blob: f675f669f0a8fa93767d6bc1a6c4f80fdf472a98 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/pkcs5.h"
Waleed Elmelegya2307352023-07-21 16:20:17 +01003#include "mbedtls/cipher.h"
Paul Bakker33b43f12013-08-20 11:48:36 +02004/* END_HEADER */
Paul Bakkerb0c19a42013-06-24 19:26:38 +02005
Paul Bakker33b43f12013-08-20 11:48:36 +02006/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02007 * depends_on:MBEDTLS_PKCS5_C
Paul Bakker33b43f12013-08-20 11:48:36 +02008 * END_DEPENDENCIES
9 */
Paul Bakkerb0c19a42013-06-24 19:26:38 +020010
Paul Bakker33b43f12013-08-20 11:48:36 +020011/* BEGIN_CASE */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010012void pbkdf2_hmac(int hash, data_t *pw_str, data_t *salt_str,
13 int it_cnt, int key_len, data_t *result_key_string)
Paul Bakkerb0c19a42013-06-24 19:26:38 +020014{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020015 mbedtls_md_context_t ctx;
16 const mbedtls_md_info_t *info;
Paul Bakkerb0c19a42013-06-24 19:26:38 +020017
Paul Bakkerb0c19a42013-06-24 19:26:38 +020018 unsigned char key[100];
19
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010020 mbedtls_md_init(&ctx);
Paul Bakkerd2a2d612014-07-01 15:45:49 +020021
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010022 info = mbedtls_md_info_from_type(hash);
23 TEST_ASSERT(info != NULL);
24 TEST_ASSERT(mbedtls_md_setup(&ctx, info, 1) == 0);
25 TEST_ASSERT(mbedtls_pkcs5_pbkdf2_hmac(&ctx, pw_str->x, pw_str->len, salt_str->x, salt_str->len,
26 it_cnt, key_len, key) == 0);
Paul Bakkerb0c19a42013-06-24 19:26:38 +020027
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010028 TEST_ASSERT(mbedtls_test_hexcmp(key, result_key_string->x,
29 key_len, result_key_string->len) == 0);
Paul Bakkerbd51b262014-07-10 15:26:12 +020030
31exit:
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010032 mbedtls_md_free(&ctx);
Paul Bakkerb0c19a42013-06-24 19:26:38 +020033}
Paul Bakker33b43f12013-08-20 11:48:36 +020034/* END_CASE */
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020035
Andres Amaya Garcia576d4742018-03-27 20:53:56 +010036/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
Waleed Elmelegy412629c2023-07-19 14:01:35 +010037void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw,
Waleed Elmelegy23ae4162023-08-03 16:14:13 +010038 data_t *data, int outsize, int ref_ret,
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010039 data_t *ref_out, int ref_out_len)
Waleed Elmelegy412629c2023-07-19 14:01:35 +010040{
41 int my_ret;
42 mbedtls_asn1_buf params;
43 unsigned char *my_out = NULL;
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010044#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
45 size_t my_out_len = 0;
46#endif
47
Waleed Elmelegyd4e57c32023-08-04 11:39:01 +010048 /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010049 (void) ref_out_len;
Waleed Elmelegyd4e57c32023-08-04 11:39:01 +010050 (void) outsize;
Waleed Elmelegy412629c2023-07-19 14:01:35 +010051
Waleed Elmelegy412629c2023-07-19 14:01:35 +010052 params.tag = params_tag;
53 params.p = params_hex->x;
54 params.len = params_hex->len;
55
Waleed Elmelegy23ae4162023-08-03 16:14:13 +010056 ASSERT_ALLOC(my_out, ref_out->len);
Waleed Elmelegy412629c2023-07-19 14:01:35 +010057
58 my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_ENCRYPT,
59 pw->x, pw->len, data->x, data->len, my_out);
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010060 if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
61 TEST_EQUAL(my_ret, ref_ret);
62 }
Waleed Elmelegy412629c2023-07-19 14:01:35 +010063 if (ref_ret == 0) {
64 ASSERT_COMPARE(my_out, ref_out->len,
65 ref_out->x, ref_out->len);
66 }
67
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010068#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
69 my_ret = mbedtls_pkcs5_pbes2_ext(&params, MBEDTLS_PKCS5_ENCRYPT,
