mirror of
				https://github.com/yuzu-emu/mbedtls.git
				synced 2025-10-22 08:27:09 +00:00 
			
		
		
		
	Test for the expected bad input parameter error when given specific sets of bad input parameters.
		
			
				
	
	
		
			171 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			171 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| /* BEGIN_HEADER */
 | |
| #include "mbedtls/hkdf.h"
 | |
| #include "mbedtls/md_internal.h"
 | |
| /* END_HEADER */
 | |
| 
 | |
| /* BEGIN_DEPENDENCIES
 | |
|  * depends_on:MBEDTLS_HKDF_C
 | |
|  * END_DEPENDENCIES
 | |
|  */
 | |
| 
 | |
| /* BEGIN_CASE */
 | |
| void test_hkdf( int md_alg, char *hex_ikm_string, char *hex_salt_string,
 | |
|                 char *hex_info_string, char *hex_okm_string )
 | |
| {
 | |
|     int ret;
 | |
|     size_t ikm_len, salt_len, info_len, okm_len;
 | |
|     unsigned char ikm[1024] = { '\0' };
 | |
|     unsigned char salt[1024] = { '\0' };
 | |
|     unsigned char info[1024] = { '\0' };
 | |
|     unsigned char expected_okm[1024] = { '\0' };
 | |
|     unsigned char okm[1024] = { '\0' };
 | |
|     unsigned char okm_string[1000] = { '\0' };
 | |
| 
 | |
|     const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
 | |
|     TEST_ASSERT( md != NULL );
 | |
| 
 | |
|     ikm_len = unhexify( ikm, hex_ikm_string );
 | |
|     salt_len = unhexify( salt, hex_salt_string );
 | |
|     info_len = unhexify( info, hex_info_string );
 | |
|     okm_len = unhexify( expected_okm, hex_okm_string );
 | |
| 
 | |
|     ret = mbedtls_hkdf( md, salt, salt_len, ikm, ikm_len, info, info_len, okm,
 | |
|                         okm_len);
 | |
|     TEST_ASSERT( ret == 0 );
 | |
| 
 | |
|     // Run hexify on it so that it looks nicer if the assertion fails
 | |
|     hexify( okm_string, okm, okm_len );
 | |
|     TEST_ASSERT( !strcmp( (char *)okm_string, hex_okm_string ) );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE */
 | |
| void test_hkdf_extract( int md_alg, char *hex_ikm_string,
 | |
|                         char *hex_salt_string, char *hex_prk_string )
 | |
| {
 | |
|     int ret;
 | |
|     unsigned char *ikm = NULL;
 | |
|     unsigned char *salt = NULL;
 | |
|     unsigned char *prk = NULL;
 | |
|     unsigned char *output_prk = NULL;
 | |
|     size_t ikm_len, salt_len, prk_len, output_prk_len;
 | |
| 
 | |
|     const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
 | |
|     TEST_ASSERT( md != NULL );
 | |
| 
 | |
|     output_prk_len = mbedtls_md_get_size( md );
 | |
|     output_prk = mbedtls_calloc( 1, output_prk_len );
 | |
| 
 | |
|     ikm = unhexify_alloc( hex_ikm_string, &ikm_len );
 | |
|     salt = unhexify_alloc( hex_salt_string, &salt_len );
 | |
|     prk = unhexify_alloc( hex_prk_string, &prk_len );
 | |
|     TEST_ASSERT( prk_len == output_prk_len );
 | |
| 
 | |
|     ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, output_prk );
 | |
|     TEST_ASSERT( ret == 0 );
 | |
| 
 | |
|     TEST_ASSERT( !memcmp( output_prk, prk, prk_len ) );
 | |
| 
 | |
| exit:
 | |
|     mbedtls_free(ikm);
 | |
|     mbedtls_free(salt);
 | |
|     mbedtls_free(prk);
 | |
|     mbedtls_free(output_prk);
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE */
 | |
