Split test/evptests.txt into separate files.
[openssl.git] / test / evpkdf.txt
1 #
2 # Copyright 2001-2017 The OpenSSL Project Authors. All Rights Reserved.
3 #
4 # Licensed under the OpenSSL license (the "License").  You may not use
5 # this file except in compliance with the License.  You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
8
9 # Tests start with one of these keywords
10 #       Cipher Decrypt Derive Digest Encoding KDF MAC PBE
11 #       PrivPubKeyPair Sign Verify VerifyRecover
12 # and continue until a blank line.  Lines starting with a pound sign,
13 # like this prolog, are ignored.
14
15 # TLS1 PRF tests, from NIST test vectors
16
17 KDF=TLS1-PRF
18 Ctrl.md = md:MD5-SHA1
19 Ctrl.Secret = hexsecret:bded7fa5c1699c010be23dd06ada3a48349f21e5f86263d512c0c5cc379f0e780ec55d9844b2f1db02a96453513568d0
20 Ctrl.label = seed:master secret
21 Ctrl.client_random = hexseed:e5acaf549cd25c22d964c0d930fa4b5261d2507fad84c33715b7b9a864020693
22 Ctrl.server_random = hexseed:135e4d557fdf3aa6406d82975d5c606a9734c9334b42136e96990fbd5358cdb2
23 Output = 2f6962dfbc744c4b2138bb6b3d33054c5ecc14f24851d9896395a44ab3964efc2090c5bf51a0891209f46c1e1e998f62
24
25 KDF=TLS1-PRF
26 Ctrl.md = md:MD5-SHA1
27 Ctrl.Secret = hexsecret:2f6962dfbc744c4b2138bb6b3d33054c5ecc14f24851d9896395a44ab3964efc2090c5bf51a0891209f46c1e1e998f62
28 Ctrl.label = seed:key expansion
29 Ctrl.server_random = hexseed:67267e650eb32444119d222a368c191af3082888dc35afe8368e638c828874be
30 Ctrl.client_random = hexseed:d58a7b1cd4fedaa232159df652ce188f9d997e061b9bf48e83b62990440931f6
31 Output = 3088825988e77fce68d19f756e18e43eb7fe672433504feaf99b3c503d9091b164f166db301d70c9fc0870b4a94563907bee1a61fb786cb717576890bcc51cb9ead97e01d0a2fea99c953377b195205ff07b369589178796edc963fd80fdbe518a2fc1c35c18ae8d
32
33 KDF=TLS1-PRF
34 Ctrl.md = md:SHA256
35 Ctrl.Secret = hexsecret:f8938ecc9edebc5030c0c6a441e213cd24e6f770a50dda07876f8d55da062bcadb386b411fd4fe4313a604fce6c17fbc
36 Ctrl.label = seed:master secret
37 Ctrl.client_random = hexseed:36c129d01a3200894b9179faac589d9835d58775f9b5ea3587cb8fd0364cae8c
38 Ctrl.server_random = hexseed:f6c9575ed7ddd73e1f7d16eca115415812a43c2b747daaaae043abfb50053fce
39 Output = 202c88c00f84a17a20027079604787461176455539e705be730890602c289a5001e34eeb3a043e5d52a65e66125188bf
40
41 KDF=TLS1-PRF
42 Ctrl.md = md:SHA256
43 Ctrl.Secret = hexsecret:202c88c00f84a17a20027079604787461176455539e705be730890602c289a5001e34eeb3a043e5d52a65e66125188bf
44 Ctrl.label = seed:key expansion
45 Ctrl.server_random = hexseed:ae6c806f8ad4d80784549dff28a4b58fd837681a51d928c3e30ee5ff14f39868
46 Ctrl.client_random = hexseed:62e1fd91f23f558a605f28478c58cf72637b89784d959df7e946d3f07bd1b616
47 Output = d06139889fffac1e3a71865f504aa5d0d2a2e89506c6f2279b670c3e1b74f531016a2530c51a3a0f7e1d6590d0f0566b2f387f8d11fd4f731cdd572d2eae927f6f2f81410b25e6960be68985add6c38445ad9f8c64bf8068bf9a6679485d966f1ad6f68b43495b10a683755ea2b858d70ccac7ec8b053c6bd41ca299d4e51928
48
49 # Missing digest.
