test_suite_pkcs5.function 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. /* BEGIN_HEADER */
  2. #include "mbedtls/pkcs5.h"
  3. #include "mbedtls/legacy_or_psa.h"
  4. /* END_HEADER */
  5. /* BEGIN_DEPENDENCIES
  6. * depends_on:MBEDTLS_PKCS5_C
  7. * END_DEPENDENCIES
  8. */
  9. /* BEGIN_CASE */
  10. void pbkdf2_hmac(int hash, data_t *pw_str, data_t *salt_str,
  11. int it_cnt, int key_len, data_t *result_key_string)
  12. {
  13. unsigned char key[100];
  14. PSA_INIT_IF_NO_MD();
  15. TEST_ASSERT(mbedtls_pkcs5_pbkdf2_hmac_ext(hash, pw_str->x, pw_str->len,
  16. salt_str->x, salt_str->len,
  17. it_cnt, key_len, key) == 0);
  18. TEST_ASSERT(mbedtls_test_hexcmp(key, result_key_string->x,
  19. key_len, result_key_string->len) == 0);
  20. PSA_DONE_IF_NO_MD();
  21. }
  22. /* END_CASE */
  23. /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
  24. void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw,
  25. data_t *data, int ref_ret, data_t *ref_out)
  26. {
  27. int my_ret;
  28. mbedtls_asn1_buf params;
  29. unsigned char *my_out = NULL;
  30. PSA_INIT_IF_NO_MD();
  31. params.tag = params_tag;
  32. params.p = params_hex->x;
  33. params.len = params_hex->len;
  34. my_out = mbedtls_test_zero_alloc(ref_out->len);
  35. my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_DECRYPT,
  36. pw->x, pw->len, data->x, data->len, my_out);
  37. TEST_ASSERT(my_ret == ref_ret);
  38. if (ref_ret == 0) {
  39. TEST_ASSERT(memcmp(my_out, ref_out->x, ref_out->len) == 0);
  40. }
  41. exit:
  42. mbedtls_free(my_out);
  43. PSA_DONE_IF_NO_MD();
  44. }
  45. /* END_CASE */
  46. /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
  47. void pkcs5_selftest()
  48. {
  49. TEST_ASSERT(mbedtls_pkcs5_self_test(1) == 0);
  50. }
  51. /* END_CASE */