mbedtls/tests/suites/test_suite_pkcs5.function

63 lines
1.7 KiB
Text
Raw Normal View History

/* BEGIN_HEADER */
2015-03-09 18:05:11 +01:00
#include "mbedtls/pkcs5.h"
#include "mbedtls/legacy_or_psa.h"
/* END_HEADER */
/* BEGIN_DEPENDENCIES
* depends_on:MBEDTLS_PKCS5_C
* END_DEPENDENCIES
*/
/* BEGIN_CASE */
void pbkdf2_hmac( int hash, data_t * pw_str, data_t * salt_str,
int it_cnt, int key_len, data_t * result_key_string )
{
unsigned char key[100];
PSA_INIT_IF_NO_MD();
TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac_ext( hash, pw_str->x, pw_str->len,
salt_str->x, salt_str->len,
it_cnt, key_len, key ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( key, result_key_string->x,
key_len, result_key_string->len ) == 0 );
PSA_DONE_IF_NO_MD();
}
/* END_CASE */
2014-06-12 13:14:55 +02:00
/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
void mbedtls_pkcs5_pbes2( int params_tag, data_t *params_hex, data_t *pw,
data_t *data, int ref_ret, data_t *ref_out )
2014-06-12 13:14:55 +02:00
{
int my_ret;
mbedtls_asn1_buf params;
2017-06-09 05:32:58 +02:00
unsigned char *my_out = NULL;
2014-06-12 13:14:55 +02:00
PSA_INIT_IF_NO_MD();
2014-06-12 13:14:55 +02:00
params.tag = params_tag;
2017-06-09 05:32:58 +02:00
params.p = params_hex->x;
params.len = params_hex->len;
2014-06-12 13:14:55 +02:00
my_out = mbedtls_test_zero_alloc( ref_out->len );
2014-06-12 13:14:55 +02:00
my_ret = mbedtls_pkcs5_pbes2( &params, MBEDTLS_PKCS5_DECRYPT,
2017-06-09 05:32:58 +02:00
pw->x, pw->len, data->x, data->len, my_out );
2014-06-12 13:14:55 +02:00
TEST_ASSERT( my_ret == ref_ret );
if( ref_ret == 0 )
2017-06-09 05:32:58 +02:00
TEST_ASSERT( memcmp( my_out, ref_out->x, ref_out->len ) == 0 );
2014-06-12 13:14:55 +02:00
exit:
mbedtls_free( my_out );
PSA_DONE_IF_NO_MD();
2014-06-12 13:14:55 +02:00
}
/* END_CASE */
2016-07-19 15:54:57 +02:00
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
2017-05-30 15:23:15 +02:00
void pkcs5_selftest( )
2016-07-19 15:54:57 +02:00
{
TEST_ASSERT( mbedtls_pkcs5_self_test( 1 ) == 0 );
2016-07-19 15:54:57 +02:00
}
/* END_CASE */