tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

pk11_hmac_unittest.cc (3976B)


      1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
      2 /* vim: set ts=2 et sw=2 tw=80: */
      3 /* This Source Code Form is subject to the terms of the Mozilla Public
      4 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
      5 * You can obtain one at http://mozilla.org/MPL/2.0/. */
      6 
      7 #include <memory>
      8 #include <tuple>
      9 
     10 #include "nss.h"
     11 #include "pk11pub.h"
     12 #include "secerr.h"
     13 #include "sechash.h"
     14 #include "blapi.h"
     15 #include "gtest/gtest.h"
     16 #include "nss_scoped_ptrs.h"
     17 #include "testvectors/hmac-sha256-vectors.h"
     18 #include "testvectors/hmac-sha384-vectors.h"
     19 #include "testvectors/hmac-sha512-vectors.h"
     20 #include "testvectors/hmac-sha3-224-vectors.h"
     21 #include "testvectors/hmac-sha3-256-vectors.h"
     22 #include "testvectors/hmac-sha3-384-vectors.h"
     23 #include "testvectors/hmac-sha3-512-vectors.h"
     24 #include "util.h"
     25 
     26 namespace nss_test {
     27 
     28 class Pkcs11HmacTest : public ::testing::TestWithParam<
     29                           std::tuple<HmacTestVector, CK_MECHANISM_TYPE>> {
     30 protected:
     31  void RunTestVector(const HmacTestVector &vec, CK_MECHANISM_TYPE mech) {
     32    std::string err = "Test #" + std::to_string(vec.id) + " failed";
     33    std::vector<uint8_t> vec_key = hex_string_to_bytes(vec.key);
     34    std::vector<uint8_t> vec_mac = hex_string_to_bytes(vec.tag);
     35    std::vector<uint8_t> vec_msg = hex_string_to_bytes(vec.msg);
     36    std::vector<uint8_t> output(vec_mac.size());
     37 
     38    // Don't provide a null pointer, even if the input is empty.
     39    uint8_t tmp;
     40    SECItem key = {siBuffer, vec_key.data() ? vec_key.data() : &tmp,
     41                   static_cast<unsigned int>(vec_key.size())};
     42    SECItem mac = {siBuffer, vec_mac.data() ? vec_mac.data() : &tmp,
     43                   static_cast<unsigned int>(vec_mac.size())};
     44    SECItem msg = {siBuffer, vec_msg.data() ? vec_msg.data() : &tmp,
     45                   static_cast<unsigned int>(vec_msg.size())};
     46    SECItem out = {siBuffer, output.data() ? output.data() : &tmp,
     47                   static_cast<unsigned int>(output.size())};
     48 
     49    ScopedPK11SlotInfo slot(PK11_GetInternalSlot());
     50    ASSERT_NE(nullptr, slot) << err;
     51 
     52    ScopedPK11SymKey p11_key(PK11_ImportSymKey(
     53        slot.get(), mech, PK11_OriginUnwrap, CKA_SIGN, &key, nullptr));
     54    ASSERT_NE(nullptr, p11_key.get()) << err;
     55 
     56    SECStatus rv = PK11_SignWithSymKey(p11_key.get(), mech, NULL, &out, &msg);
     57    EXPECT_EQ(SECSuccess, rv) << err;
     58    EXPECT_EQ(!vec.invalid, 0 == SECITEM_CompareItem(&out, &mac)) << err;
     59  }
     60 };
     61 
     62 TEST_P(Pkcs11HmacTest, WycheproofVectors) {
     63  RunTestVector(std::get<0>(GetParam()), std::get<1>(GetParam()));
     64 }
     65 
     66 INSTANTIATE_TEST_SUITE_P(
     67    HmacSha256, Pkcs11HmacTest,
     68    ::testing::Combine(::testing::ValuesIn(kHmacSha256WycheproofVectors),
     69                       ::testing::Values(CKM_SHA256_HMAC)));
     70 INSTANTIATE_TEST_SUITE_P(
     71    HmacSha384, Pkcs11HmacTest,
     72    ::testing::Combine(::testing::ValuesIn(kHmacSha384WycheproofVectors),
     73                       ::testing::Values(CKM_SHA384_HMAC)));
     74 INSTANTIATE_TEST_SUITE_P(
     75    HmacSha512, Pkcs11HmacTest,
     76    ::testing::Combine(::testing::ValuesIn(kHmacSha512WycheproofVectors),
     77                       ::testing::Values(CKM_SHA512_HMAC)));
     78 INSTANTIATE_TEST_SUITE_P(
     79    HmacSha3224, Pkcs11HmacTest,
     80    ::testing::Combine(::testing::ValuesIn(kHmacSha3224WycheproofVectors),
     81                       ::testing::Values(CKM_SHA3_224_HMAC)));
     82 INSTANTIATE_TEST_SUITE_P(
     83    HmacSha3256, Pkcs11HmacTest,
     84    ::testing::Combine(::testing::ValuesIn(kHmacSha3256WycheproofVectors),
     85                       ::testing::Values(CKM_SHA3_256_HMAC)));
     86 INSTANTIATE_TEST_SUITE_P(
     87    HmacSha3384, Pkcs11HmacTest,
     88    ::testing::Combine(::testing::ValuesIn(kHmacSha3384WycheproofVectors),
     89                       ::testing::Values(CKM_SHA3_384_HMAC)));
     90 INSTANTIATE_TEST_SUITE_P(
     91    HmacSha3512, Pkcs11HmacTest,
     92    ::testing::Combine(::testing::ValuesIn(kHmacSha3512WycheproofVectors),
     93                       ::testing::Values(CKM_SHA3_512_HMAC)));
     94 }  // namespace nss_test