88 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			88 lines
		
	
	
		
			2.4 KiB
		
	
	
	
		
			Plaintext
		
	
	
		
			Executable File
		
	
	
	
	
| /* BEGIN_HEADER */
 | |
| #include "mbedtls/pkcs5.h"
 | |
| /* END_HEADER */
 | |
| 
 | |
| /* BEGIN_DEPENDENCIES
 | |
|  * depends_on:MBEDTLS_PKCS5_C
 | |
|  * END_DEPENDENCIES
 | |
|  */
 | |
| 
 | |
| /* BEGIN_CASE */
 | |
| void pbkdf2_hmac( int hash, char *hex_password_string,
 | |
|                   char *hex_salt_string, int it_cnt, int key_len,
 | |
|                   char *result_key_string )
 | |
| {
 | |
|     unsigned char pw_str[100];
 | |
|     unsigned char salt_str[100];
 | |
|     unsigned char dst_str[200];
 | |
| 
 | |
|     mbedtls_md_context_t ctx;
 | |
|     const mbedtls_md_info_t *info;
 | |
| 
 | |
|     int pw_len, salt_len;
 | |
|     unsigned char key[100];
 | |
| 
 | |
|     mbedtls_md_init( &ctx );
 | |
| 
 | |
|     memset(pw_str, 0x00, sizeof(pw_str));
 | |
|     memset(salt_str, 0x00, sizeof(salt_str));
 | |
|     memset(dst_str, 0x00, sizeof(dst_str));
 | |
| 
 | |
|     pw_len = unhexify( pw_str, hex_password_string );
 | |
|     salt_len = unhexify( salt_str, hex_salt_string );
 | |
| 
 | |
| 
 | |
|     info = mbedtls_md_info_from_type( hash );
 | |
|     TEST_ASSERT( info != NULL );
 | |
|     TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
 | |
|     TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
 | |
|                                      it_cnt, key_len, key ) == 0 );
 | |
| 
 | |
|     hexify( dst_str, key, key_len );
 | |
|     TEST_ASSERT( strcmp( (char *) dst_str, result_key_string ) == 0 );
 | |
| 
 | |
| exit:
 | |
|     mbedtls_md_free( &ctx );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
 | |
| void mbedtls_pkcs5_pbes2( int params_tag, char *params_hex, char *pw_hex,
 | |
|                   char *data_hex, int ref_ret, char *ref_out_hex )
 | |
| {
 | |
|     int my_ret;
 | |
|     mbedtls_asn1_buf params;
 | |
|     unsigned char *my_out = NULL, *ref_out = NULL, *data = NULL, *pw = NULL;
 | |
|     size_t ref_out_len, data_len, pw_len;
 | |
| 
 | |
|     params.tag = params_tag;
 | |
|     params.p = unhexify_alloc( params_hex, ¶ms.len );
 | |
| 
 | |
|     data = unhexify_alloc( data_hex, &data_len );
 | |
|     pw = unhexify_alloc( pw_hex, &pw_len );
 | |
|     ref_out = unhexify_alloc( ref_out_hex, &ref_out_len );
 | |
|     my_out = zero_alloc( ref_out_len );
 | |
| 
 | |
|     my_ret = mbedtls_pkcs5_pbes2( ¶ms, MBEDTLS_PKCS5_DECRYPT,
 | |
|                           pw, pw_len, data, data_len, my_out );
 | |
|     TEST_ASSERT( my_ret == ref_ret );
 | |
| 
 | |
|     if( ref_ret == 0 )
 | |
|         TEST_ASSERT( memcmp( my_out, ref_out, ref_out_len ) == 0 );
 | |
| 
 | |
| exit:
 | |
|     mbedtls_free( params.p );
 | |
|     mbedtls_free( data );
 | |
|     mbedtls_free( pw );
 | |
|     mbedtls_free( ref_out );
 | |
|     mbedtls_free( my_out );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
 | |
| void pkcs5_selftest( )
 | |
| {
 | |
|     TEST_ASSERT( mbedtls_pkcs5_self_test( 1 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 |