pk11_hmac_unittest.cc (3976B)
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ 2 /* vim: set ts=2 et sw=2 tw=80: */ 3 /* This Source Code Form is subject to the terms of the Mozilla Public 4 * License, v. 2.0. If a copy of the MPL was not distributed with this file, 5 * You can obtain one at http://mozilla.org/MPL/2.0/. */ 6 7 #include <memory> 8 #include <tuple> 9 10 #include "nss.h" 11 #include "pk11pub.h" 12 #include "secerr.h" 13 #include "sechash.h" 14 #include "blapi.h" 15 #include "gtest/gtest.h" 16 #include "nss_scoped_ptrs.h" 17 #include "testvectors/hmac-sha256-vectors.h" 18 #include "testvectors/hmac-sha384-vectors.h" 19 #include "testvectors/hmac-sha512-vectors.h" 20 #include "testvectors/hmac-sha3-224-vectors.h" 21 #include "testvectors/hmac-sha3-256-vectors.h" 22 #include "testvectors/hmac-sha3-384-vectors.h" 23 #include "testvectors/hmac-sha3-512-vectors.h" 24 #include "util.h" 25 26 namespace nss_test { 27 28 class Pkcs11HmacTest : public ::testing::TestWithParam< 29 std::tuple<HmacTestVector, CK_MECHANISM_TYPE>> { 30 protected: 31 void RunTestVector(const HmacTestVector &vec, CK_MECHANISM_TYPE mech) { 32 std::string err = "Test #" + std::to_string(vec.id) + " failed"; 33 std::vector<uint8_t> vec_key = hex_string_to_bytes(vec.key); 34 std::vector<uint8_t> vec_mac = hex_string_to_bytes(vec.tag); 35 std::vector<uint8_t> vec_msg = hex_string_to_bytes(vec.msg); 36 std::vector<uint8_t> output(vec_mac.size()); 37 38 // Don't provide a null pointer, even if the input is empty. 39 uint8_t tmp; 40 SECItem key = {siBuffer, vec_key.data() ? vec_key.data() : &tmp, 41 static_cast<unsigned int>(vec_key.size())}; 42 SECItem mac = {siBuffer, vec_mac.data() ? vec_mac.data() : &tmp, 43 static_cast<unsigned int>(vec_mac.size())}; 44 SECItem msg = {siBuffer, vec_msg.data() ? vec_msg.data() : &tmp, 45 static_cast<unsigned int>(vec_msg.size())}; 46 SECItem out = {siBuffer, output.data() ? output.data() : &tmp, 47 static_cast<unsigned int>(output.size())}; 48 49 ScopedPK11SlotInfo slot(PK11_GetInternalSlot()); 50 ASSERT_NE(nullptr, slot) << err; 51 52 ScopedPK11SymKey p11_key(PK11_ImportSymKey( 53 slot.get(), mech, PK11_OriginUnwrap, CKA_SIGN, &key, nullptr)); 54 ASSERT_NE(nullptr, p11_key.get()) << err; 55 56 SECStatus rv = PK11_SignWithSymKey(p11_key.get(), mech, NULL, &out, &msg); 57 EXPECT_EQ(SECSuccess, rv) << err; 58 EXPECT_EQ(!vec.invalid, 0 == SECITEM_CompareItem(&out, &mac)) << err; 59 } 60 }; 61 62 TEST_P(Pkcs11HmacTest, WycheproofVectors) { 63 RunTestVector(std::get<0>(GetParam()), std::get<1>(GetParam())); 64 } 65 66 INSTANTIATE_TEST_SUITE_P( 67 HmacSha256, Pkcs11HmacTest, 68 ::testing::Combine(::testing::ValuesIn(kHmacSha256WycheproofVectors), 69 ::testing::Values(CKM_SHA256_HMAC))); 70 INSTANTIATE_TEST_SUITE_P( 71 HmacSha384, Pkcs11HmacTest, 72 ::testing::Combine(::testing::ValuesIn(kHmacSha384WycheproofVectors), 73 ::testing::Values(CKM_SHA384_HMAC))); 74 INSTANTIATE_TEST_SUITE_P( 75 HmacSha512, Pkcs11HmacTest, 76 ::testing::Combine(::testing::ValuesIn(kHmacSha512WycheproofVectors), 77 ::testing::Values(CKM_SHA512_HMAC))); 78 INSTANTIATE_TEST_SUITE_P( 79 HmacSha3224, Pkcs11HmacTest, 80 ::testing::Combine(::testing::ValuesIn(kHmacSha3224WycheproofVectors), 81 ::testing::Values(CKM_SHA3_224_HMAC))); 82 INSTANTIATE_TEST_SUITE_P( 83 HmacSha3256, Pkcs11HmacTest, 84 ::testing::Combine(::testing::ValuesIn(kHmacSha3256WycheproofVectors), 85 ::testing::Values(CKM_SHA3_256_HMAC))); 86 INSTANTIATE_TEST_SUITE_P( 87 HmacSha3384, Pkcs11HmacTest, 88 ::testing::Combine(::testing::ValuesIn(kHmacSha3384WycheproofVectors), 89 ::testing::Values(CKM_SHA3_384_HMAC))); 90 INSTANTIATE_TEST_SUITE_P( 91 HmacSha3512, Pkcs11HmacTest, 92 ::testing::Combine(::testing::ValuesIn(kHmacSha3512WycheproofVectors), 93 ::testing::Values(CKM_SHA3_512_HMAC))); 94 } // namespace nss_test