/* Copyright (c) 2017 - 2019 LiteSpeed Technologies Inc. See LICENSE. */ #include #include #include #include #include "lsquic_crypto.h" #ifdef WIN32 #pragma warning(disable:4295 4245) //4295: array is too small to include a terminating null character, 4245:initializing': conversion from 'int' to 'unsigned char', signed/unsigned mismatch #endif struct export_key_test { /* Line number for easy verification: */ int ekt_lineno; /* Input: */ size_t ekt_ikm_sz, ekt_salt_sz, ekt_context_sz; unsigned char ekt_ikm[0x20], ekt_salt[0x60], ekt_context[0x1000]; size_t ekt_server_key_sz, ekt_server_iv_sz, ekt_client_key_sz, ekt_client_iv_sz; /* Output: */ unsigned char ekt_server_key[32], ekt_client_key[32], ekt_server_iv[4], ekt_client_iv[4]; }; static const struct export_key_test tests[] = { #define BUF_PAIR(name, buf) .ekt_##name = buf, .ekt_##name##_sz = sizeof(buf) - 1 /* Convert using * sed '/^0x/{s/0x....: /"/; s~ .*~"~; s/ /\\x/g}' */ /* [0112/144512.438811:VERBOSE4:hkdf.cc(87)] secret: 0x0000: 73 65 63 72 65 74 secret [0112/144512.438876:VERBOSE4:hkdf.cc(88)] salt: 0x0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0x0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [0112/144512.438916:VERBOSE4:hkdf.cc(89)] info: 0x0000: 51 55 49 43 20 73 6f 75 72 63 65 20 61 64 64 72 QUIC.source.addr 0x0010: 65 73 73 20 74 6f 6b 65 6e 20 6b 65 79 ess.token.key [0112/144512.438983:VERBOSE4:hkdf.cc(103)] PRK: 0x0000: 18 10 e8 d3 41 b9 e6 1e 88 89 5f ba 0b 1a a2 bd ....A....._..... 0x0010: 03 cb 6c 8f ff 2b 36 8e 66 6e f8 ef de f5 b4 fb ..l..+6.fn...... [0112/144512.439042:VERBOSE4:hkdf.cc(149)] client key: 0x0000: 59 58 f5 06 ac 1f f9 e6 2d 0b f9 77 df 05 c9 35 YX......-..w...5 [0112/144512.439076:VERBOSE4:hkdf.cc(156)] server key: 0x0000: 45 ca 99 4a 40 bc e3 3b 32 16 59 51 98 36 d4 21 E..J@..;2.YQ.6.! */ { .ekt_lineno = __LINE__, .ekt_ikm = "secret", .ekt_ikm_sz = 6, BUF_PAIR(salt, "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" ), BUF_PAIR(context, "QUIC source address token key"), BUF_PAIR(client_key, "\x59\x58\xf5\x06\xac\x1f\xf9\xe6\x2d\x0b\xf9\x77\xdf\x05\xc9\x35" ), BUF_PAIR(server_key, "\x45\xca\x99\x4a\x40\xbc\xe3\x3b\x32\x16\x59\x51\x98\x36\xd4\x21" ), }, /* [0112/144522.376235:VERBOSE4:hkdf.cc(87)] secret: 0x0000: ab 62 c8 e1 03 63 b5 4e b9 c5 e4 f1 d9 47 ed 60 .b...c.N.....G.` 0x0010: 43 2f 3b c2 27 c3 2c 51 e7 7f e7 4b 5e a4 08 29 C/;.'.,Q...K^..) [0112/144522.376323:VERBOSE4:hkdf.cc(88)] salt: 0x0000: 58 77 dc d2 a5 d0 b3 7f 65 c3 cd 6b 03 a7 34 53 Xw......e..k..4S 0x0010: d7 8b 6e 56 3c a0 22 a2 ab 7a 1e 4c 40 e9 cf d6 ..nV<."..z.L@... 0x0020: 02 2e ef d3 08 bc d1 be cb 70 f1 92 8e ec 27 7b .........p....'{ 0x0030: b6 b5 27 ce ea 43 7d c2 34 b7 be 44 a3 89 70 9a ..'