2016-01-04 18:26:32 +00:00
|
|
|
/*-
|
|
|
|
* Copyright 2014 Square Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package josecipher
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto"
|
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Taken from: https://tools.ietf.org/id/draft-ietf-jose-json-web-algorithms-38.txt
|
|
|
|
func TestVectorConcatKDF(t *testing.T) {
|
|
|
|
z := []byte{
|
|
|
|
158, 86, 217, 29, 129, 113, 53, 211, 114, 131, 66, 131, 191, 132,
|
|
|
|
38, 156, 251, 49, 110, 163, 218, 128, 106, 72, 246, 218, 167, 121,
|
|
|
|
140, 254, 144, 196}
|
|
|
|
|
|
|
|
algID := []byte{0, 0, 0, 7, 65, 49, 50, 56, 71, 67, 77}
|
|
|
|
|
|
|
|
ptyUInfo := []byte{0, 0, 0, 5, 65, 108, 105, 99, 101}
|
|
|
|
ptyVInfo := []byte{0, 0, 0, 3, 66, 111, 98}
|
|
|
|
|
|
|
|
supPubInfo := []byte{0, 0, 0, 128}
|
|
|
|
supPrivInfo := []byte{}
|
|
|
|
|
|
|
|
expected := []byte{
|
|
|
|
86, 170, 141, 234, 248, 35, 109, 32, 92, 34, 40, 205, 113, 167, 16, 26}
|
|
|
|
|
|
|
|
ckdf := NewConcatKDF(crypto.SHA256, z, algID, ptyUInfo, ptyVInfo, supPubInfo, supPrivInfo)
|
|
|
|
|
|
|
|
out0 := make([]byte, 9)
|
|
|
|
out1 := make([]byte, 7)
|
|
|
|
|
|
|
|
read0, err := ckdf.Read(out0)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("error when reading from concat kdf reader", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
read1, err := ckdf.Read(out1)
|
|
|
|
if err != nil {
|
|
|
|
t.Error("error when reading from concat kdf reader", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if read0+read1 != len(out0)+len(out1) {
|
|
|
|
t.Error("did not receive enough bytes from concat kdf reader")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
out := []byte{}
|
|
|
|
out = append(out, out0...)
|
|
|
|
out = append(out, out1...)
|
|
|
|
|
|
|
|
if bytes.Compare(out, expected) != 0 {
|
|
|
|
t.Error("did not receive expected output from concat kdf reader")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCache(t *testing.T) {
|
|
|
|
z := []byte{
|
|
|
|
158, 86, 217, 29, 129, 113, 53, 211, 114, 131, 66, 131, 191, 132,
|
|
|
|
38, 156, 251, 49, 110, 163, 218, 128, 106, 72, 246, 218, 167, 121,
|
|
|
|
140, 254, 144, 196}
|
|
|
|
|
|
|
|
algID := []byte{1, 1, 1, 1, 2, 2, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4}
|
|
|
|
|
|
|
|
ptyUInfo := []byte{1, 2, 3, 4}
|
|
|
|
ptyVInfo := []byte{4, 3, 2, 1}
|
|
|
|
|
|
|
|
supPubInfo := []byte{}
|
|
|
|
supPrivInfo := []byte{}
|
|
|
|
|
|
|
|
outputs := [][]byte{}
|
|
|
|
|
|
|
|
// Read the same amount of data in different chunk sizes
|
2016-03-01 00:51:26 +00:00
|
|
|
chunkSizes := []int{1, 2, 4, 8, 16, 32, 64, 128, 256, 512}
|
|
|
|
|
|
|
|
for _, c := range chunkSizes {
|
2016-01-04 18:26:32 +00:00
|
|
|
out := make([]byte, 1024)
|
|
|
|
reader := NewConcatKDF(crypto.SHA256, z, algID, ptyUInfo, ptyVInfo, supPubInfo, supPrivInfo)
|
|
|
|
|
2016-03-01 00:51:26 +00:00
|
|
|
for i := 0; i < 1024; i += c {
|
|
|
|
_, _ = reader.Read(out[i : i+c])
|
2016-01-04 18:26:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
outputs = append(outputs, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := range outputs {
|
2016-03-01 00:51:26 +00:00
|
|
|
if bytes.Compare(outputs[i], outputs[(i+1)%len(outputs)]) != 0 {
|
2016-01-04 18:26:32 +00:00
|
|
|
t.Error("not all outputs from KDF matched")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func benchmarkKDF(b *testing.B, total int) {
|
|
|
|
z := []byte{
|
|
|
|
158, 86, 217, 29, 129, 113, 53, 211, 114, 131, 66, 131, 191, 132,
|
|
|
|
38, 156, 251, 49, 110, 163, 218, 128, 106, 72, 246, 218, 167, 121,
|
|
|
|
140, 254, 144, 196}
|
|
|
|
|
|
|
|
algID := []byte{1, 1, 1, 1, 2, 2, 2, 2, 3, 3, 3, 3, 4, 4, 4, 4}
|
|
|
|
|
|
|
|
ptyUInfo := []byte{1, 2, 3, 4}
|
|
|
|
ptyVInfo := []byte{4, 3, 2, 1}
|
|
|
|
|
|
|
|
supPubInfo := []byte{}
|
|
|
|
supPrivInfo := []byte{}
|
|
|
|
|
|
|
|
out := make([]byte, total)
|
|
|
|
reader := NewConcatKDF(crypto.SHA256, z, algID, ptyUInfo, ptyVInfo, supPubInfo, supPrivInfo)
|
|
|
|
|
|
|
|
b.ResetTimer()
|
|
|
|
b.SetBytes(int64(total))
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
_, _ = reader.Read(out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkConcatKDF_1k(b *testing.B) {
|
|
|
|
benchmarkKDF(b, 1024)
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkConcatKDF_64k(b *testing.B) {
|
|
|
|
benchmarkKDF(b, 65536)
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkConcatKDF_1MB(b *testing.B) {
|
|
|
|
benchmarkKDF(b, 1048576)
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkConcatKDF_64MB(b *testing.B) {
|
|
|
|
benchmarkKDF(b, 67108864)
|
|
|
|
}
|