Source file src/crypto/internal/fips140test/sshkdf_test.go

     1  // Copyright 2024 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  package fipstest
     6  
     7  import (
     8  	"bytes"
     9  	"crypto/internal/fips140/ssh"
    10  	"crypto/sha256"
    11  	"testing"
    12  )
    13  
    14  func TestSSHACVPVector(t *testing.T) {
    15  	// https://github.com/usnistgov/ACVP-Server/blob/3a7333f638/gen-val/json-files/kdf-components-ssh-1.0/prompt.json#L910-L915
    16  	K := decodeHex(t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
    17  	H := decodeHex(t, "8FB22F0864960DA5679FD377248E41C2D0390E5AB3BB7955A3B6C588FB75B20D")
    18  	sessionID := decodeHex(t, "269A512E7B560E13396E0F3F56BDA730E23EE122EE6D59C91C58FB07872BCCCC")
    19  
    20  	// https://github.com/usnistgov/ACVP-Server/blob/3a7333f638/gen-val/json-files/kdf-components-ssh-1.0/expectedResults.json#L1306-L1314
    21  	initialIVClient := decodeHex(t, "82321D9FE2ACD958D3F55F4D3FF5C79D")
    22  	initialIVServer := decodeHex(t, "03F336F61311770BD5346B41E04CDB1F")
    23  	encryptionKeyClient := decodeHex(t, "20E55008D0120C400F42E5D2E148AB75")
    24  	encryptionKeyServer := decodeHex(t, "8BF4DEBEC96F4ADBBE5BB43828D56E6D")
    25  	integrityKeyClient := decodeHex(t, "15F53BCCE2645D0AD1C539C09BF9054AA3A4B10B71E96B9E3A15672405341BB5")
    26  	integrityKeyServer := decodeHex(t, "00BB773FD63AC7B7281A7B54C130CCAD363EE8928104E67CA5A3211EE3BBAB93")
    27  
    28  	gotIVClient, gotKeyClient, gotIntegrityClient := ssh.Keys(
    29  		sha256.New, ssh.ClientKeys, K, H, sessionID, 16, 16, 32)
    30  	gotIVServer, gotKeyServer, gotIntegrityServer := ssh.Keys(
    31  		sha256.New, ssh.ServerKeys, K, H, sessionID, 16, 16, 32)
    32  
    33  	if !bytes.Equal(gotIVClient, initialIVClient) {
    34  		t.Errorf("got IV client %x, want %x", gotIVClient, initialIVClient)
    35  	}
    36  	if !bytes.Equal(gotKeyClient, encryptionKeyClient) {
    37  		t.Errorf("got key client %x, want %x", gotKeyClient, encryptionKeyClient)
    38  	}
    39  	if !bytes.Equal(gotIntegrityClient, integrityKeyClient) {
    40  		t.Errorf("got integrity key client %x, want %x", gotIntegrityClient, integrityKeyClient)
    41  	}
    42  	if !bytes.Equal(gotIVServer, initialIVServer) {
    43  		t.Errorf("got IV server %x, want %x", gotIVServer, initialIVServer)
    44  	}
    45  	if !bytes.Equal(gotKeyServer, encryptionKeyServer) {
    46  		t.Errorf("got key server %x, want %x", gotKeyServer, encryptionKeyServer)
    47  	}
    48  	if !bytes.Equal(gotIntegrityServer, integrityKeyServer) {
    49  		t.Errorf("got integrity key server %x, want %x", gotIntegrityServer, integrityKeyServer)
    50  	}
    51  }
    52  

View as plain text