|
 |
ca16be |
|
|
 |
ca16be |
#define TEST_NAME "kdf"
|
|
 |
ca16be |
#include "cmptest.h"
|
|
 |
ca16be |
|
|
 |
ca16be |
static void
|
|
 |
ca16be |
tv_kdf(void)
|
|
 |
ca16be |
{
|
|
 |
ca16be |
unsigned char *master_key;
|
|
 |
ca16be |
unsigned char *subkey;
|
|
 |
ca16be |
char *context;
|
|
 |
ca16be |
char hex[crypto_kdf_BYTES_MAX * 2 + 1];
|
|
 |
ca16be |
uint64_t i;
|
|
 |
ca16be |
int ret;
|
|
 |
ca16be |
|
|
 |
ca16be |
context = (char *) sodium_malloc(crypto_kdf_CONTEXTBYTES);
|
|
 |
ca16be |
master_key = (unsigned char *) sodium_malloc(crypto_kdf_KEYBYTES);
|
|
 |
ca16be |
|
|
 |
ca16be |
memcpy(context, "KDF test", sizeof "KDF test" -1U);
|
|
 |
ca16be |
for (i = 0; i < crypto_kdf_KEYBYTES; i++) {
|
|
 |
ca16be |
master_key[i] = i;
|
|
 |
ca16be |
}
|
|
 |
ca16be |
subkey = (unsigned char *) sodium_malloc(crypto_kdf_BYTES_MAX);
|
|
 |
ca16be |
for (i = 0; i < 10; i++) {
|
|
 |
ca16be |
ret = crypto_kdf_derive_from_key(subkey, crypto_kdf_BYTES_MAX,
|
|
 |
ca16be |
i, context, master_key);
|
|
 |
ca16be |
assert(ret == 0);
|
|
 |
ca16be |
sodium_bin2hex(hex, sizeof hex, subkey, crypto_kdf_BYTES_MAX);
|
|
 |
ca16be |
printf("%s\n", hex);
|
|
 |
ca16be |
}
|
|
 |
ca16be |
sodium_free(subkey);
|
|
 |
ca16be |
|
|
 |
ca16be |
for (i = 0; i < crypto_kdf_BYTES_MAX + 2; i++) {
|
|
 |
ca16be |
subkey = (unsigned char *) sodium_malloc(crypto_kdf_BYTES_MAX);
|
|
 |
ca16be |
if (crypto_kdf_derive_from_key(subkey, (size_t) i,
|
|
 |
ca16be |
i, context, master_key) == 0) {
|
|
 |
ca16be |
sodium_bin2hex(hex, sizeof hex, subkey, (size_t) i);
|
|
 |
ca16be |
printf("%s\n", hex);
|
|
 |
ca16be |
} else {
|
|
 |
ca16be |
printf("Failure -- probably expected for output length=%u\n",
|
|
 |
ca16be |
(unsigned int) i);
|
|
 |
ca16be |
}
|
|
 |
ca16be |
sodium_free(subkey);
|
|
 |
ca16be |
}
|
|
 |
ca16be |
|
|
 |
ca16be |
sodium_free(master_key);
|
|
 |
ca16be |
sodium_free(context);
|
|
 |
ca16be |
|
|
 |
ca16be |
assert(strcmp(crypto_kdf_primitive(), crypto_kdf_PRIMITIVE) == 0);
|
|
 |
ca16be |
assert(crypto_kdf_BYTES_MAX > 0);
|
|
 |
ca16be |
assert(crypto_kdf_BYTES_MIN <= crypto_kdf_BYTES_MAX);
|
|
 |
ca16be |
assert(crypto_kdf_bytes_min() == crypto_kdf_BYTES_MIN);
|
|
 |
ca16be |
assert(crypto_kdf_bytes_max() == crypto_kdf_BYTES_MAX);
|
|
 |
ca16be |
assert(crypto_kdf_CONTEXTBYTES > 0);
|
|
 |
ca16be |
assert(crypto_kdf_contextbytes() == crypto_kdf_CONTEXTBYTES);
|
|
 |
ca16be |
assert(crypto_kdf_KEYBYTES >= 16);
|
|
 |
ca16be |
assert(crypto_kdf_keybytes() == crypto_kdf_KEYBYTES);
|
|
 |
ca16be |
assert(crypto_kdf_bytes_min() == crypto_kdf_blake2b_bytes_min());
|
|
 |
ca16be |
assert(crypto_kdf_bytes_max() == crypto_kdf_blake2b_bytes_max());
|
|
 |
ca16be |
assert(crypto_kdf_contextbytes() == crypto_kdf_blake2b_contextbytes());
|
|
 |
ca16be |
assert(crypto_kdf_keybytes() == crypto_kdf_blake2b_keybytes());
|
|
 |
ca16be |
|
|
 |
ca16be |
printf("tv_kdf: ok\n");
|
|
 |
ca16be |
}
|
|
 |
ca16be |
|
|
 |
ca16be |
int
|
|
 |
ca16be |
main(void)
|
|
 |
ca16be |
{
|
|
 |
ca16be |
tv_kdf();
|
|
 |
ca16be |
|
|
 |
ca16be |
return 0;
|
|
 |
ca16be |
}
|