blob: 47de85e547db26e1cf3a54eb722ee50df06f4742 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/pkcs5.h"
Waleed Elmelegyf3fafc32023-07-21 16:20:17 +01003#include "mbedtls/cipher.h"
Paul Bakker33b43f12013-08-20 11:48:36 +02004/* END_HEADER */
Paul Bakkerb0c19a42013-06-24 19:26:38 +02005
Paul Bakker33b43f12013-08-20 11:48:36 +02006/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02007 * depends_on:MBEDTLS_PKCS5_C
Paul Bakker33b43f12013-08-20 11:48:36 +02008 * END_DEPENDENCIES
9 */
Paul Bakkerb0c19a42013-06-24 19:26:38 +020010
Paul Bakker33b43f12013-08-20 11:48:36 +020011/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +010012void pbkdf2_hmac(int hash, data_t *pw_str, data_t *salt_str,
13 int it_cnt, int key_len, data_t *result_key_string)
Paul Bakkerb0c19a42013-06-24 19:26:38 +020014{
Paul Bakkerb0c19a42013-06-24 19:26:38 +020015 unsigned char key[100];
16
Manuel Pégourié-Gonnard49e67f82023-03-16 11:39:20 +010017 MD_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +010018 TEST_ASSERT(mbedtls_pkcs5_pbkdf2_hmac_ext(hash, pw_str->x, pw_str->len,
19 salt_str->x, salt_str->len,
20 it_cnt, key_len, key) == 0);
Paul Bakkerb0c19a42013-06-24 19:26:38 +020021
Gilles Peskine449bd832023-01-11 14:50:10 +010022 TEST_ASSERT(mbedtls_test_hexcmp(key, result_key_string->x,
23 key_len, result_key_string->len) == 0);
Manuel Pégourié-Gonnard49e67f82023-03-16 11:39:20 +010024
25exit:
26 MD_PSA_DONE();
Paul Bakkerb0c19a42013-06-24 19:26:38 +020027}
Paul Bakker33b43f12013-08-20 11:48:36 +020028/* END_CASE */
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020029
Andres Amaya Garcia576d4742018-03-27 20:53:56 +010030/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010031void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw,
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +010032 data_t *data, int outsize, int ref_ret,
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010033 data_t *ref_out, int ref_out_len)
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010034{
35 int my_ret;
36 mbedtls_asn1_buf params;
37 unsigned char *my_out = NULL;
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010038#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
39 size_t my_out_len = 0;
40#endif
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010041 MD_PSA_INIT();
Waleed Elmelegy4a0a9892023-08-04 11:39:01 +010042 /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010043 (void) ref_out_len;
Waleed Elmelegy4a0a9892023-08-04 11:39:01 +010044 (void) outsize;
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010045
46 params.tag = params_tag;
47 params.p = params_hex->x;
48 params.len = params_hex->len;
49
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +010050 ASSERT_ALLOC(my_out, ref_out->len);
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010051
52 my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_ENCRYPT,
53 pw->x, pw->len, data->x, data->len, my_out);
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010054 if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
55 TEST_EQUAL(my_ret, ref_ret);
56 }
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010057 if (ref_ret == 0) {
58 ASSERT_COMPARE(my_out, ref_out->len,
59 ref_out->x, ref_out->len);
60 }
61
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010062#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
63 my_ret = mbedtls_pkcs5_pbes2_ext(&params, MBEDTLS_PKCS5_ENCRYPT,
64 pw->x, pw->len, data->x, data->len, my_out,
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +010065 outsize, &my_out_len);
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010066 TEST_EQUAL(my_ret, ref_ret);
67 if (ref_ret == 0) {
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +010068 ASSERT_COMPARE(my_out, my_out_len,
69 ref_out->x, ref_out_len);
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010070 }
71#endif
72
Waleed Elmelegy708d78f2023-07-19 14:01:35 +010073exit:
74 mbedtls_free(my_out);
75 MD_PSA_DONE();
76}
77/* END_CASE */
78
79/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
Gilles Peskine449bd832023-01-11 14:50:10 +010080void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw,
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +010081 data_t *data, int outsize, int ref_ret,
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010082 data_t *ref_out, int ref_out_len)
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020083{
84 int my_ret;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085 mbedtls_asn1_buf params;
Azim Khand30ca132017-06-09 04:32:58 +010086 unsigned char *my_out = NULL;
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010087#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
88 size_t my_out_len = 0;
89#endif
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020090
Manuel Pégourié-Gonnard49e67f82023-03-16 11:39:20 +010091 MD_PSA_INIT();
Waleed Elmelegy4a0a9892023-08-04 11:39:01 +010092 /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010093 (void) ref_out_len;
Waleed Elmelegy4a0a9892023-08-04 11:39:01 +010094 (void) outsize;
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +010095
Andrzej Kurek26909f32022-08-31 15:10:50 -040096
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020097 params.tag = params_tag;
Azim Khand30ca132017-06-09 04:32:58 +010098 params.p = params_hex->x;
99 params.len = params_hex->len;
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200100
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +0100101 ASSERT_ALLOC(my_out, ref_out->len);
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200102
Gilles Peskine449bd832023-01-11 14:50:10 +0100103 my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_DECRYPT,
104 pw->x, pw->len, data->x, data->len, my_out);
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +0100105 if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
106 TEST_EQUAL(my_ret, ref_ret);
107 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100108 if (ref_ret == 0) {
Waleed Elmelegy708d78f2023-07-19 14:01:35 +0100109 ASSERT_COMPARE(my_out, ref_out->len,
110 ref_out->x, ref_out->len);
Gilles Peskine449bd832023-01-11 14:50:10 +0100111 }
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +0100112#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
113 my_ret = mbedtls_pkcs5_pbes2_ext(&params, MBEDTLS_PKCS5_DECRYPT,
114 pw->x, pw->len, data->x, data->len, my_out,
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +0100115 outsize, &my_out_len);
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +0100116 TEST_EQUAL(my_ret, ref_ret);
117 if (ref_ret == 0) {
Waleed Elmelegy87bc1e12023-08-03 16:14:13 +0100118 ASSERT_COMPARE(my_out, my_out_len,
119 ref_out->x, ref_out_len);
Waleed Elmelegy5d3f3152023-08-01 14:56:30 +0100120 }
121#endif
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200122
Paul Bakkerbd51b262014-07-10 15:26:12 +0200123exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100124 mbedtls_free(my_out);
Manuel Pégourié-Gonnard49e67f82023-03-16 11:39:20 +0100125 MD_PSA_DONE();
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200126}
127/* END_CASE */
Paul Bakker81c60912016-07-19 14:54:57 +0100128
129/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
Gilles Peskine449bd832023-01-11 14:50:10 +0100130void pkcs5_selftest()
Paul Bakker81c60912016-07-19 14:54:57 +0100131{
Manuel Pégourié-Gonnard49e67f82023-03-16 11:39:20 +0100132 MD_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100133 TEST_ASSERT(mbedtls_pkcs5_self_test(1) == 0);
Manuel Pégourié-Gonnard49e67f82023-03-16 11:39:20 +0100134
135exit:
136 MD_PSA_DONE();
Paul Bakker81c60912016-07-19 14:54:57 +0100137}
138/* END_CASE */