84 lines
2.4 KiB
Rust
84 lines
2.4 KiB
Rust
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
// option. This file may not be copied, modified, or distributed
|
|
// except according to those terms.
|
|
|
|
use neqo_crypto::{
|
|
constants::{
|
|
Cipher, TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256,
|
|
TLS_VERSION_1_3,
|
|
},
|
|
hkdf,
|
|
hp::HpKey,
|
|
};
|
|
use test_fixture::fixture_init;
|
|
|
|
fn make_hp(cipher: Cipher) -> HpKey {
|
|
fixture_init();
|
|
let ikm = hkdf::import_key(TLS_VERSION_1_3, &[0; 16]).expect("import IKM");
|
|
let prk = hkdf::extract(TLS_VERSION_1_3, cipher, None, &ikm).expect("extract works");
|
|
HpKey::extract(TLS_VERSION_1_3, cipher, &prk, "hp").expect("extract label works")
|
|
}
|
|
|
|
fn hp_test(cipher: Cipher, expected: &[u8]) {
|
|
let hp = make_hp(cipher);
|
|
let mask = hp.mask(&[0; 16]).expect("should produce a mask");
|
|
assert_eq!(mask, expected, "first invocation should be correct");
|
|
|
|
#[allow(
|
|
clippy::allow_attributes,
|
|
clippy::redundant_clone,
|
|
reason = "False positive; remove once MSRV >= 1.88."
|
|
)]
|
|
let hp2 = hp.clone();
|
|
let mask = hp2.mask(&[0; 16]).expect("clone produces mask");
|
|
assert_eq!(mask, expected, "clone should produce the same mask");
|
|
|
|
let mask = hp.mask(&[0; 16]).expect("should produce a mask again");
|
|
assert_eq!(mask, expected, "second invocation should be the same");
|
|
}
|
|
|
|
#[test]
|
|
fn aes128() {
|
|
const EXPECTED: &[u8] = &[
|
|
0x04, 0x7b, 0xda, 0x65, 0xc3, 0x41, 0xcf, 0xbc, 0x5d, 0xe1, 0x75, 0x2b, 0x9d, 0x7d, 0xc3,
|
|
0x14,
|
|
];
|
|
|
|
hp_test(TLS_AES_128_GCM_SHA256, EXPECTED);
|
|
}
|
|
|
|
#[test]
|
|
fn aes256() {
|
|
const EXPECTED: &[u8] = &[
|
|
0xb5, 0xea, 0xa2, 0x1c, 0x25, 0x77, 0x48, 0x18, 0xbf, 0x25, 0xea, 0xfa, 0xbd, 0x8d, 0x80,
|
|
0x2b,
|
|
];
|
|
|
|
hp_test(TLS_AES_256_GCM_SHA384, EXPECTED);
|
|
}
|
|
|
|
#[test]
|
|
fn chacha20_ctr() {
|
|
const EXPECTED: &[u8] = &[
|
|
0x34, 0x11, 0xb3, 0x53, 0x02, 0x0b, 0x16, 0xda, 0x0a, 0x85, 0x5a, 0x52, 0x0d, 0x06, 0x07,
|
|
0x1f,
|
|
];
|
|
|
|
hp_test(TLS_CHACHA20_POLY1305_SHA256, EXPECTED);
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "out of range")]
|
|
fn aes_short() {
|
|
let hp = make_hp(TLS_AES_128_GCM_SHA256);
|
|
drop(hp.mask(&[0; 15]));
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "out of range")]
|
|
fn chacha20_short() {
|
|
let hp = make_hp(TLS_CHACHA20_POLY1305_SHA256);
|
|
drop(hp.mask(&[0; 15]));
|
|
}
|