1 /*
   2  * Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 /*
  25  * Actual test code for the package private HKDF implementation
  26  */
  27 
  28 package sun.security.ssl;
  29 
  30 import java.util.Arrays;
  31 import java.util.List;
  32 import java.util.LinkedList;
  33 import java.util.Objects;
  34 import java.security.NoSuchAlgorithmException;
  35 import java.security.InvalidKeyException;
  36 import javax.crypto.SecretKey;
  37 import javax.crypto.spec.SecretKeySpec;
  38 
  39 public class TestHkdf {
  40     public static class TestData {
  41         public TestData(String name, String algStr, String ikmStr,
  42                 String saltStr, String infoStr, int oLen, String expPrkStr,
  43                 String expOkmStr) {
  44             testName = Objects.requireNonNull(name);
  45             algName = Objects.requireNonNull(algStr);
  46             IKM = hex2bin(Objects.requireNonNull(ikmStr));
  47             if ((outLen = oLen) <= 0) {
  48                 throw new IllegalArgumentException(
  49                         "Output length must be greater than 0");
  50             }
  51             expectedPRK = hex2bin(Objects.requireNonNull(expPrkStr));
  52             expectedOKM = hex2bin(Objects.requireNonNull(expOkmStr));
  53 
  54             // Non-mandatory fields - may be null
  55             salt = (saltStr != null) ? hex2bin(saltStr) : null;
  56             info = (infoStr != null) ? hex2bin(infoStr) : null;
  57         }
  58 
  59         public final String testName;
  60         public final String algName;
  61         public final byte[] IKM;
  62         public final byte[] salt;
  63         public final byte[] info;
  64         public final int outLen;
  65         public final byte[] expectedPRK;
  66         public final byte[] expectedOKM;
  67     }
  68 
  69     public static final List<TestData> testList = new LinkedList<TestData>() {{
  70         add(new TestData("RFC 5689 Test Case 1", "SHA-256",
  71             "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
  72             "000102030405060708090a0b0c",
  73             "f0f1f2f3f4f5f6f7f8f9",
  74             42,
  75             "077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5",
  76             "3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf" +
  77             "34007208d5b887185865"));
  78         add(new TestData("RFC 5689 Test Case 2", "SHA-256",
  79             "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" +
  80             "202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f" +
  81             "404142434445464748494a4b4c4d4e4f",
  82             "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f" +
  83             "808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f" +
  84             "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
  85             "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf" +
  86             "d0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef" +
  87             "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
  88             82,
  89             "06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244",
  90             "b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c" +
  91             "59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71" +
  92             "cc30c58179ec3e87c14c01d5c1f3434f1d87"));
  93         add(new TestData("RFC 5689 Test Case 3", "SHA-256",
  94             "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
  95             null, null, 42,
  96             "19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04",
  97             "8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d" +
  98             "9d201395faa4b61a96c8"));
  99         add(new TestData("RFC 5689 Test Case 4", "SHA-1",
 100             "0b0b0b0b0b0b0b0b0b0b0b",
 101             "000102030405060708090a0b0c",
 102             "f0f1f2f3f4f5f6f7f8f9",
 103             42,
 104             "9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243",
 105             "085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2" +
 106             "c22e422478d305f3f896"));
 107         add(new TestData("RFC 5689 Test Case 5", "SHA-1",
 108             "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" +
 109             "202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f" +
 110             "404142434445464748494a4b4c4d4e4f",
 111             "606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f" +
 112             "808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f" +
 113             "a0a1a2a3a4a5a6a7a8a9aaabacadaeaf",
 114             "b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecf" +
 115             "d0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeef" +
 116             "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
 117             82,
 118             "8adae09a2a307059478d309b26c4115a224cfaf6",
 119             "0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe" +
 120             "8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e" +
 121             "927336d0441f4c4300e2cff0d0900b52d3b4"));
 122         add(new TestData("RFC 5689 Test Case 6", "SHA-1",
 123             "0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b",
 124             null, null, 42,
 125             "da8c8a73c7fa77288ec6f5e7c297786aa0d32d01",
 126             "0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0" +
 127             "ea00033de03984d34918"));
 128         add(new TestData("RFC 5689 Test Case 7", "SHA-1",
 129             "0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c",
 130             null, null, 42,
 131             "2adccada18779e7c2077ad2eb19d3f3e731385dd",
 132             "2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5" +
 133             "673a081d70cce7acfc48"));
 134     }};
 135 
 136     public static void main(String args[]) throws Exception {
 137         int testsPassed = 0;
 138 
 139         int testNo = 0;
 140         for (TestData test : testList) {
 141             System.out.println("*** Test " + ++testNo + ": " +
 142                     test.testName);
 143             if (runVector(test)) {
 144                 testsPassed++;
 145             }
 146         }
 147 
 148         System.out.println("Total tests: " + testList.size() +
 149                 ", Passed: " + testsPassed + ", Failed: " +
 150                 (testList.size() - testsPassed));
 151         if (testsPassed != testList.size()) {
 152             throw new RuntimeException("One or more tests failed.  " +
 153                     "Check output for details");
 154         }
 155     }
 156 
 157     private static boolean runVector(TestData testData)
 158             throws NoSuchAlgorithmException, InvalidKeyException {
 159         String kdfName, prfName;
 160         HKDF kdfHkdf;
 161         boolean result = true;
 162         SecretKey actualPRK;
 163         SecretKey actualOKM;
 164         byte[] deriveData;
 165 
 166         // Get an instance of the HKDF derivation engine
 167         kdfHkdf = new HKDF(testData.algName);
