blob: 1f61db68b6124d6c3bdd3dc9b104a793d62c6169 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Paul Bakkerb0c19a42013-06-24 19:26:38 +02002#include <polarssl/pkcs5.h>
Paul Bakker33b43f12013-08-20 11:48:36 +02003/* END_HEADER */
Paul Bakkerb0c19a42013-06-24 19:26:38 +02004
Paul Bakker33b43f12013-08-20 11:48:36 +02005/* BEGIN_DEPENDENCIES
6 * depends_on:POLARSSL_PKCS5_C
7 * END_DEPENDENCIES
8 */
Paul Bakkerb0c19a42013-06-24 19:26:38 +02009
Paul Bakker33b43f12013-08-20 11:48:36 +020010/* BEGIN_CASE */
11void pbkdf2_hmac( int hash, char *hex_password_string,
12 char *hex_salt_string, int it_cnt, int key_len,
13 char *result_key_string )
Paul Bakkerb0c19a42013-06-24 19:26:38 +020014{
15 unsigned char pw_str[100];
16 unsigned char salt_str[100];
17 unsigned char dst_str[100];
18
19 md_context_t ctx;
20 const md_info_t *info;
21
22 int pw_len, salt_len;
23 unsigned char key[100];
24
Paul Bakkerd2a2d612014-07-01 15:45:49 +020025 md_init( &ctx );
26
Paul Bakkerb0c19a42013-06-24 19:26:38 +020027 memset(pw_str, 0x00, 100);
28 memset(salt_str, 0x00, 100);
29 memset(dst_str, 0x00, 100);
30
Paul Bakker33b43f12013-08-20 11:48:36 +020031 pw_len = unhexify( pw_str, hex_password_string );
32 salt_len = unhexify( salt_str, hex_salt_string );
Paul Bakkerb0c19a42013-06-24 19:26:38 +020033
34
Paul Bakker33b43f12013-08-20 11:48:36 +020035 info = md_info_from_type( hash );
Paul Bakkerb0c19a42013-06-24 19:26:38 +020036 TEST_ASSERT( info != NULL );
Paul Bakker68a4fce2013-08-20 12:42:31 +020037 if( info == NULL )
38 return;
Paul Bakkerb0c19a42013-06-24 19:26:38 +020039 TEST_ASSERT( md_init_ctx( &ctx, info ) == 0 );
40 TEST_ASSERT( pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
Paul Bakker33b43f12013-08-20 11:48:36 +020041 it_cnt, key_len, key ) == 0 );
Paul Bakkerb0c19a42013-06-24 19:26:38 +020042
Paul Bakker33b43f12013-08-20 11:48:36 +020043 hexify( dst_str, key, key_len );
44 TEST_ASSERT( strcmp( (char *) dst_str, result_key_string ) == 0 );
Paul Bakkerbd51b262014-07-10 15:26:12 +020045
46exit:
47 md_free( &ctx );
Paul Bakkerb0c19a42013-06-24 19:26:38 +020048}
Paul Bakker33b43f12013-08-20 11:48:36 +020049/* END_CASE */
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020050
51/* BEGIN_CASE */
52void pkcs5_pbes2( int params_tag, char *params_hex, char *pw_hex,
53 char *data_hex, int ref_ret, char *ref_out_hex )
54{
55 int my_ret;
56 asn1_buf params;
Paul Bakkerbd51b262014-07-10 15:26:12 +020057 unsigned char *my_out = NULL, *ref_out = NULL, *data = NULL, *pw = NULL;
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020058 size_t ref_out_len, data_len, pw_len;
59
60 params.tag = params_tag;
61 params.p = unhexify_alloc( params_hex, &params.len );
62
63 data = unhexify_alloc( data_hex, &data_len );
64 pw = unhexify_alloc( pw_hex, &pw_len );
65 ref_out = unhexify_alloc( ref_out_hex, &ref_out_len );
Manuel Pégourié-Gonnard0dc5e0d2014-06-13 21:09:26 +020066 my_out = zero_alloc( ref_out_len );
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020067
68 my_ret = pkcs5_pbes2( &params, PKCS5_DECRYPT,
69 pw, pw_len, data, data_len, my_out );
70 TEST_ASSERT( my_ret == ref_ret );
71
72 if( ref_ret == 0 )
73 TEST_ASSERT( memcmp( my_out, ref_out, ref_out_len ) == 0 );
74
Paul Bakkerbd51b262014-07-10 15:26:12 +020075exit:
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020076 polarssl_free( params.p );
77 polarssl_free( data );
78 polarssl_free( pw );
79 polarssl_free( ref_out );
80 polarssl_free( my_out );
81}
82/* END_CASE */