use ffi;
pub const KEYBYTES: usize = ffi::crypto_kdf_blake2b_KEYBYTES as usize;
pub const CONTEXTBYTES: usize = ffi::crypto_kdf_blake2b_CONTEXTBYTES as usize;
pub const BYTES_MIN: usize = ffi::crypto_kdf_blake2b_BYTES_MIN as usize;
pub const BYTES_MAX: usize = ffi::crypto_kdf_blake2b_BYTES_MAX as usize;
new_type! {
public Key(KEYBYTES);
}
pub fn gen_key() -> Key {
use randombytes::randombytes_into;
let mut key = [0; KEYBYTES];
randombytes_into(&mut key);
Key(key)
}
pub fn derive_from_key(
subkey: &mut [u8],
subkey_id: u64,
ctx: [u8; CONTEXTBYTES],
key: &Key,
) -> Result<(), ()> {
unsafe {
let r = ffi::crypto_kdf_blake2b_derive_from_key(
subkey.as_mut_ptr() as _,
subkey.len(),
subkey_id,
ctx.as_ptr() as _,
key.0.as_ptr(),
);
if r != 0 {
Err(())
} else {
Ok(())
}
}
}
#[cfg(test)]
mod test {
use super::*;
#[test]
fn test_gen_key() {
let key1 = gen_key();
let key2 = gen_key();
assert_ne!(key1, key2);
}
#[test]
fn test_keysize_out_of_bounds() {
let key = Key([0u8; KEYBYTES]);
let ctx = [0u8; CONTEXTBYTES];
let mut subkey_too_small = vec![0; BYTES_MIN - 1];
let mut subkey_too_big = vec![0; BYTES_MAX + 1];
assert!(derive_from_key(subkey_too_small.as_mut_slice(), 1, ctx, &key).is_err());
assert!(derive_from_key(subkey_too_big.as_mut_slice(), 1, ctx, &key).is_err());
}
#[test]
fn test_vectors() {
{
let key = Key([0u8; KEYBYTES]);
let ctx = [0u8; CONTEXTBYTES];
let mut subkey1 = vec![0; 32];
derive_from_key(subkey1.as_mut_slice(), 1, ctx, &key).unwrap();
let mut subkey2 = vec![0; 32];
derive_from_key(subkey2.as_mut_slice(), 2, ctx, &key).unwrap();
let mut subkey3 = vec![0; 32];
derive_from_key(subkey3.as_mut_slice(), 3, ctx, &key).unwrap();
assert_eq!(
subkey1,
vec![
0x35, 0x87, 0xb8, 0x68, 0xc7, 0xc5, 0x04, 0x95, 0xf0, 0xe8, 0x36, 0xd9, 0x93,
0x58, 0x49, 0xff, 0x06, 0x5b, 0x53, 0x0b, 0xe2, 0x82, 0xe5, 0xd3, 0x56, 0x7e,
0xda, 0x61, 0x5d, 0x91, 0x01, 0x38,
]
);
assert_eq!(
subkey2,
vec![
0x1f, 0xde, 0x21, 0x0b, 0xc5, 0x49, 0xc4, 0x79, 0x67, 0xcb, 0x7b, 0x2e, 0x8f,
0xc7, 0xa6, 0xcd, 0x31, 0xfc, 0xad, 0x95, 0xc4, 0x8f, 0xc2, 0x8b, 0xe7, 0x60,
0x03, 0x53, 0xeb, 0xe1, 0x6d, 0x44,
]
);
assert_eq!(
subkey3,
vec![
0x91, 0x66, 0x81, 0x88, 0xb1, 0x6d, 0xc0, 0xee, 0x32, 0x17, 0xa3, 0xe2, 0xa8,
0x6a, 0x97, 0xb5, 0x42, 0xba, 0x13, 0x3b, 0xcd, 0x8e, 0x30, 0x7f, 0xf1, 0xb1,
0x77, 0x64, 0xd0, 0xe5, 0x7a, 0x8f,
]
);
}
{
let key = Key([1u8; KEYBYTES]);
let ctx = [2u8; CONTEXTBYTES];
let mut subkey1 = vec![0; 32];
derive_from_key(subkey1.as_mut_slice(), 1, ctx, &key).unwrap();
let mut subkey2 = vec![0; 32];
derive_from_key(subkey2.as_mut_slice(), 2, ctx, &key).unwrap();
let mut subkey3 = vec![0; 32];
derive_from_key(subkey3.as_mut_slice(), 3, ctx, &key).unwrap();
assert_eq!(
subkey1,
vec![
0x3b, 0xf2, 0xde, 0xf5, 0x76, 0xf5, 0xd3, 0xfc, 0xa3, 0x6a, 0x32, 0x85, 0x80,
0x96, 0x80, 0xdc, 0xc8, 0x60, 0x6f, 0x54, 0xbd, 0x79, 0xd5, 0x76, 0x6b, 0x47,
0xc5, 0x74, 0xdd, 0x05, 0x8a, 0xfb,
]
);
assert_eq!(
subkey2,
vec![
0x3d, 0x0d, 0x54, 0xb1, 0x54, 0xcc, 0x5f, 0x26, 0xe0, 0x66, 0x71, 0xc4, 0x9b,
0xc4, 0x3f, 0x61, 0x66, 0xac, 0xef, 0xe9, 0x0b, 0xf4, 0x71, 0x7b, 0xa1, 0x6f,
0xe4, 0x0c, 0xfa, 0x9d, 0x7b, 0x40,
]
);
assert_eq!(
subkey3,
vec![
0x4e, 0x00, 0x62, 0x56, 0x9a, 0xb1, 0x96, 0xa3, 0x2e, 0xfe, 0x2d, 0xa4, 0x09,
0xbd, 0x9b, 0x5b, 0x9d, 0x05, 0x28, 0x05, 0xd8, 0xcb, 0xb2, 0x7a, 0x6f, 0xa4,
0xca, 0xfb, 0xaf, 0x6f, 0xd5, 0xc7,
]
);
}
}
}