michael@0: /* Any copyright is dedicated to the Public Domain. michael@0: * http://creativecommons.org/publicdomain/zero/1.0/ */ michael@0: michael@0: Cu.import("resource://services-common/utils.js"); michael@0: Cu.import("resource://services-crypto/utils.js"); michael@0: michael@0: // Test vectors from RFC 5869 michael@0: michael@0: // Test case 1 michael@0: michael@0: let tc1 = { michael@0: IKM: "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", michael@0: salt: "000102030405060708090a0b0c", michael@0: info: "f0f1f2f3f4f5f6f7f8f9", michael@0: L: 42, michael@0: PRK: "077709362c2e32df0ddc3f0dc47bba63" + michael@0: "90b6c73bb50f9c3122ec844ad7c2b3e5", michael@0: OKM: "3cb25f25faacd57a90434f64d0362f2a" + michael@0: "2d2d0a90cf1a5a4c5db02d56ecc4c5bf" + michael@0: "34007208d5b887185865" michael@0: }; michael@0: michael@0: // Test case 2 michael@0: michael@0: let tc2 = { michael@0: IKM: "000102030405060708090a0b0c0d0e0f" + michael@0: "101112131415161718191a1b1c1d1e1f" + michael@0: "202122232425262728292a2b2c2d2e2f" + michael@0: "303132333435363738393a3b3c3d3e3f" + michael@0: "404142434445464748494a4b4c4d4e4f", michael@0: salt: "606162636465666768696a6b6c6d6e6f" + michael@0: "707172737475767778797a7b7c7d7e7f" + michael@0: "808182838485868788898a8b8c8d8e8f" + michael@0: "909192939495969798999a9b9c9d9e9f" + michael@0: "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf", michael@0: info: "b0b1b2b3b4b5b6b7b8b9babbbcbdbebf" + michael@0: "c0c1c2c3c4c5c6c7c8c9cacbcccdcecf" + michael@0: "d0d1d2d3d4d5d6d7d8d9dadbdcdddedf" + michael@0: "e0e1e2e3e4e5e6e7e8e9eaebecedeeef" + michael@0: "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff", michael@0: L: 82, michael@0: PRK: "06a6b88c5853361a06104c9ceb35b45c" + michael@0: "ef760014904671014a193f40c15fc244", michael@0: OKM: "b11e398dc80327a1c8e7f78c596a4934" + michael@0: "4f012eda2d4efad8a050cc4c19afa97c" + michael@0: "59045a99cac7827271cb41c65e590e09" + michael@0: "da3275600c2f09b8367793a9aca3db71" + michael@0: "cc30c58179ec3e87c14c01d5c1f3434f" + michael@0: "1d87" michael@0: }; michael@0: michael@0: // Test case 3 michael@0: michael@0: let tc3 = { michael@0: IKM: "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b", michael@0: salt: "", michael@0: info: "", michael@0: L: 42, michael@0: PRK: "19ef24a32c717b167f33a91d6f648bdf" + michael@0: "96596776afdb6377ac434c1c293ccb04", michael@0: OKM: "8da4e775a563c18f715f802a063c5a31" + michael@0: "b8a11f5c5ee1879ec3454e5f3c738d2d" + michael@0: "9d201395faa4b61a96c8" michael@0: }; michael@0: michael@0: function sha256HMAC(message, key) { michael@0: let h = CryptoUtils.makeHMACHasher(Ci.nsICryptoHMAC.SHA256, key); michael@0: return CryptoUtils.digestBytes(message, h); michael@0: } michael@0: michael@0: function _hexToString(hex) { michael@0: let ret = ""; michael@0: if (hex.length % 2 != 0) { michael@0: return false; michael@0: } michael@0: michael@0: for (let i = 0; i < hex.length; i += 2) { michael@0: let cur = hex[i] + hex[i + 1]; michael@0: ret += String.fromCharCode(parseInt(cur, 16)); michael@0: } michael@0: return ret; michael@0: } michael@0: michael@0: function extract_hex(salt, ikm) { michael@0: salt = _hexToString(salt); michael@0: ikm = _hexToString(ikm); michael@0: return CommonUtils.bytesAsHex(sha256HMAC(ikm, CryptoUtils.makeHMACKey(salt))); michael@0: } michael@0: michael@0: function expand_hex(prk, info, len) { michael@0: prk = _hexToString(prk); michael@0: info = _hexToString(info); michael@0: return CommonUtils.bytesAsHex(CryptoUtils.hkdfExpand(prk, info, len)); michael@0: } michael@0: michael@0: function hkdf_hex(ikm, salt, info, len) { michael@0: ikm = _hexToString(ikm); michael@0: if (salt) michael@0: salt = _hexToString(salt); michael@0: info = _hexToString(info); michael@0: return CommonUtils.bytesAsHex(CryptoUtils.hkdf(ikm, salt, info, len)); michael@0: } michael@0: michael@0: function run_test() { michael@0: _("Verifying Test Case 1"); michael@0: do_check_eq(extract_hex(tc1.salt, tc1.IKM), tc1.PRK); michael@0: do_check_eq(expand_hex(tc1.PRK, tc1.info, tc1.L), tc1.OKM); michael@0: do_check_eq(hkdf_hex(tc1.IKM, tc1.salt, tc1.info, tc1.L), tc1.OKM); michael@0: michael@0: _("Verifying Test Case 2"); michael@0: do_check_eq(extract_hex(tc2.salt, tc2.IKM), tc2.PRK); michael@0: do_check_eq(expand_hex(tc2.PRK, tc2.info, tc2.L), tc2.OKM); michael@0: do_check_eq(hkdf_hex(tc2.IKM, tc2.salt, tc2.info, tc2.L), tc2.OKM); michael@0: michael@0: _("Verifying Test Case 3"); michael@0: do_check_eq(extract_hex(tc3.salt, tc3.IKM), tc3.PRK); michael@0: do_check_eq(expand_hex(tc3.PRK, tc3.info, tc3.L), tc3.OKM); michael@0: do_check_eq(hkdf_hex(tc3.IKM, tc3.salt, tc3.info, tc3.L), tc3.OKM); michael@0: do_check_eq(hkdf_hex(tc3.IKM, undefined, tc3.info, tc3.L), tc3.OKM); michael@0: }