50 KDF=TLS1-PRF
51 Ctrl.Secret = hexsecret:01
52 Ctrl.Seed = hexseed:02
53 Output = 03
54 Result = KDF_DERIVE_ERROR
55
56 # Missing secret.
57 KDF=TLS1-PRF
58 Ctrl.md = md:MD5-SHA1
59 Ctrl.Seed = hexseed:02
60 Output = 03
61 Result = KDF_DERIVE_ERROR
62
63 # HKDF tests, from RFC5869 test vectors
64
65 KDF = HKDF
66 Ctrl.md = md:SHA256
67 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
68 Ctrl.salt = hexsalt:000102030405060708090a0b0c
69 Ctrl.info = hexinfo:f0f1f2f3f4f5f6f7f8f9
70 Output = 3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865
71
72 KDF = HKDF
73 Ctrl.mode = mode:EXTRACT_ONLY
74 Ctrl.md = md:SHA256
75 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
76 Ctrl.salt = hexsalt:000102030405060708090a0b0c
77 Output = 077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5
78
79 KDF = HKDF
80 Ctrl.mode = mode:EXPAND_ONLY
81 Ctrl.md = md:SHA256
82 Ctrl.IKM = hexkey:077709362c2e32df0ddc3f0dc47bba6390b6c73bb50f9c3122ec844ad7c2b3e5
83 Ctrl.info = hexinfo:f0f1f2f3f4f5f6f7f8f9
84 Output = 3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865
85
86 KDF = HKDF
87 Ctrl.md = md:SHA256
88 Ctrl.IKM = hexkey:000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f
89 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf
90 Ctrl.info = hexinfo:b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
91 Output = b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87
92
93 KDF = HKDF
94 Ctrl.mode = mode:EXTRACT_ONLY
95 Ctrl.md = md:SHA256
96 Ctrl.IKM = hexkey:000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f
97 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf
98 Output = 06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244
99
100 KDF = HKDF
101 Ctrl.mode = mode:EXPAND_ONLY
102 Ctrl.md = md:SHA256
103 Ctrl.IKM = hexkey:06a6b88c5853361a06104c9ceb35b45cef760014904671014a193f40c15fc244
104 Ctrl.info = hexinfo:b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
105 Output = b11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87
106
107 KDF = HKDF
108 Ctrl.md = md:SHA256
109 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
110 Ctrl.salt = salt:
111 Ctrl.info = info:
112 Output = 8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8
113
114 KDF = HKDF
115 Ctrl.mode = mode:EXTRACT_ONLY
116 Ctrl.md = md:SHA256
117 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
118 Ctrl.salt = salt:
119 Ctrl.info = info:
120 Output = 19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04
121
122 KDF = HKDF
123 Ctrl.mode = mode:EXPAND_ONLY
124 Ctrl.md = md:SHA256
125 Ctrl.IKM = hexkey:19ef24a32c717b167f33a91d6f648bdf96596776afdb6377ac434c1c293ccb04
126 Ctrl.info = info:
127 Output = 8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8
128
129 KDF = HKDF
130 Ctrl.md = md:SHA1
131 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b
132 Ctrl.salt = hexsalt:000102030405060708090a0b0c
133 Ctrl.info = hexinfo:f0f1f2f3f4f5f6f7f8f9
134 Output = 085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896
135
136 KDF = HKDF
137 Ctrl.mode = mode:EXTRACT_ONLY
138 Ctrl.md = md:SHA1
139 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b
140 Ctrl.salt = hexsalt:000102030405060708090a0b0c
141 Output = 9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243
142
143 KDF = HKDF
144 Ctrl.mode = mode:EXPAND_ONLY
145 Ctrl.md = md:SHA1
146 Ctrl.IKM = hexkey:9b6c18c432a7bf8f0e71c8eb88f4b30baa2ba243
