/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ #include #include "nss.h" #include "pk11pub.h" #include "secerr.h" #include "sechash.h" #include "stdio.h" #include "blapi.h" #include "gtest/gtest.h" #include "nss_scoped_ptrs.h" #include "util.h" namespace nss_test { class Pkcs11KbkdfTest : public ::testing::Test { protected: ScopedPK11SymKey ImportKey(CK_MECHANISM_TYPE mech, SECItem *key_item) { ScopedPK11SlotInfo slot(PK11_GetInternalSlot()); if (!slot) { ADD_FAILURE() << "Can't get slot"; return nullptr; } ScopedPK11SymKey result(PK11_ImportSymKey( slot.get(), mech, PK11_OriginUnwrap, CKA_SIGN, key_item, nullptr)); return result; } void RunKDF(CK_MECHANISM_TYPE kdfMech, CK_SP800_108_KDF_PARAMS_PTR kdfParams, CK_BYTE_PTR inputKey, unsigned int inputKeyLen, CK_BYTE_PTR expectedKey, unsigned int expectedKeyLen, CK_BYTE_PTR expectedAdditional, unsigned int expectedAdditionalLen) { SECItem keyItem = {siBuffer, inputKey, inputKeyLen}; ScopedPK11SymKey p11Key = ImportKey(kdfParams->prfType, &keyItem); ASSERT_NE(kdfParams, nullptr); SECItem paramsItem = {siBuffer, (unsigned char *)kdfParams, sizeof(*kdfParams)}; ScopedPK11SymKey result(PK11_Derive(p11Key.get(), kdfMech, ¶msItem, CKM_SHA512_HMAC, CKA_SIGN, expectedKeyLen)); ASSERT_NE(result, nullptr); ASSERT_EQ(PK11_ExtractKeyValue(result.get()), SECSuccess); /* We don't need to free this -- it is just a reference... */ SECItem *actualItem = PK11_GetKeyData(result.get()); ASSERT_NE(actualItem, nullptr); SECItem expectedItem = {siBuffer, expectedKey, expectedKeyLen}; ASSERT_EQ(SECITEM_CompareItem(actualItem, &expectedItem), 0); /* Extract the additional key. */ if (expectedAdditional == NULL || kdfParams->ulAdditionalDerivedKeys != 1) { return; } ScopedPK11SlotInfo slot(PK11_GetSlotFromKey(result.get())); CK_OBJECT_HANDLE_PTR keyHandle = kdfParams->pAdditionalDerivedKeys[0].phKey; ScopedPK11SymKey additionalKey( PK11_SymKeyFromHandle(slot.get(), result.get(), PK11_OriginDerive, CKM_SHA512_HMAC, *keyHandle, PR_FALSE, NULL)); ASSERT_EQ(PK11_ExtractKeyValue(additionalKey.get()), SECSuccess); /* We don't need to free this -- it is just a reference... */ actualItem = PK11_GetKeyData(additionalKey.get()); ASSERT_NE(actualItem, nullptr); expectedItem = {siBuffer, expectedAdditional, expectedAdditionalLen}; ASSERT_EQ(SECITEM_CompareItem(actualItem, &expectedItem), 0); } }; TEST_F(Pkcs11KbkdfTest, TestAdditionalKey) { /* Test number 11 of NIST CAVP vectors for Counter mode KDF, with counter * after a fixed input (AES/128 CMAC). Resulting key (of size 256 bits) * split into two 128-bit chunks since that aligns with a PRF invocation * boundary. */ CK_BYTE inputKey[] = {0x23, 0xeb, 0x06, 0x5b, 0xe1, 0x27, 0xa8, 0x81, 0xe3, 0x5a, 0x65, 0x14, 0xd4, 0x35, 0x67, 0x9f}; CK_BYTE expectedKey[] = {0xea, 0x4e, 0xbb, 0xb4, 0xef, 0xff, 0x4b, 0x01, 0x68, 0x40, 0x12, 0xed, 0x8f, 0xf9, 0xc6, 0x4e}; CK_BYTE expectedAdditional[] = {0x70, 0xae, 0x38, 0x19, 0x7c, 0x36, 0x44, 0x5a, 0x6c, 0x80, 0x4a, 0x0e, 0x44, 0x81, 0x9a, 0xc3}; CK_SP800_108_COUNTER_FORMAT iterator = {CK_FALSE, 8}; CK_BYTE fixedData[] = { 0xe6, 0x79, 0x86, 0x1a, 0x61, 0x34, 0x65, 0xa6, 0x73, 0x85, 0x37, 0x26, 0x71, 0xb1, 0x07, 0xe6, 0xb8, 0x95, 0xa2, 0xf6, 0x40, 0x43, 0xc9, 0x34, 0xff, 0x42, 0x56, 0xa7, 0xe6, 0x3c, 0xfb, 0x8b, 0xfa, 0xcc, 0x21, 0x24, 0x25, 0x1c, 0x90, 0xfa, 0x67, 0x0d, 0x45, 0x74, 0x5c, 0x1c, 0x35, 0xda, 0x9b, 0x6e, 0x05, 0xaf, 0x77, 0xea, 0x9c, 0x4a, 0xd4, 0x86, 0xfd, 0x1a}; CK_PRF_DATA_PARAM dataParams[] = { {CK_SP800_108_BYTE_ARRAY, fixedData, sizeof(fixedData) / sizeof(*fixedData)}, {CK_SP800_108_ITERATION_VARIABLE, &iterator, sizeof(iterator)}}; CK_KEY_TYPE ckGeneric = CKK_GENERIC_SECRET; CK_OBJECT_CLASS ckClass = CKO_SECRET_KEY; CK_ULONG derivedLength = 16; CK_ATTRIBUTE derivedTemplate[] = { {CKA_CLASS, &ckClass, sizeof(ckClass)}, {CKA_KEY_TYPE, &ckGeneric, sizeof(ckGeneric)}, {CKA_VALUE_LEN, &derivedLength, sizeof(derivedLength)}}; CK_OBJECT_HANDLE keyHandle; CK_DERIVED_KEY derivedKey = { derivedTemplate, sizeof(derivedTemplate) / sizeof(*derivedTemplate), &keyHandle}; CK_SP800_108_KDF_PARAMS kdfParams = {CKM_AES_CMAC, sizeof(dataParams) / sizeof(*dataParams), dataParams, 1, &derivedKey}; RunKDF(CKM_SP800_108_COUNTER_KDF, &kdfParams, inputKey, sizeof(inputKey) / sizeof(*inputKey), expectedKey, sizeof(expectedKey) / sizeof(*expectedKey), expectedAdditional, sizeof(expectedAdditional) / sizeof(*expectedAdditional)); } // Close the namespace }