You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

114 line
4.1 KiB

  1. /* Copyright (c) 2018, Google Inc.
  2. *
  3. * Permission to use, copy, modify, and/or distribute this software for any
  4. * purpose with or without fee is hereby granted, provided that the above
  5. * copyright notice and this permission notice appear in all copies.
  6. *
  7. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
  10. * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
  12. * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
  13. * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
  14. // cavp_tlskdf_test processes NIST TLS KDF test vectors and emits the
  15. // corresponding response.
  16. // See https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Algorithm-Validation-Program/documents/components/askdfvs.pdf, section 6.4.
  17. #include <vector>
  18. #include <errno.h>
  19. #include <openssl/digest.h>
  20. #include "cavp_test_util.h"
  21. #include "../crypto/fipsmodule/tls/internal.h"
  22. #include "../crypto/test/file_test.h"
  23. static bool TestTLSKDF(FileTest *t, void *arg) {
  24. const EVP_MD *md = nullptr;
  25. if (t->HasInstruction("TLS 1.0/1.1")) {
  26. md = EVP_md5_sha1();
  27. } else if (t->HasInstruction("TLS 1.2")) {
  28. if (t->HasInstruction("SHA-256")) {
  29. md = EVP_sha256();
  30. } else if (t->HasInstruction("SHA-384")) {
  31. md = EVP_sha384();
  32. } else if (t->HasInstruction("SHA-512")) {
  33. md = EVP_sha512();
  34. }
  35. }
  36. if (md == nullptr) {
  37. return false;
  38. }
  39. std::string key_block_len_str;
  40. std::vector<uint8_t> premaster, server_random, client_random,
  41. key_block_server_random, key_block_client_random;
  42. if (!t->GetBytes(&premaster, "pre_master_secret") ||
  43. !t->GetBytes(&server_random, "serverHello_random") ||
  44. !t->GetBytes(&client_random, "clientHello_random") ||
  45. // The NIST tests specify different client and server randoms for the
  46. // expansion step from the master-secret step. This is impossible in TLS.
  47. !t->GetBytes(&key_block_server_random, "server_random") ||
  48. !t->GetBytes(&key_block_client_random, "client_random") ||
  49. !t->GetInstruction(&key_block_len_str, "key block length") ||
  50. // These are ignored.
  51. !t->HasAttribute("COUNT") ||
  52. !t->HasInstruction("pre-master secret length")) {
  53. return false;
  54. }
  55. uint8_t master_secret[48];
  56. static const char kMasterSecretLabel[] = "master secret";
  57. if (!CRYPTO_tls1_prf(md, master_secret, sizeof(master_secret),
  58. premaster.data(), premaster.size(), kMasterSecretLabel,
  59. sizeof(kMasterSecretLabel) - 1, client_random.data(),
  60. client_random.size(), server_random.data(),
  61. server_random.size())) {
  62. return false;
  63. }
  64. errno = 0;
  65. const long int key_block_bits =
  66. strtol(key_block_len_str.c_str(), nullptr, 10);
  67. if (errno != 0 || key_block_bits <= 0 || (key_block_bits & 7) != 0) {
  68. return false;
  69. }
  70. const size_t key_block_len = key_block_bits / 8;
  71. std::vector<uint8_t> key_block(key_block_len);
  72. static const char kLabel[] = "key expansion";
  73. if (!CRYPTO_tls1_prf(
  74. md, key_block.data(), key_block.size(), master_secret,
  75. sizeof(master_secret), kLabel, sizeof(kLabel) - 1,
  76. key_block_server_random.data(), key_block_server_random.size(),
  77. key_block_client_random.data(), key_block_client_random.size())) {
  78. return false;
  79. }
  80. printf("%smaster_secret = %s\r\nkey_block = %s\r\n\r\n",
  81. t->CurrentTestToString().c_str(),
  82. EncodeHex(master_secret, sizeof(master_secret)).c_str(),
  83. EncodeHex(key_block.data(), key_block.size()).c_str());
  84. return true;
  85. }
  86. int cavp_tlskdf_test_main(int argc, char **argv) {
  87. if (argc != 2) {
  88. fprintf(stderr, "usage: %s <test file>\n", argv[0]);
  89. return 1;
  90. }
  91. FileTest::Options opts;
  92. opts.path = argv[1];
  93. opts.callback = TestTLSKDF;
  94. opts.silent = true;
  95. opts.comment_callback = EchoComment;
  96. return FileTestMain(opts);
  97. }