..C}.4..D..p. 0x0040: 62 65 46 fa e5 86 44 04 fb 66 22 2d 7c 07 b8 b8 beF...D..f"-|... [0112/144522.376423:VERBOSE4:hkdf.cc(89)] info: 0x0000: 51 55 49 43 20 6b 65 79 20 65 78 70 61 6e 73 69 QUIC.key.expansi 0x0010: 6f 6e 00 a8 9f 60 a0 05 e6 1a 02 43 48 4c 4f 18 on...`.....CHLO. 0x0020: 00 00 00 50 41 44 00 01 02 00 00 53 4e 49 00 10 ...PAD.....SNI.. 0x0030: 02 00 00 53 54 4b 00 44 02 00 00 53 4e 4f 00 74 ...STK.D...SNO.t 0x0040: 02 00 00 56 45 52 00 78 02 00 00 43 43 53 00 88 ...VER.x...CCS.. 0x0050: 02 00 00 4e 4f 4e 43 a8 02 00 00 4d 53 50 43 ac ...NONC....MSPC. 0x0060: 02 00 00 41 45 41 44 b0 02 00 00 53 43 49 44 c0 ...AEAD....SCID. 0x0070: 02 00 00 50 44 4d 44 c4 02 00 00 53 4d 48 4c c8 ...PDMD....SMHL. 0x0080: 02 00 00 49 43 53 4c cc 02 00 00 43 54 49 4d d4 ...ICSL....CTIM. 0x0090: 02 00 00 4e 4f 4e 50 f4 02 00 00 50 55 42 53 14 ...NONP....PUBS. 0x00a0: 03 00 00 4d 49 44 53 18 03 00 00 53 43 4c 53 1c ...MIDS....SCLS. 0x00b0: 03 00 00 4b 45 58 53 20 03 00 00 58 4c 43 54 28 ...KEXS....XLCT( 0x00c0: 03 00 00 43 53 43 54 28 03 00 00 43 43 52 54 30 ...CSCT(...CCRT0 0x00d0: 03 00 00 43 46 43 57 34 03 00 00 53 46 43 57 38 ...CFCW4...SFCW8 0x00e0: 03 00 00 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ...------------- 0x00f0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0100: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0110: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0120: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0130: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0140: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0150: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0160: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0170: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0180: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0190: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x01a0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x01b0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x01c0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x01d0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x01e0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x01f0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0200: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0210: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0220: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0230: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0240: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0250: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0260: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0270: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0280: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x0290: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x02a0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x02b0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x02c0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x02d0: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d ---------------- 0x02e0: 2d 2d 2d 2d 77 77 77 2e 65 78 61 6d 70 6c 65 2e ----www.example. 