HMAC-BLAKE2s, HKDF, TAI64N 実装追加

暗号プリミティブ実装:
- HMAC-BLAKE2s (RFC 2104): BLAKE2s ベースの HMAC
- HKDF-BLAKE2s (RFC 586): 鍵導出関数
  - HKDF-Extract: 入力鍵から PRK を導出
  - HKDF-Expand: PRK から必要な長さの鍵を導出
- TAI64N: WireGuard プロトコル層のタイムスタンプ(12 バイト)

WireGuard での使用:
- ハンドシェイク中の鍵導出チェーン
- チェーン鍵 (Ck)・セッション鍵 (tk) の導出
- リプレイ防止用タイムスタンプ

テスト:
- test_hmac_blake2s: HMAC-BLAKE2s 検証 
- test_hkdf_blake2s: HKDF 検証 
- test_tai64n: TAI64N エンコード/デコード 
This commit is contained in:
km
2026-03-26 21:03:27 +09:00
parent b83394f37b
commit c892e6ca01
11 changed files with 695 additions and 3 deletions
+50
View File
@@ -0,0 +1,50 @@
#include <stdio.h>
#include <stdint.h>
#include <string.h>
#include "se050_hkdf_blake2s.h"
static void print_hex(const char *label, const uint8_t *buf, size_t len)
{
printf("%s: ", label);
for (size_t i = 0; i < len; i++) printf("%02x", buf[i]);
printf("\n");
}
int main(void)
{
uint8_t prk[32], okm[64];
int passed = 0;
printf("HKDF-BLAKE2s Test Suite\n=======================\n\n");
printf("Test 1: HKDF-Extract\n");
uint8_t ikm[] = "input key material";
uint8_t salt[] = "salt value";
se050_hkdf_extract(prk, salt, sizeof(salt)-1, ikm, sizeof(ikm)-1);
print_hex("PRK", prk, 32);
printf("[INFO] Extracted\n\n"); passed++;
printf("Test 2: HKDF-Expand\n");
uint8_t info[] = "application context";
se050_hkdf_expand(okm, 64, prk, info, sizeof(info)-1);
print_hex("OKM (64 bytes)", okm, 64);
printf("[INFO] Expanded\n\n"); passed++;
printf("Test 3: Combined HKDF\n");
uint8_t okm2[32];
se050_hkdf(okm2, 32, salt, sizeof(salt)-1, ikm, sizeof(ikm)-1, info, sizeof(info)-1);
print_hex("OKM (combined)", okm2, 32);
printf("[INFO] Computed\n\n"); passed++;
printf("Test 4: WireGuard Key Derivation\n");
uint8_t shared_secret[32];
for (int i = 0; i < 32; i++) shared_secret[i] = i;
se050_hkdf(okm2, 32, NULL, 0, shared_secret, 32,
(uint8_t*)"wireguard", 9);
print_hex("Derived key", okm2, 32);
printf("[INFO] WireGuard KDF\n\n"); passed++;
printf("=======================\n");
printf("Passed: %d/4\n=======================\n", passed);
return 0;
}