Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 1 | /* BEGIN_HEADER */ |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 2 | #include "mbedtls/pkcs5.h" |
Waleed Elmelegy | a230735 | 2023-07-21 16:20:17 +0100 | [diff] [blame] | 3 | #include "mbedtls/cipher.h" |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 4 | /* END_HEADER */ |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 5 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 6 | /* BEGIN_DEPENDENCIES |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 7 | * depends_on:MBEDTLS_PKCS5_C |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 8 | * END_DEPENDENCIES |
| 9 | */ |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 10 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 11 | /* BEGIN_CASE */ |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 12 | void pbkdf2_hmac(int hash, data_t *pw_str, data_t *salt_str, |
| 13 | int it_cnt, int key_len, data_t *result_key_string) |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 14 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 15 | mbedtls_md_context_t ctx; |
| 16 | const mbedtls_md_info_t *info; |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 17 | |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 18 | unsigned char key[100]; |
| 19 | |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 20 | mbedtls_md_init(&ctx); |
Paul Bakker | d2a2d61 | 2014-07-01 15:45:49 +0200 | [diff] [blame] | 21 | |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 22 | info = mbedtls_md_info_from_type(hash); |
| 23 | TEST_ASSERT(info != NULL); |
| 24 | TEST_ASSERT(mbedtls_md_setup(&ctx, info, 1) == 0); |
| 25 | TEST_ASSERT(mbedtls_pkcs5_pbkdf2_hmac(&ctx, pw_str->x, pw_str->len, salt_str->x, salt_str->len, |
| 26 | it_cnt, key_len, key) == 0); |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 27 | |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 28 | TEST_ASSERT(mbedtls_test_hexcmp(key, result_key_string->x, |
| 29 | key_len, result_key_string->len) == 0); |
Paul Bakker | bd51b26 | 2014-07-10 15:26:12 +0200 | [diff] [blame] | 30 | |
| 31 | exit: |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 32 | mbedtls_md_free(&ctx); |
Paul Bakker | b0c19a4 | 2013-06-24 19:26:38 +0200 | [diff] [blame] | 33 | } |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 34 | /* END_CASE */ |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 35 | |
Andres Amaya Garcia | 576d474 | 2018-03-27 20:53:56 +0100 | [diff] [blame] | 36 | /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */ |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 37 | void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw, |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 38 | data_t *data, int datalen, int ref_ret, |
| 39 | data_t *ref_out, int ref_out_len) |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 40 | { |
| 41 | int my_ret; |
| 42 | mbedtls_asn1_buf params; |
| 43 | unsigned char *my_out = NULL; |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 44 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 45 | size_t my_out_len = 0; |
| 46 | #endif |
| 47 | |
| 48 | /* This parameter is only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */ |
| 49 | (void) ref_out_len; |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 50 | |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 51 | params.tag = params_tag; |
| 52 | params.p = params_hex->x; |
| 53 | params.len = params_hex->len; |
| 54 | |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 55 | ASSERT_ALLOC(my_out, datalen); |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 56 | |
| 57 | my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_ENCRYPT, |
| 58 | pw->x, pw->len, data->x, data->len, my_out); |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 59 | if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) { |
| 60 | TEST_EQUAL(my_ret, ref_ret); |
| 61 | } |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 62 | if (ref_ret == 0) { |
| 63 | ASSERT_COMPARE(my_out, ref_out->len, |
| 64 | ref_out->x, ref_out->len); |
| 65 | } |
| 66 | |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 67 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 68 | my_ret = mbedtls_pkcs5_pbes2_ext(¶ms, MBEDTLS_PKCS5_ENCRYPT, |
| 69 | pw->x, pw->len, data->x, data->len, my_out, |
| 70 | datalen, &my_out_len); |
| 71 | TEST_EQUAL(my_ret, ref_ret); |
| 72 | if (ref_ret == 0) { |
| 73 | ASSERT_COMPARE(my_out, ref_out->len, |
| 74 | ref_out->x, ref_out->len); |
| 75 | TEST_EQUAL(my_out_len, (size_t) ref_out_len); |
| 76 | } |
| 77 | #endif |
| 78 | |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 79 | exit: |
| 80 | mbedtls_free(my_out); |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 81 | } |
| 82 | /* END_CASE */ |
| 83 | |
| 84 | /* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */ |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 85 | void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw, |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 86 | data_t *data, int datalen, int ref_ret, |
| 87 | data_t *ref_out, int ref_out_len) |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 88 | { |
| 89 | int my_ret; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 90 | mbedtls_asn1_buf params; |
Azim Khan | d30ca13 | 2017-06-09 04:32:58 +0100 | [diff] [blame] | 91 | unsigned char *my_out = NULL; |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 92 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 93 | size_t my_out_len = 0; |
| 94 | #endif |
| 95 | |
| 96 | /* This parameter is only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */ |
| 97 | (void) ref_out_len; |
| 98 | |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 99 | |
| 100 | params.tag = params_tag; |
Azim Khan | d30ca13 | 2017-06-09 04:32:58 +0100 | [diff] [blame] | 101 | params.p = params_hex->x; |
| 102 | params.len = params_hex->len; |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 103 | |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 104 | ASSERT_ALLOC(my_out, datalen); |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 105 | |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 106 | my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_DECRYPT, |
| 107 | pw->x, pw->len, data->x, data->len, my_out); |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 108 | if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) { |
| 109 | TEST_EQUAL(my_ret, ref_ret); |
| 110 | } |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 111 | if (ref_ret == 0) { |
Waleed Elmelegy | 412629c | 2023-07-19 14:01:35 +0100 | [diff] [blame] | 112 | ASSERT_COMPARE(my_out, ref_out->len, |
| 113 | ref_out->x, ref_out->len); |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 114 | } |
Waleed Elmelegy | b66cb65 | 2023-08-01 14:56:30 +0100 | [diff] [blame^] | 115 | #if defined(MBEDTLS_CIPHER_PADDING_PKCS7) |
| 116 | my_ret = mbedtls_pkcs5_pbes2_ext(¶ms, MBEDTLS_PKCS5_DECRYPT, |
| 117 | pw->x, pw->len, data->x, data->len, my_out, |
| 118 | datalen, &my_out_len); |
| 119 | TEST_EQUAL(my_ret, ref_ret); |
| 120 | if (ref_ret == 0) { |
| 121 | ASSERT_COMPARE(my_out, ref_out->len, |
| 122 | ref_out->x, ref_out->len); |
| 123 | TEST_EQUAL(my_out_len, (size_t) ref_out_len); |
| 124 | } |
| 125 | #endif |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 126 | |
Paul Bakker | bd51b26 | 2014-07-10 15:26:12 +0200 | [diff] [blame] | 127 | exit: |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 128 | mbedtls_free(my_out); |
Manuel Pégourié-Gonnard | 66aca93 | 2014-06-12 13:14:55 +0200 | [diff] [blame] | 129 | } |
| 130 | /* END_CASE */ |
Paul Bakker | 81c6091 | 2016-07-19 14:54:57 +0100 | [diff] [blame] | 131 | |
| 132 | /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 133 | void pkcs5_selftest() |
Paul Bakker | 81c6091 | 2016-07-19 14:54:57 +0100 | [diff] [blame] | 134 | { |
Gilles Peskine | 1b6c09a | 2023-01-11 14:52:35 +0100 | [diff] [blame] | 135 | TEST_ASSERT(mbedtls_pkcs5_self_test(1) == 0); |
Paul Bakker | 81c6091 | 2016-07-19 14:54:57 +0100 | [diff] [blame] | 136 | } |
| 137 | /* END_CASE */ |