70 pw->x, pw->len, data->x, data->len, my_out,
Waleed Elmelegy23ae4162023-08-03 16:14:13 +010071 outsize, &my_out_len);
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010072 TEST_EQUAL(my_ret, ref_ret);
73 if (ref_ret == 0) {
Waleed Elmelegy23ae4162023-08-03 16:14:13 +010074 ASSERT_COMPARE(my_out, my_out_len,
75 ref_out->x, ref_out_len);
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010076 }
77#endif
78
Waleed Elmelegy412629c2023-07-19 14:01:35 +010079exit:
80 mbedtls_free(my_out);
Waleed Elmelegy412629c2023-07-19 14:01:35 +010081}
82/* END_CASE */
83
84/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +010085void mbedtls_pkcs5_pbes2(int params_tag, data_t *params_hex, data_t *pw,
Waleed Elmelegy23ae4162023-08-03 16:14:13 +010086 data_t *data, int outsize, int ref_ret,
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010087 data_t *ref_out, int ref_out_len)
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +020088{
89 int my_ret;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090 mbedtls_asn1_buf params;
Azim Khand30ca132017-06-09 04:32:58 +010091 unsigned char *my_out = NULL;
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010092#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
93 size_t my_out_len = 0;
94#endif
95
Waleed Elmelegyd4e57c32023-08-04 11:39:01 +010096 /* Those parameters are only used when MBEDTLS_CIPHER_PADDING_PKCS7 is enabled */
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010097 (void) ref_out_len;
Waleed Elmelegyd4e57c32023-08-04 11:39:01 +010098 (void) outsize;
Waleed Elmelegyb66cb652023-08-01 14:56:30 +010099
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200100
101 params.tag = params_tag;
Azim Khand30ca132017-06-09 04:32:58 +0100102 params.p = params_hex->x;
103 params.len = params_hex->len;
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200104
Waleed Elmelegy23ae4162023-08-03 16:14:13 +0100105 ASSERT_ALLOC(my_out, ref_out->len);
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200106
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100107 my_ret = mbedtls_pkcs5_pbes2(&params, MBEDTLS_PKCS5_DECRYPT,
108 pw->x, pw->len, data->x, data->len, my_out);
Waleed Elmelegyb66cb652023-08-01 14:56:30 +0100109 if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
110 TEST_EQUAL(my_ret, ref_ret);
111 }
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100112 if (ref_ret == 0) {
Waleed Elmelegy412629c2023-07-19 14:01:35 +0100113 ASSERT_COMPARE(my_out, ref_out->len,
114 ref_out->x, ref_out->len);
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100115 }
Waleed Elmelegyb66cb652023-08-01 14:56:30 +0100116#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
117 my_ret = mbedtls_pkcs5_pbes2_ext(&params, MBEDTLS_PKCS5_DECRYPT,
118 pw->x, pw->len, data->x, data->len, my_out,
Waleed Elmelegy23ae4162023-08-03 16:14:13 +0100119 outsize, &my_out_len);
Waleed Elmelegyb66cb652023-08-01 14:56:30 +0100120 TEST_EQUAL(my_ret, ref_ret);
121 if (ref_ret == 0) {
Waleed Elmelegy23ae4162023-08-03 16:14:13 +0100122 ASSERT_COMPARE(my_out, my_out_len,
123 ref_out->x, ref_out_len);
Waleed Elmelegyb66cb652023-08-01 14:56:30 +0100124 }
125#endif
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200126
Paul Bakkerbd51b262014-07-10 15:26:12 +0200127exit:
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100128 mbedtls_free(my_out);
Manuel Pégourié-Gonnard66aca932014-06-12 13:14:55 +0200129}
130/* END_CASE */
Paul Bakker81c60912016-07-19 14:54:57 +0100131
132/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100133void pkcs5_selftest()
Paul Bakker81c60912016-07-19 14:54:57 +0100134{
Gilles Peskine1b6c09a2023-01-11 14:52:35 +0100135 TEST_ASSERT(mbedtls_pkcs5_self_test(1) == 0);
Paul Bakker81c60912016-07-19 14:54:57 +0100136}
137/* END_CASE */