0x02f0: 6f 72 67 2f 22 e6 5d e0 f8 78 94 5a 23 2d ba b4 org/".]..x.Z#-.. 0x0300: d7 e8 aa 1a 46 21 20 20 94 7f 0d 7a 5e 2e 41 98 ....F!.....z^.A. 0x0310: 66 0e 44 88 eb f3 41 c5 b1 e2 65 a7 38 01 3c 2c f.D...A...e.8.<, 0x0320: 0d eb 00 2b 73 48 da 02 2e ef d3 08 bc d1 be cb ...+sH.......... 0x0330: 70 f1 92 8e ec 27 7b b6 b5 27 ce ea 43 7d c2 34 p....'{..'..C}.4 0x0340: b7 be 44 a3 89 70 9a 62 65 46 fa e5 86 44 04 fb ..D..p.beF...D.. 0x0350: 66 22 2d 7c 07 b8 b8 51 30 33 37 01 e8 81 60 92 f"-|...Q037...`. 0x0360: 92 1a e8 7e ed 80 86 a2 15 82 91 58 77 dc d2 a5 ...~.......Xw... 0x0370: d0 b3 7f 65 c3 cd 6b 03 a7 34 53 d7 8b 6e 56 3c ...e..k..4S..nV< 0x0380: a0 22 a2 ab 7a 1e 4c 40 e9 cf d6 64 00 00 00 43 ."..z.L@...d...C 0x0390: 43 32 30 08 68 02 10 36 fa fb 68 b3 8a aa a4 e7 C20.h..6..h..... 0x03a0: 96 41 ca 58 35 30 39 01 00 00 00 58 02 00 00 d2 .A.X509....X.... 0x03b0: dc 77 58 00 00 00 00 2d c8 07 0e 2a 4b 39 15 ae .wX....-...*K9.. 0x03c0: 98 1f 5c b1 6f ac 77 0e f7 ea dd 57 93 8b 38 f2 ..\.o.w....W..8. 0x03d0: 8a 45 f5 d3 01 c1 9b a5 79 21 45 36 4f c6 f6 83 .E......y!E6O... 0x03e0: bc ba 1d e5 06 c1 8e 69 4c b6 e2 99 35 17 a1 ca .......iL...5... 0x03f0: f0 d2 82 d9 a5 b0 3e 64 00 00 00 01 00 00 00 43 ......>d.......C 0x0400: 32 35 35 b4 e2 9f fc ab 17 f2 4a b4 e2 9f fc ab 255.......J..... 0x0410: 17 f2 4a 00 00 f0 00 00 00 60 00 53 43 46 47 06 ..J......`.SCFG. 0x0420: 00 00 00 41 45 41 44 08 00 00 00 53 43 49 44 18 ...AEAD....SCID. 0x0430: 00 00 00 50 55 42 53 3b 00 00 00 4b 45 58 53 3f ...PUBS;...KEXS? 0x0440: 00 00 00 4f 42 49 54 47 00 00 00 45 58 50 59 4f ...OBITG...EXPYO 0x0450: 00 00 00 41 45 53 47 43 43 32 30 08 68 02 10 36 ...AESGCC20.h..6 0x0460: fa fb 68 b3 8a aa a4 e7 96 41 ca 20 00 00 f6 00 ..h......A...... 0x0470: dd 9e 3e 30 4f d9 fb 26 77 4e ce 35 79 6d 98 6d ..>0O..&wN.5ym.m 0x0480: 9a e6 a5 19 c0 b8 72 66 cd 46 b1 b6 90 4a 43 32 ......rf.F...JC2 0x0490: 35 35 a5 d0 b3 7f 65 c3 cd 6b c8 2a 65 59 00 00 55....e..k.*eY.. 0x04a0: 00 00 30 82 03 b4 30 82 02 9c a0 03 02 01 02 02 ..0...0......... 0x04b0: 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 ..0...*.H....... 0x04c0: 00 30 1e 31 1c 30 1a 06 03 55 04 03 0c 13 51 55 .0.1.0...U....QU 0x04d0: 49 43 20 53 65 72 76 65 72 20 52 6f 6f 74 20 43 IC.Server.Root.C 0x04e0: 41 30 1e 17 0d 31 36 31 32 32 32 32 31 32 39 30 A0...16122221290 0x04f0: 34 5a 17 0d 31 36 31 32 32 35 32 31 32 39 30 34 4Z..161225212904 0x0500: 5a 30 64 31 0b 30 09 06 03 55 04 06 13 02 55 53 Z0d1.0...U....US 0x0510: 31 13 30 11 06 03 55 04 08 0c 0a 43 61 6c 69 66 1.0...U....Calif 0x0520: 6f 72 6e 69 61 31 16 30 14 06 03 55 04 07 0c 0d ornia1.0...U.... 0x0530: 4d 6f 75 6e 74 61 69 6e 20 56 69 65 77 31 14 30 Mountain.View1.0 0x0540: 12 06 03 55 04 0a 0c 0b 51 55 49 43 20 53 65 72 ...U....QUIC.Ser 0x0550: 76 65 72 31 12 30 10 06 03 55 04 03 0c 09 31 32 ver1.0...U....12 0x0560: 37 2e 30 2e 30 2e 31 30 82 01 22 30 0d 06 09 2a 7.0.0.10.."0...