 168 
 169         // Set up the input keying material and the salt as a secret
 170         SecretKey ikmKey = new SecretKeySpec(testData.IKM, "HKDF-IKM");
 171         SecretKey saltKey = (testData.salt != null) ?
 172                 new SecretKeySpec(testData.salt, "HKDF-Salt") : null;
 173 
 174         // *** HKDF-Extract-only testing
 175         System.out.println("* HKDF-Extract-Only:");
 176         actualPRK = kdfHkdf.extract(saltKey, ikmKey, "HKDF-PRK");
 177         result &= compareKeyAndData(actualPRK, testData.expectedPRK);
 178 
 179         // *** HKDF Expand-Only testing
 180         // For these tests, we'll use the actualPRK as the input key
 181         System.out.println("* HKDF-Expand-Only:");
 182         actualOKM = kdfHkdf.expand(actualPRK, testData.info, testData.outLen,
 183                 "HKDF-OKM");
 184         result &= compareKeyAndData(actualOKM, testData.expectedOKM);
 185 
 186         // *** HKDF Extract-then-Expand testing
 187         System.out.println("* HKDF-Extract-then-Expand:");
 188         actualOKM = kdfHkdf.extractExpand(ikmKey, saltKey, testData.info,
 189                 testData.outLen, "HKDF-OKM2");
 190         result &= compareKeyAndData(actualOKM, testData.expectedOKM);
 191 
 192         return result;
 193     }
 194 
 195     /**
 196      * Compare actual key output from HKDF against an expected output value.
 197      *
 198      * @param outKey the KDF output in key form
 199      * @param expectedOut the expected value
 200      *
 201      * @return true if the underlying data for outKey, outData and
 202      * expectedOut are the same.
 203      */
 204     private static boolean compareKeyAndData(SecretKey outKey,
 205             byte[] expectedOut) {
 206         boolean result = false;
 207 
 208         if (Arrays.equals(outKey.getEncoded(), expectedOut)) {
 209             System.out.println("\t* Key output: Pass");
 210             result = true;
 211         } else {
 212             System.out.println("\t* Key output: FAIL");
 213             System.out.println("Expected:\n" +
 214                     dumpHexBytes(expectedOut, 16, "\n", " "));
 215             System.out.println("Actual:\n" +
 216                     dumpHexBytes(outKey.getEncoded(), 16, "\n", " "));
 217             System.out.println();
 218         }
 219 
 220         return result;
 221     }
 222 
 223     /**
 224      * Dump the hex bytes of a buffer into string form.
 225      *
 226      * @param data The array of bytes to dump to stdout.
 227      * @param itemsPerLine The number of bytes to display per line
 228      *      if the {@code lineDelim} character is blank then all bytes
 229      *      will be printed on a single line.
 230      * @param lineDelim The delimiter between lines
 231      * @param itemDelim The delimiter between bytes
 232      *
 233      * @return The hexdump of the byte array
 234      */
 235     private static String dumpHexBytes(byte[] data, int itemsPerLine,
 236             String lineDelim, String itemDelim) {
 237         StringBuilder sb = new StringBuilder();
 238         if (data != null) {
 239             for (int i = 0; i < data.length; i++) {
 240                 if (i % itemsPerLine == 0 && i != 0) {
 241                     sb.append(lineDelim);
 242                 }
 243                 sb.append(String.format("%02X", data[i])).append(itemDelim);
 244             }
 245         }
 246 
 247         return sb.toString();
 248     }
 249 
 250     private static byte[] hex2bin(String hex) {
 251         int i;
 252         int len = hex.length();
 253         byte[] data = new byte [len / 2];
 254         for (i = 0; i < len; i += 2) {
 255             data[i / 2] = (byte)((Character.digit(hex.charAt(i), 16) << 4) +
 256                     Character.digit(hex.charAt(i + 1), 16));
 257         }
 258         return data;
 259     }
 260 }