summaryrefslogtreecommitdiff
path: root/security/nss/gtests/pk11_gtest/pk11_export_unittest.cc
blob: e5d5ae8e99049d9ad5b2ede5ae414a42f58e7f9a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
 * You can obtain one at http://mozilla.org/MPL/2.0/. */

#include <memory>
#include "nss.h"
#include "pk11pub.h"

#include "gtest/gtest.h"
#include "scoped_ptrs.h"

namespace nss_test {

class Pkcs11ExportTest : public ::testing::Test {
 public:
  void Derive(bool is_export) {
    ScopedPK11SlotInfo slot(PK11_GetInternalSlot());
    EXPECT_TRUE(slot.get());

    uint8_t keyData[48] = {0};
    SECItem keyItem = {siBuffer, (unsigned char*)keyData, sizeof(keyData)};

    CK_MECHANISM_TYPE mechanism = CKM_NSS_TLS_KEY_AND_MAC_DERIVE_SHA256;
    ScopedPK11SymKey baseKey(PK11_ImportSymKey(
        slot.get(), mechanism, PK11_OriginUnwrap, CKA_WRAP, &keyItem, nullptr));
    EXPECT_TRUE(baseKey.get());

    CK_SSL3_KEY_MAT_OUT kmo;
    kmo.hClientMacSecret = CK_INVALID_HANDLE;
    kmo.hServerMacSecret = CK_INVALID_HANDLE;
    kmo.hClientKey = CK_INVALID_HANDLE;
    kmo.hServerKey = CK_INVALID_HANDLE;

    CK_BYTE iv[8];
    kmo.pIVClient = iv;
    kmo.pIVServer = iv;

    CK_SSL3_KEY_MAT_PARAMS kmp;
    kmp.ulMacSizeInBits = 256;
    kmp.ulKeySizeInBits = 128;
    kmp.ulIVSizeInBits = 64;
    kmp.pReturnedKeyMaterial = &kmo;
    kmp.bIsExport = is_export;

    unsigned char random[32] = {0};
    kmp.RandomInfo.pClientRandom = random;
    kmp.RandomInfo.ulClientRandomLen = sizeof(random);
    kmp.RandomInfo.pServerRandom = random;
    kmp.RandomInfo.ulServerRandomLen = sizeof(random);

    SECItem params = {siBuffer, (unsigned char*)&kmp, sizeof(kmp)};
    ScopedPK11SymKey symKey(PK11_Derive(baseKey.get(), mechanism, &params,
                                        CKM_SHA512_HMAC, CKA_SIGN, 16));

    // Deriving must fail when is_export=true.
    EXPECT_EQ(!symKey.get(), is_export);
  }
};

TEST_F(Pkcs11ExportTest, DeriveNonExport) { Derive(false); }

TEST_F(Pkcs11ExportTest, DeriveExport) { Derive(true); }

}  // namespace nss_test