* 0x0570: 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 .H.............0 0x0580: 82 01 0a 02 82 01 01 00 f0 55 bf b6 81 96 69 f3 .........U....i. 0x0590: 7a 06 f7 68 89 af fe 9c 30 e9 bb e7 0d 9b 37 c1 z..h....0.....7. 0x05a0: f6 a0 b8 28 72 bc 53 8e 8c 2c 99 a0 63 fe 7e 84 ...(r.S..,..c.~. 0x05b0: cb 35 11 96 24 98 20 ee 22 59 53 61 47 aa bc 66 .5..$..."YSaG..f 0x05c0: 8f 05 4f ec b6 a7 9c 3c fb de a7 24 3f d8 fd 97 ..O....<...$?... 0x05d0: a8 79 50 80 86 11 3a a8 a4 1e fa 7b 1e cf 4b 5c .yP...:....{..K\ 0x05e0: 7e 1c 23 5b b2 e1 d4 d7 ca 32 6e 4c 74 01 42 f0 ~.#[.....2nLt.B. 0x05f0: 36 14 09 f8 c7 22 6f 13 69 4a 32 9d e1 33 36 1b 6...."o.iJ2..36. 0x0600: e6 4d 74 6c b8 fa 49 f0 9a 0d 81 9f c6 b8 88 79 .Mtl..I........y 0x0610: 70 6c 0c 1c fb f9 70 27 e8 c1 c7 dd ba d0 97 f9 pl....p'........ 0x0620: ca 1a 1f 24 64 3b f7 3d 4c 67 b1 e2 87 07 f9 a2 ...$d;.=Lg...... 0x0630: b8 d5 82 06 80 cd 1f 97 ca 4b 39 87 4f 0a b7 a7 .........K9.O... 0x0640: 36 cf f2 fe 08 7b 46 7d 25 61 f5 ec 18 13 f5 e1 6....{F}%a...... 0x0650: 4b a9 eb ec a8 53 7f ad 66 19 fb 22 70 cc fa df K....S..f.."p... 0x0660: 64 da f4 b1 07 17 3d b0 0f d7 0d df fe e8 9b 3a d.....=........: 0x0670: 86 fc a0 85 d1 03 a3 4d 89 9c cc de c6 c6 de 9a .......M........ 0x0680: d0 f3 7f 6d 1d 0a 8e 27 02 03 01 00 01 a3 81 b6 ...m...'........ 0x0690: 30 81 b3 30 0c 06 03 55 1d 13 01 01 ff 04 02 30 0..0...U.......0 0x06a0: 00 30 1d 06 03 55 1d 0e 04 16 04 14 1a 79 b5 96 .0...U.......y.. 0x06b0: b0 18 f3 1a 21 fd 8c 82 30 b9 af 94 60 d1 62 fe ....!...0...`.b. 0x06c0: 30 1f 06 03 55 1d 23 04 18 30 16 80 14 f2 38 71 0...U.#..0....8q 0x06d0: 39 4b 66 26 ac 8c 4b 3e cc 03 88 d7 55 1f aa 5d 9Kf&..K>....U..] 0x06e0: 92 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 .0...U.%..0...+. 0x06f0: 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 ........+....... 0x0700: 30 44 06 03 55 1d 11 04 3d 30 3b 82 0f 77 77 77 0D..U...=0;..www 0x0710: 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 82 10 6d 61 .example.org..ma 0x0720: 69 6c 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 82 10 il.example.org.. 0x0730: 6d 61 69 6c 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d mail.example.com 0x0740: 87 04 7f 00 00 01 30 0d 06 09 2a 86 48 86 f7 0d ......0...*.H... 0x0750: 01 01 0b 05 00 03 82 01 01 00 68 24 9a 07 f7 b8 ..........h$.... 0x0760: 7d 96 ef fd e5 0c 7c 2c 31 a8 95 e2 fa 05 a7 3e }.....|,1......