto/hmac_sha256.h> |
15 |
| -#include <crypto/hmac_sha512.h> |
16 | 17 | #include <random.h>
|
17 | 18 | #include <util/strencodings.h>
|
18 | 19 | #include <test/test_cosanta.h>
|
@@ -233,6 +234,22 @@ static void TestPoly1305(const std::string &hexmessage, const std::string &hexke
|
233 | 234 | BOOST_CHECK(tag == tagres);
|
234 | 235 | }
|
235 | 236 |
|
| 237 | +static void TestHKDF_SHA256_32(const std::string &ikm_hex, const std::string &salt_hex, const std::string &info_hex, const std::string &okm_check_hex) { |
| 238 | + std::vector<unsigned char> initial_key_material = ParseHex(ikm_hex); |
| 239 | + std::vector<unsigned char> salt = ParseHex(salt_hex); |
| 240 | + std::vector<unsigned char> info = ParseHex(info_hex); |
| 241 | + |
| 242 | + |
| 243 | + // our implementation only supports strings for the "info" and "salt", stringify them |
| 244 | + std::string salt_stringified(reinterpret_cast<char*>(salt.data()), salt.size()); |
| 245 | + std::string info_stringified(reinterpret_cast<char*>(info.data()), info.size()); |
| 246 | + |
| 247 | + CHKDF_HMAC_SHA256_L32 hkdf32(initial_key_material.data(), initial_key_material.size(), salt_stringified); |
| 248 | + unsigned char out[32]; |
| 249 | + hkdf32.Expand32(info_stringified, out); |
| 250 | + BOOST_CHECK(HexStr(out) == okm_check_hex); |
| 251 | +} |
| 252 | + |
236 | 253 | static std::string LongTestString() {
|
237 | 254 | std::string ret;
|
238 | 255 | for (int i=0; i<200000; i++) {
|
@@ -621,6 +638,26 @@ BOOST_AUTO_TEST_CASE(poly1305_testvector)
|
621 | 638 | "13000000000000000000000000000000");
|
622 | 639 | }
|
623 | 640 |
|
| 641 | +BOOST_AUTO_TEST_CASE(hkdf_hmac_sha256_l32_tests) |
| 642 | +{ |
| 643 | + // Use rfc5869 test vectors but trucated to 32 bytes (our implementation only support length 32) |
| 644 | + TestHKDF_SHA256_32( |
| 645 | + /* IKM */ "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", |
| 646 | + /* salt */ "000102030405060708090a0b0c", |
| 647 | + /* info */ "f0f1f2f3f4f5f6f7f8f9", |
| 648 | + /* expected OKM */ "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf"); |
| 649 | + TestHKDF_SHA256_32( |
| 650 | + "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f", |
| 651 | + "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf", |
| 652 | + "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff", |
| 653 | + "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c"); |
| 654 | + TestHKDF_SHA256_32( |
| 655 | + "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", |
| 656 | + "", |
| 657 | + "", |
| 658 | + "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d"); |
| 659 | +} |
| 660 | + |
624 | 661 | static void TestChaCha20Poly1305AEAD(bool must_succeed, unsigned int expected_aad_length, const std::string& hex_m, const std::string& hex_k1, const std::string& hex_k2, const std::string& hex_aad_keystream, const std::string& hex_encrypted_message, const std::string& hex_encrypted_message_seq_999)
|
625 | 662 | {
|
626 | 663 | // we need two sequence numbers, one for the payload cipher instance...
|
|
0 commit comments