147 Ctrl.info = hexinfo:f0f1f2f3f4f5f6f7f8f9
148 Output = 085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896
149
150 KDF = HKDF
151 Ctrl.md = md:SHA1
152 Ctrl.IKM = hexkey:000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f
153 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf
154 Ctrl.info = hexinfo:b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
155 Output = 0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4
156
157 KDF = HKDF
158 Ctrl.mode = mode:EXTRACT_ONLY
159 Ctrl.md = md:SHA1
160 Ctrl.IKM = hexkey:000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f
161 Ctrl.salt = hexsalt:606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf
162 Output = 8adae09a2a307059478d309b26c4115a224cfaf6
163
164 KDF = HKDF
165 Ctrl.mode = mode:EXPAND_ONLY
166 Ctrl.md = md:SHA1
167 Ctrl.IKM = hexkey:8adae09a2a307059478d309b26c4115a224cfaf6
168 Ctrl.info = hexinfo:b0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff
169 Output = 0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4
170
171 KDF = HKDF
172 Ctrl.md = md:SHA1
173 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
174 Ctrl.salt = salt:
175 Ctrl.info = info:
176 Output = 0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918
177
178 KDF = HKDF
179 Ctrl.mode = mode:EXTRACT_ONLY
180 Ctrl.md = md:SHA1
181 Ctrl.IKM = hexkey:0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
182 Ctrl.salt = salt:
183 Output = da8c8a73c7fa77288ec6f5e7c297786aa0d32d01
184
185 KDF = HKDF
186 Ctrl.mode = mode:EXPAND_ONLY
187 Ctrl.md = md:SHA1
188 Ctrl.IKM = hexkey:da8c8a73c7fa77288ec6f5e7c297786aa0d32d01
189 Ctrl.info = info:
190 Output = 0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918
191
192 KDF = HKDF
193 Ctrl.md = md:SHA1
194 Ctrl.IKM = hexkey:0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
195 Ctrl.salt = salt:
196 Ctrl.info = info:
197 Output = 2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48
198
199 KDF = HKDF
200 Ctrl.mode = mode:EXTRACT_ONLY
201 Ctrl.md = md:SHA1
202 Ctrl.IKM = hexkey:0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
203 Ctrl.salt = salt:
204 Output = 2adccada18779e7c2077ad2eb19d3f3e731385dd
205
206 KDF = HKDF
207 Ctrl.mode = mode:EXPAND_ONLY
208 Ctrl.md = md:SHA1
209 Ctrl.IKM = hexkey:2adccada18779e7c2077ad2eb19d3f3e731385dd
210 Ctrl.info = info:
211 Output = 2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48
212
213 KDF = HKDF
214 Ctrl.IKM = hexkey:0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
215 Ctrl.salt = salt:
216 Ctrl.info = info:
217 Output = 00
218 Result = KDF_DERIVE_ERROR
219
220 KDF = HKDF
221 Ctrl.md = md:SHA1
222 Ctrl.salt = salt:
223 Ctrl.info = info:
224 Output = 00
225 Result = KDF_DERIVE_ERROR
226
227 KDF = HKDF
228 Ctrl.md = md:SHA1
229 Ctrl.IKM = hexkey:0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
230 Ctrl.info = info:
231 Output = 2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48
232
233 KDF = HKDF
234 Ctrl.md = md:SHA1
235 Ctrl.IKM = hexkey:0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
236 Ctrl.salt = salt:
237 Output = 2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48
238
239 KDF = HKDF
240 Ctrl.mode = mode:EXTRACT_AND_EXPAND
241 Ctrl.md = md:SHA1
242 Ctrl.IKM = hexkey:0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
243 Ctrl.salt = salt:
244 Output = 2c91117204d745f3500d636a62f64f0ab3bae548aa53d423b0d1f27ebba6f5e5673a081d70cce7acfc48
245
246