> 0x0770: 98 3b 77 3c 0a e1 a2 16 51 7f 58 43 82 6c c4 66 .;w<....Q.XC.l.f 0x0780: f3 88 26 17 bd e5 d3 b1 84 2a b7 cf e1 d1 b2 85 ..&......*...... 0x0790: 3b fc 20 1a df 1d 24 f5 dc 58 b7 ef 36 72 9f d7 ;.....$..X..6r.. 0x07a0: da c5 f4 46 08 4b 17 64 99 1a b1 1e de 68 00 74 ...F.K.d.....h.t 0x07b0: 4c 1a 7c 55 b9 7f c3 2d fa 58 3b 6b 93 5a 0a 43 L.|U...-.X;k.Z.C 0x07c0: e3 41 4e 4e 5c 2c a6 0c cf 17 c4 86 ea 58 37 a2 .ANN\,.......X7. 0x07d0: 40 de 22 eb ad 07 77 05 cb 57 df 49 56 96 f7 d4 @."...w..W.IV... 0x07e0: a6 9a ac 65 c9 2e 0e dc 53 14 6c 1d 41 68 22 8d ...e....S.l.Ah". 0x07f0: 1f 40 49 6d b2 a7 6c 26 a5 60 52 a7 aa 8a 57 0c .@Im..l&.`R...W. 0x0800: d6 45 54 5b 18 75 00 c2 cb 64 ae 66 45 0d 96 67 .ET[.u...d.fE..g 0x0810: 0b 6d 11 c6 51 b5 2b e3 e8 68 2d 60 91 b0 bc 3c .m..Q.+..h-`...< 0x0820: 03 69 99 06 9f 16 e4 a8 b9 8c ac 04 9f 1f e9 0a .i.............. 0x0830: 81 eb 60 ae 27 6d 87 f7 0b cf 9c bb 1a db 15 8a ..`.'m.......... 0x0840: 92 08 28 5a ac 9d 37 2c 35 f2 c1 bb e6 01 4a f6 ..(Z..7,5.....J. 0x0850: 4b 67 f5 ec 1f 1f a7 04 9b 21 Kg.......! [0112/144522.378102:VERBOSE4:hkdf.cc(103)] PRK: 0x0000: 76 54 6a 15 79 39 65 66 5c 63 0d a9 85 d9 f8 89 vTj.y9ef\c...... 0x0010: a7 a5 c5 41 62 e0 6c 26 fb 42 32 30 3d 0a 32 80 ...Ab.l&.B20=.2. [0112/144522.378351:VERBOSE4:hkdf.cc(149)] client key: 0x0000: 52 79 c1 44 f0 8d 83 99 6b f3 b6 83 11 ff 31 25 Ry.D....k.....1% 0x0010: 86 79 d6 af 62 bc b3 71 1d 7e fa 71 35 9f f2 aa .y..b..q.~.q5... [0112/144522.378422:VERBOSE4:hkdf.cc(156)] server key: 0x0000: bf 3d 5e 92 6e 8f 09 15 3f 0b f3 0b 91 e8 84 50 .=^.n...?......P 0x0010: 73 33 81 86 be 9c 32 56 d7 b2 6a 57 67 80 46 fd s3....2V..jWg.F. [0112/144522.378489:VERBOSE4:hkdf.cc(163)] client IV: 0x0000: a1 c0 66 60 ..f` [0112/144522.378549:VERBOSE4:hkdf.cc(170)] server IV: 0x0000: fa 93 8b 39 ...9 [0112/144522.378594:VERBOSE4:hkdf.cc(176)] subkey secret: 0x0000: 55 3a eb 1e 23 82 a7 6b a6 22 a9 c8 23 7d c7 11 U:..#..k."..#}.. 0x0010: 7e 35 ca c8 c8 26 8c 36 cb 75 78 18 58 c5 d3 3a ~5...&.6.ux.X..: */ { .ekt_lineno = __LINE__, BUF_PAIR(ikm, "\xab\x62\xc8\xe1\x03\x63\xb5\x4e\xb9\xc5\xe4\xf1\xd9\x47\xed\x60" "\x43\x2f\x3b\xc2\x27\xc3\x2c\x51\xe7\x7f\xe7\x4b\x5e\xa4\x08\x29" ), BUF_PAIR(salt, "\x58\x77\xdc\xd2\xa5\xd0\xb3\x7f\x65\xc3\xcd\x6b\x03\xa7\x34\x53" "\xd7\x8b\x6e\x56\x3c\xa0\x22\xa2\xab\x7a\x1e\x4c\x40\xe9\xcf\xd6" "\x02\x2e\xef\xd3\x08\xbc\xd1\xbe\xcb\x70\xf1\x92\x8e\xec\x27\x7b" "\xb6\xb5\x27\xce\xea\x43\x7d\xc2\x34\xb7\xbe\x44\xa3\x89\x70\x9a" "\x62\x65\x46\xfa\xe5\x86\x44\x04\xfb\x66\x22\x2d\x7c\x07\xb8\xb8" ), BUF_PAIR(context, "\x51\x55\x49\x43\x20\x6b\x65\x79\x20\x65\x78\x70\x61\x6e\x73\x69" "\x6f\x6e\x00\xa8\x9f\x60\xa0\x05\xe6\x1a\x02\x43\x48\x4c\x4f\x18" "\x00\x00\x00\x50\x41\x44\x00\x01\x02\x00\x00\x53\x4e\x49\x00\x10" "\x02\x00\x00\x53\x54\x4b\x00\x44\x02\x00\x00\x53\x4e\x4f\x00\x74" "\x02\x00\x00\x56\x45\