test_suite_pkcs5.function 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. /* BEGIN_HEADER */
  2. #include "mbedtls/pkcs5.h"
  3. /* END_HEADER */
  4. /* BEGIN_DEPENDENCIES
  5. * depends_on:MBEDTLS_PKCS5_C
  6. * END_DEPENDENCIES
  7. */
  8. /* BEGIN_CASE */
  9. void pbkdf2_hmac( int hash, char *hex_password_string,
  10. char *hex_salt_string, int it_cnt, int key_len,
  11. char *result_key_string )
  12. {
  13. unsigned char pw_str[100];
  14. unsigned char salt_str[100];
  15. unsigned char dst_str[100];
  16. mbedtls_md_context_t ctx;
  17. const mbedtls_md_info_t *info;
  18. int pw_len, salt_len;
  19. unsigned char key[100];
  20. mbedtls_md_init( &ctx );
  21. memset(pw_str, 0x00, 100);
  22. memset(salt_str, 0x00, 100);
  23. memset(dst_str, 0x00, 100);
  24. pw_len = unhexify( pw_str, hex_password_string );
  25. salt_len = unhexify( salt_str, hex_salt_string );
  26. info = mbedtls_md_info_from_type( hash );
  27. TEST_ASSERT( info != NULL );
  28. TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
  29. TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
  30. it_cnt, key_len, key ) == 0 );
  31. hexify( dst_str, key, key_len );
  32. TEST_ASSERT( strcmp( (char *) dst_str, result_key_string ) == 0 );
  33. exit:
  34. mbedtls_md_free( &ctx );
  35. }
  36. /* END_CASE */
  37. /* BEGIN_CASE */
  38. void mbedtls_pkcs5_pbes2( int params_tag, char *params_hex, char *pw_hex,
  39. char *data_hex, int ref_ret, char *ref_out_hex )
  40. {
  41. int my_ret;
  42. mbedtls_asn1_buf params;
  43. unsigned char *my_out = NULL, *ref_out = NULL, *data = NULL, *pw = NULL;
  44. size_t ref_out_len, data_len, pw_len;
  45. params.tag = params_tag;
  46. params.p = unhexify_alloc( params_hex, &params.len );
  47. data = unhexify_alloc( data_hex, &data_len );
  48. pw = unhexify_alloc( pw_hex, &pw_len );
  49. ref_out = unhexify_alloc( ref_out_hex, &ref_out_len );
  50. my_out = zero_alloc( ref_out_len );
  51. my_ret = mbedtls_pkcs5_pbes2( &params, MBEDTLS_PKCS5_DECRYPT,
  52. pw, pw_len, data, data_len, my_out );
  53. TEST_ASSERT( my_ret == ref_ret );
  54. if( ref_ret == 0 )
  55. TEST_ASSERT( memcmp( my_out, ref_out, ref_out_len ) == 0 );
  56. exit:
  57. mbedtls_free( params.p );
  58. mbedtls_free( data );
  59. mbedtls_free( pw );
  60. mbedtls_free( ref_out );
  61. mbedtls_free( my_out );
  62. }
  63. /* END_CASE */
  64. /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
  65. void pkcs5_selftest( )
  66. {
  67. TEST_ASSERT( mbedtls_pkcs5_self_test( 1 ) == 0 );
  68. }
  69. /* END_CASE */