Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 1 | /* BEGIN_HEADER */ |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 2 | #include "mbedtls/pkcs5.h" |
Waleed Elmelegy | f3fafc3 | 2023-07-21 16:20:17 +0100 | [diff] [blame] | 3 | #include "mbedtls/cipher.h" |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 4 | /* END_HEADER */ |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 5 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 6 | /* BEGIN_DEPENDENCIES |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 7 | * depends_on:MBEDTLS_PKCS5_C |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 8 | * END_DEPENDENCIES |
| 9 | */ |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 10 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 11 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 12 | void pbkdf2_hmac(int hash, data_t *pw_str, data_t *salt_str, |
| 13 | int it_cnt, int key_len, data_t *result_key_string) |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 14 | { |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 15 | unsigned char key[100]; |
| 16 | |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 17 | MD_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 18 | TEST_ASSERT(mbedtls_pkcs5_pbkdf2_hmac_ext(hash, pw_str->x, pw_str->len, |
| 19 | salt_str->x, salt_str->len, |
| 20 | it_cnt, key_len, key) == 0); |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 21 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 22 | TEST_ASSERT(mbedtls_test_hexcmp(key, result_key_string->x, |
| 23 | key_len, result_key_string->len) == 0); |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 24 | |
| 25 | exit: |
| 26 | MD_PSA_DONE(); |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 27 | } |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 28 | /* END_CASE */ |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 29 | |
Andres Amaya Garcia | 576d474 | 2018-03-27 20:53:56 +0100 | [diff] [blame] | 30 | /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */ |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 31 | void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw, |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 32 | data_t *data, int outsize, int ref_ret, |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 33 | data_t *ref_out, int ref_out_len) |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 34 | { |
| 35 | int my_ret; |
| 36 | mbedtls_asn1_buf params; |
| 37 | unsigned char *my_out = NULL; |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 38 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 39 | size_t my_out_len = 0; |
| 40 | #endif |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 41 | MD_PSA_INIT(); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 42 | /* This parameter is only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */ |
| 43 | (void) ref_out_len; |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 44 | |
| 45 | params.tag = params_tag; |
| 46 | params.p = params_hex->x; |
| 47 | params.len = params_hex->len; |
| 48 | |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 49 | ASSERT_ALLOC(my_out, ref_out->len); |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 50 | |
| 51 | my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_ENCRYPT, |
| 52 | pw->x, pw->len, data->x, data->len, my_out); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 53 | if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) { |
| 54 | TEST_EQUAL(my_ret, ref_ret); |
| 55 | } |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 56 | if (ref_ret == 0) { |
| 57 | ASSERT_COMPARE(my_out, ref_out->len, |
| 58 | ref_out->x, ref_out->len); |
| 59 | } |
| 60 | |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 61 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 62 | my_ret = mbedtls_pkcs5_pbes2_ext(¶ms, MBEDTLS_PKCS5_ENCRYPT, |
| 63 | pw->x, pw->len, data->x, data->len, my_out, |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 64 | outsize, &my_out_len); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 65 | TEST_EQUAL(my_ret, ref_ret); |
| 66 | if (ref_ret == 0) { |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 67 | ASSERT_COMPARE(my_out, my_out_len, |
| 68 | ref_out->x, ref_out_len); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 69 | } |
| 70 | #endif |
| 71 | |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 72 | exit: |
| 73 | mbedtls_free(my_out); |
| 74 | MD_PSA_DONE(); |
| 75 | } |
| 76 | /* END_CASE */ |
| 77 | |
| 78 | /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 79 | void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw, |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 80 | data_t *data, int outsize, int ref_ret, |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 81 | data_t *ref_out, int ref_out_len) |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 82 | { |
| 83 | int my_ret; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 84 | mbedtls_asn1_buf params; |
Azim Khan | d30ca13 | 2017-06-09 04:32:58 +0100 | [diff] [blame] | 85 | unsigned char *my_out = NULL; |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 86 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 87 | size_t my_out_len = 0; |
| 88 | #endif |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 89 | |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 90 | MD_PSA_INIT(); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 91 | /* This parameter is only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */ |
| 92 | (void) ref_out_len; |
| 93 | |
Andrzej Kurek | 26909f3 | 2022-08-31 15:10:50 -0400 | [diff] [blame] | 94 | |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 95 | params.tag = params_tag; |
Azim Khan | d30ca13 | 2017-06-09 04:32:58 +0100 | [diff] [blame] | 96 | params.p = params_hex->x; |
| 97 | params.len = params_hex->len; |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 98 | |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 99 | ASSERT_ALLOC(my_out, ref_out->len); |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 100 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 101 | my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_DECRYPT, |
| 102 | pw->x, pw->len, data->x, data->len, my_out); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 103 | if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) { |
| 104 | TEST_EQUAL(my_ret, ref_ret); |
| 105 | } |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 106 | if (ref_ret == 0) { |
Waleed Elmelegy | 708d78f | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 107 | ASSERT_COMPARE(my_out, ref_out->len, |
| 108 | ref_out->x, ref_out->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 109 | } |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 110 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 111 | my_ret = mbedtls_pkcs5_pbes2_ext(¶ms, MBEDTLS_PKCS5_DECRYPT, |
| 112 | pw->x, pw->len, data->x, data->len, my_out, |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 113 | outsize, &my_out_len); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 114 | TEST_EQUAL(my_ret, ref_ret); |
| 115 | if (ref_ret == 0) { |
Waleed Elmelegy | 87bc1e1 | 2023-08-03 16:14:13 +0100 | [diff] [blame^] | 116 | ASSERT_COMPARE(my_out, my_out_len, |
| 117 | ref_out->x, ref_out_len); |
Waleed Elmelegy | 5d3f315 | 2023-08-01 14:56:30 +0100 | [diff] [blame] | 118 | } |
| 119 | #endif |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 120 | |
Paul Bakker | bd51b26 | 2014-07-10 15:26:12 +0200 | [diff] [blame] | 121 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 122 | mbedtls_free(my_out); |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 123 | MD_PSA_DONE(); |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 124 | } |
| 125 | /* END_CASE */ |
Paul Bakker | 81c6091 | 2016-07-19 14:54:57 +0100 | [diff] [blame] | 126 | |
| 127 | /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 128 | void pkcs5_selftest() |
Paul Bakker | 81c6091 | 2016-07-19 14:54:57 +0100 | [diff] [blame] | 129 | { |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 130 | MD_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 131 | TEST_ASSERT(mbedtls_pkcs5_self_test(1) == 0); |
Manuel Pégourié-Gonnard | 49e67f8 | 2023-03-16 11:39:20 +0100 | [diff] [blame] | 132 | |
| 133 | exit: |
| 134 | MD_PSA_DONE(); |
Paul Bakker | 81c6091 | 2016-07-19 14:54:57 +0100 | [diff] [blame] | 135 | } |
| 136 | /* END_CASE */ |