x52\x00\x78\x02\x00\x00\x43\x43\x53\x00\x88" "\x02\x00\x00\x4e\x4f\x4e\x43\xa8\x02\x00\x00\x4d\x53\x50\x43\xac" "\x02\x00\x00\x41\x45\x41\x44\xb0\x02\x00\x00\x53\x43\x49\x44\xc0" "\x02\x00\x00\x50\x44\x4d\x44\xc4\x02\x00\x00\x53\x4d\x48\x4c\xc8" "\x02\x00\x00\x49\x43\x53\x4c\xcc\x02\x00\x00\x43\x54\x49\x4d\xd4" "\x02\x00\x00\x4e\x4f\x4e\x50\xf4\x02\x00\x00\x50\x55\x42\x53\x14" "\x03\x00\x00\x4d\x49\x44\x53\x18\x03\x00\x00\x53\x43\x4c\x53\x1c" "\x03\x00\x00\x4b\x45\x58\x53\x20\x03\x00\x00\x58\x4c\x43\x54\x28" "\x03\x00\x00\x43\x53\x43\x54\x28\x03\x00\x00\x43\x43\x52\x54\x30" "\x03\x00\x00\x43\x46\x43\x57\x34\x03\x00\x00\x53\x46\x43\x57\x38" "\x03\x00\x00\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d\x2d" "\x2d\x2d\x2d\x2d\x77\x77\x77\x2e\x65\x78\x61\x6d\x70\x6c\x65\x2e" "\x6f\x72\x67\x2f\x22\xe6\x5d\xe0\xf8\x78\x94\x5a\x23\x2d\xba\xb4" "\xd7\xe8\xaa\x1a\x46\x21\x20\x20\x94\x7f\x0d\x7a\x5e\x2e\x41\x98" "\x66\x0e\x44\x88\xeb\xf3\x41\xc5\xb1\xe2\x65\xa7\x38\x01\x3c\x2c" "\x0d\xeb\x00\x2b\x73\x48\xda\x02\x2e\xef\xd3\x08\xbc\xd1\xbe\xcb" "\x70\xf1\x92\x8e\xec\x27\x7b\xb6\xb5\x27\xce\xea\x43\x7d\xc2\x34" "\xb7\xbe\x44\xa3\x89\x70\x9a\x62\x65\x46\xfa\xe5\x86\x44\x04\xfb" "\x66\x22\x2d\x7c\x07\xb8\xb8\x51\x30\x33\x37\x01\xe8\x81\x60\x92" "\x92\x1a\xe8\x7e\xed\x80\x86\xa2\x15\x82\x91\x58\x77\xdc\xd2\xa5" "\xd0\xb3\x7f\x65\xc3\xcd\x6b\x03\xa7\x34\x53\xd7\x8b\x6e\x56\x3c" "\xa0\x22\xa2\xab\x7a\x1e\x4c\x40\xe9\xcf\xd6\x64\x00\x00\x00\x43" "\x43\x32\x30\x08\x68\x02\x10\x36\xfa\xfb\x68\xb3\x8a\xaa\xa4\xe7" "\x96\x41\xca\x58\x35\x30\x39\x01\x00\x00\x00\x58\x02\x00\x00\xd2" "\xdc\x77\x58\x00\x00\x00\x00\x2d\xc8\x07\x0e\x2a\x4b\x39\x15\xae" "\x98\x1f\x5c\xb1\x6f\xac\x77\x0e\xf7\xea\xdd\x57\x93\x8b\x38\xf2" "\x8a\x45\xf5\xd3\x01\xc1\x9b\xa5\x79\x21\x45\x36\x4f\xc6\xf6\x83" "\xbc\xba\x1d\xe5\x06\xc1\x8e\x69\x4c\xb6\xe2\x99\x35\x17\xa1\xca" "\xf0\xd2\x82\xd9\xa5\xb0\x3e\x64\x00\x00\x00\x01\x00\x00\x00\x43" "\x32\x35\x35\xb4\xe2\x9f\xfc\xab\x17\xf2\x4a\xb4\xe2\x9f\xfc\xab" "\x17\xf2\x4a\x00\x00\xf0\x00\x00\x00\x60\x00\x53\x43\x46\x47\x06" "\x00\x00\x00\x41\x45\x41\x44\x08\x00\x00\x00\x53\x43\x49\x44\x18" "\x00\x00\x00\x50\x55\x42\x53\x3b\x00\x00\x00\x4b\x45\x58\x53\x3f" "\x00\x00\x00\x4f\x42\x49\x54\x47\x00\x00\x00\x45\x58\x50\x59\x4f" "\x00\x00\x00\x41\x45\x53\x47\x43\x43\x32\x30\x08\x68\x02\x10\x36" "\xfa\xfb\x68\xb3\x8a\xaa\xa4\xe7\x96\x41\xca\x20\x00\x00\xf6\x00" "\xdd\x9e\x3e\x30\x4f\xd9\xfb\x26\x77\x4e\xce\x35\x79\x6d\x98\x6d" "\x9a\xe6\xa5\x19\xc0\xb8\x72\x66\xcd\x46\xb1\xb6\x90\x4a\x43\x32" "\x35\x35\xa5\xd0\xb3\x7f\x65\xc3\xcd\x6b\xc8\x2a\x65\x59\x00\x00" "\x00\x00\x30\x82\x03\xb4\x30\x82\x02\x9c\xa0\x03\x02\x01\x02\x02" "\x01\x01\x30\x0d\x06\x09\x2a\x86\x48\x86\xf7\x0d\x01\x01\x0b\x05" "\x00\x30\x1e\x31\x1c\x30\x1a\x06\x03\x55\x04\x03\x0c\x13\x51\x55" "\x49\x43\x20\