| void test_hkdf_expand( int md_alg, char *hex_info_string,
 | |
|                        char *hex_prk_string, char *hex_okm_string )
 | |
| {
 | |
|     enum { OKM_LEN  = 1024 };
 | |
|     int ret;
 | |
|     unsigned char *info = NULL;
 | |
|     unsigned char *prk = NULL;
 | |
|     unsigned char *okm = NULL;
 | |
|     unsigned char *output_okm = NULL;
 | |
|     size_t info_len, prk_len, okm_len;
 | |
| 
 | |
|     const mbedtls_md_info_t *md = mbedtls_md_info_from_type( md_alg );
 | |
|     TEST_ASSERT( md != NULL );
 | |
| 
 | |
|     output_okm = mbedtls_calloc( OKM_LEN, 1 );
 | |
| 
 | |
|     prk = unhexify_alloc( hex_prk_string, &prk_len );
 | |
|     info = unhexify_alloc( hex_info_string, &info_len );
 | |
|     okm = unhexify_alloc( hex_okm_string, &okm_len );
 | |
|     TEST_ASSERT( prk_len == mbedtls_md_get_size( md ) );
 | |
|     TEST_ASSERT( okm_len < OKM_LEN );
 | |
| 
 | |
|     ret = mbedtls_hkdf_expand( md, prk, prk_len, info, info_len,
 | |
|                                output_okm, OKM_LEN );
 | |
|     TEST_ASSERT( ret == 0 );
 | |
|     TEST_ASSERT( !memcmp( output_okm, okm, okm_len ) );
 | |
| 
 | |
| exit:
 | |
|     mbedtls_free(info);
 | |
|     mbedtls_free(prk);
 | |
|     mbedtls_free(okm);
 | |
|     mbedtls_free(output_okm);
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE */
 | |
| void test_hkdf_extract_ret( int hash_len, int ret )
 | |
| {
 | |
|     int output_ret;
 | |
|     unsigned char *salt = NULL;
 | |
|     unsigned char *ikm = NULL;
 | |
|     unsigned char *prk = NULL;
 | |
|     size_t salt_len, ikm_len;
 | |
|     struct mbedtls_md_info_t fake_md_info;
 | |
| 
 | |
|     memset( &fake_md_info, 0, sizeof( fake_md_info ) );
 | |
|     fake_md_info.type = MBEDTLS_MD_NONE;
 | |
|     fake_md_info.size = hash_len;
 | |
| 
 | |
|     prk = mbedtls_calloc( MBEDTLS_MD_MAX_SIZE, 1 );
 | |
|     salt_len = 0;
 | |
|     ikm_len = 0;
 | |
| 
 | |
|     output_ret = mbedtls_hkdf_extract( &fake_md_info, salt, salt_len,
 | |
|                                        ikm, ikm_len, prk );
 | |
|     TEST_ASSERT( output_ret == ret );
 | |
| 
 | |
| exit:
 | |
|     mbedtls_free(prk);
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE */
 | |
| void test_hkdf_expand_ret( int hash_len, int prk_len, int okm_len, int ret )
 | |
| {
 | |
|     int output_ret;
 | |
|     unsigned char *info = NULL;
 | |
|     unsigned char *prk = NULL;
 | |
|     unsigned char *okm = NULL;
 | |
|     size_t info_len;
 | |
|     struct mbedtls_md_info_t fake_md_info;
 | |
| 
 | |
|     memset( &fake_md_info, 0, sizeof( fake_md_info ) );
 | |
|     fake_md_info.type = MBEDTLS_MD_NONE;
 | |
|     fake_md_info.size = hash_len;
 | |
| 
 | |
|     info_len = 0;
 | |
| 
 | |
|     if (prk_len > 0)
 | |
|         prk = mbedtls_calloc( prk_len, 1 );
 | |
| 
 | |
|     if (okm_len > 0)
 | |
|         okm = mbedtls_calloc( okm_len, 1 );
 | |
| 
 | |
|     output_ret = mbedtls_hkdf_expand( &fake_md_info, prk, prk_len,
 | |
|                                       info, info_len, okm, okm_len );
 | |
|     TEST_ASSERT( output_ret == ret );
 | |
| 
 | |
| exit:
 | |
|     mbedtls_free(prk);
 | |
|     mbedtls_free(okm);
 | |
| }
 | |
| /* END_CASE */
 |