1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
|
#include "validate.h"
#include <botan/libstate.h>
#include <botan/hkdf.h>
#include <botan/hex.h>
#include <iostream>
#include <fstream>
using namespace Botan;
namespace {
secure_vector<byte> hkdf(const std::string& algo,
const secure_vector<byte>& ikm,
const secure_vector<byte>& salt,
const secure_vector<byte>& info,
size_t L)
{
Algorithm_Factory& af = global_state().algorithm_factory();
const MessageAuthenticationCode* mac_proto = af.prototype_mac("HMAC(" + algo + ")");
if(!mac_proto)
throw std::invalid_argument("Bad HKDF hash " + algo);
HKDF hkdf(mac_proto->clone(), mac_proto->clone());
hkdf.start_extract(&salt[0], salt.size());
hkdf.extract(&ikm[0], ikm.size());
hkdf.finish_extract();
secure_vector<byte> key(L);
hkdf.expand(&key[0], key.size(), &info[0], info.size());
return key;
}
bool hkdf_test(const std::string& algo,
const std::string& ikm,
const std::string& salt,
const std::string& info,
const std::string& okm,
size_t L)
{
const std::string got = hex_encode(
hkdf(algo,
hex_decode_locked(ikm),
hex_decode_locked(salt),
hex_decode_locked(info),
L)
);
if(got != okm)
std::cout << "HKDF got " << got << " expected " << okm << std::endl;
return (got == okm);
}
}
void test_hkdf()
{
// From RFC 5869
std::ifstream vec("checks/hkdf.vec");
run_tests_bb(vec, "HKDF", "OKM", true,
[](std::map<std::string, std::string> m) -> bool
{
return hkdf_test(m["Hash"], m["IKM"], m["salt"], m["info"],
m["OKM"], to_u32bit(m["L"]));
});
}
|