x53\x65\x72\x76\x65\x72\x20\x52\x6f\x6f\x74\x20\x43" "\x41\x30\x1e\x17\x0d\x31\x36\x31\x32\x32\x32\x32\x31\x32\x39\x30" "\x34\x5a\x17\x0d\x31\x36\x31\x32\x32\x35\x32\x31\x32\x39\x30\x34" "\x5a\x30\x64\x31\x0b\x30\x09\x06\x03\x55\x04\x06\x13\x02\x55\x53" "\x31\x13\x30\x11\x06\x03\x55\x04\x08\x0c\x0a\x43\x61\x6c\x69\x66" "\x6f\x72\x6e\x69\x61\x31\x16\x30\x14\x06\x03\x55\x04\x07\x0c\x0d" "\x4d\x6f\x75\x6e\x74\x61\x69\x6e\x20\x56\x69\x65\x77\x31\x14\x30" "\x12\x06\x03\x55\x04\x0a\x0c\x0b\x51\x55\x49\x43\x20\x53\x65\x72" "\x76\x65\x72\x31\x12\x30\x10\x06\x03\x55\x04\x03\x0c\x09\x31\x32" "\x37\x2e\x30\x2e\x30\x2e\x31\x30\x82\x01\x22\x30\x0d\x06\x09\x2a" "\x86\x48\x86\xf7\x0d\x01\x01\x01\x05\x00\x03\x82\x01\x0f\x00\x30" "\x82\x01\x0a\x02\x82\x01\x01\x00\xf0\x55\xbf\xb6\x81\x96\x69\xf3" "\x7a\x06\xf7\x68\x89\xaf\xfe\x9c\x30\xe9\xbb\xe7\x0d\x9b\x37\xc1" "\xf6\xa0\xb8\x28\x72\xbc\x53\x8e\x8c\x2c\x99\xa0\x63\xfe\x7e\x84" "\xcb\x35\x11\x96\x24\x98\x20\xee\x22\x59\x53\x61\x47\xaa\xbc\x66" "\x8f\x05\x4f\xec\xb6\xa7\x9c\x3c\xfb\xde\xa7\x24\x3f\xd8\xfd\x97" "\xa8\x79\x50\x80\x86\x11\x3a\xa8\xa4\x1e\xfa\x7b\x1e\xcf\x4b\x5c" "\x7e\x1c\x23\x5b\xb2\xe1\xd4\xd7\xca\x32\x6e\x4c\x74\x01\x42\xf0" "\x36\x14\x09\xf8\xc7\x22\x6f\x13\x69\x4a\x32\x9d\xe1\x33\x36\x1b" "\xe6\x4d\x74\x6c\xb8\xfa\x49\xf0\x9a\x0d\x81\x9f\xc6\xb8\x88\x79" "\x70\x6c\x0c\x1c\xfb\xf9\x70\x27\xe8\xc1\xc7\xdd\xba\xd0\x97\xf9" "\xca\x1a\x1f\x24\x64\x3b\xf7\x3d\x4c\x67\xb1\xe2\x87\x07\xf9\xa2" "\xb8\xd5\x82\x06\x80\xcd\x1f\x97\xca\x4b\x39\x87\x4f\x0a\xb7\xa7" "\x36\xcf\xf2\xfe\x08\x7b\x46\x7d\x25\x61\xf5\xec\x18\x13\xf5\xe1" "\x4b\xa9\xeb\xec\xa8\x53\x7f\xad\x66\x19\xfb\x22\x70\xcc\xfa\xdf" "\x64\xda\xf4\xb1\x07\x17\x3d\xb0\x0f\xd7\x0d\xdf\xfe\xe8\x9b\x3a" "\x86\xfc\xa0\x85\xd1\x03\xa3\x4d\x89\x9c\xcc\xde\xc6\xc6\xde\x9a" "\xd0\xf3\x7f\x6d\x1d\x0a\x8e\x27\x02\x03\x01\x00\x01\xa3\x81\xb6" "\x30\x81\xb3\x30\x0c\x06\x03\x55\x1d\x13\x01\x01\xff\x04\x02\x30" "\x00\x30\x1d\x06\x03\x55\x1d\x0e\x04\x16\x04\x14\x1a\x79\xb5\x96" "\xb0\x18\xf3\x1a\x21\xfd\x8c\x82\x30\xb9\xaf\x94\x60\xd1\x62\xfe" "\x30\x1f\x06\x03\x55\x1d\x23\x04\x18\x30\x16\x80\x14\xf2\x38\x71" "\x39\x4b\x66\x26\xac\x8c\x4b\x3e\xcc\x03\x88\xd7\x55\x1f\xaa\x5d" "\x92\x30\x1d\x06\x03\x55\x1d\x25\x04\x16\x30\x14\x06\x08\x2b\x06" "\x01\x05\x05\x07\x03\x01\x06\x08\x2b\x06\x01\x05\x05\x07\x03\x02" "\x30\x44\x06\x03\x55\x1d\x11\x04\x3d\x30\x3b\x82\x0f\x77\x77\x77" "\x2e\x65\x78\x61\x6d\x70\x6c\x65\x2e\x6f\x72\x67\x82\x10\x6d\x61" "\x69\x6c\x2e\x65\x78\x61\x6d\x70\x6c\x65\x2e\x6f\x72\x67\x82\x10" "\x6d\x61\x69\x6c\x2e\x65\x78\x61\x6d\x70\x6c\x65\x2e\x63\x6f\x6d" "\x87\x04\x7f\x00\x00\x01\x30\x0d\x06\x09\x2a\x86\x48\x86\xf7\x0d" "\x01\x01\x0b\x05\x00\x03\x82\x01\x01\x00\x68\x24\x9a\x07\xf7\xb8" "\x7d\x96\xef\xfd\xe5\x0c\x7c\x2c\x31\xa8\x95\xe2\xfa\x05\xa7\x3e" "\x98\x3b\x77\x3c\x0a\xe1\xa2\x16\x51\x7f\x58\x43\x82\x6c\xc4\x66" "\xf3\x88\x26\x17\xbd\xe5\xd3\xb1\x84\x2a\xb7\xcf\xe1\xd1\xb2\x85" "\x3b\xfc\x20\x1a\xdf\x1d\x24\xf5\xdc\x58\xb7\xef\x36\x72\x9f\xd7" "\xda\xc5\xf4\x46\x08\x4b\x17\x64\x99\x1a\xb1\x1e\xde\x68\x00\x74" "\x4c\x1a\x7c\x55\xb9\x7f\xc3\x2d\xfa\x58\x3b\x6b\x93\x5a\x0a\x43" "\xe3\x41\x4e\x4e\x5c\x2c\xa6\x0c\xcf\x17\xc4\x86\xea\x58\x37\xa2" "\x40\xde\x22\xeb\xad\x07\x77\x05\xcb\x57\xdf\x49\x56\x96\xf7\xd4" "\xa6\x9a\xac\x65\xc9\x2e\x0e\xdc\x53\x14\x6c\x1d\x41\x68\x22\x8d" "\x1f\x40\x49\x6d\xb2\xa7\x6c\x26\xa5\x60\x52\xa7\xaa\x8a\x57\x0c" "\xd6\x45\x54\x5b\x18\x75\x00\xc2\xcb\x64\xae\x66\x45\x0d\x96\x67" "\x0b\x6d\x11\xc6\x51\xb5\x2b\xe3\xe8\x68\x2d\x60\x91\xb0\xbc\x3c" "\x03\x69\x99\x06\x9f\x16\xe4\xa8\xb9\x8c\xac\x04\x9f\x1f\xe9\x0a" "\x81\xeb\x60\xae\x27\x6d\x87\xf7\x0b\xcf\x9c\xbb\x1a\xdb\x15\x8a" "\x92\x08\x28\x5a\xac\x9d\x37\x2c\x35\xf2\xc1\xbb\xe6\x01\x4a\xf6" "\x4b\x67\xf5\xec\x1f\x1f\xa7\x04\x9b\x21" ), BUF_PAIR(client_key, "\x52\x79\xc1\x44\xf0\x8d\x83\x99\x6b\xf3\xb6\x83\x11\xff\x31\x25" "\x86\x79\xd6\xaf\x62\xbc\xb3\x71\x1d\x7e\xfa\x71\x35\x9f\xf2\xaa" ), BUF_PAIR(server_key, "\xbf\x3d\x5e\x92\x6e\x8f\x09\x15\x3f\x0b\xf3\x0b\x91\xe8\x84\x50" "\x73\x33\x81\x86\xbe\x9c\x32\x56\xd7\xb2\x6a\x57\x67\x80\x46\xfd" ), BUF_PAIR(client_iv, "\xa1\xc0\x66\x60"), BUF_PAIR(server_iv, "\xfa\x93\x8b\x39"), /* [0112/144522.378594:VERBOSE4:hkdf.cc(176)] subkey secret: "\x55\x3a\xeb\x1e\x23\x82\xa7\x6b\xa6\x22\xa9\xc8\x23\x7d\xc7\x11" "\x7e\x35\xca\xc8\xc8\x26\x8c\x36\xcb\x75\x78\x18\x58\xc5\xd3\x3a" */ }, }; static void run_ekt_test (const struct export_key_test *test) { int s; unsigned char client_key[0x100], server_key[0x100], client_iv[0x100], server_iv[0x100]; /* XXX: sub_key is confusing -- why is it so large? */ unsigned char sub_key[0x1000]; /* Sanity check the test itself: */ assert(test->ekt_client_key_sz < sizeof(client_key)); assert(test->ekt_server_key_sz < sizeof(server_key)); assert(test->ekt_server_iv_sz < sizeof(server_iv)); assert(test->ekt_client_iv_sz < sizeof(client_iv)); s = export_key_material(test->ekt_ikm, (uint32_t)test->ekt_ikm_sz, test->ekt_salt, (int)test->ekt_salt_sz, test->ekt_context, (uint32_t)test->ekt_context_sz, (uint16_t)test->ekt_client_key_sz, client_key, (uint16_t)test->ekt_server_key_sz, server_key, (uint16_t)test->ekt_client_iv_sz, client_iv, (uint16_t)test->ekt_server_iv_sz, server_iv, sub_key); assert(0 == s); /* This function always returns zero */ if (test->ekt_client_key_sz) assert(0 == memcmp(client_key, test->ekt_client_key, test->ekt_client_key_sz)); if (test->ekt_server_key_sz) assert(0 == memcmp(server_key, test->ekt_server_key, test->ekt_server_key_sz)); } int main (void) { unsigned n; for (n = 0; n < sizeof(tests) / sizeof(tests[0]); ++n) run_ekt_test(&tests[n]); return 0; }