mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-23 20:05:47 +01:00
bfa440e9fb
Some unit tests for pbkdf2_hmac() have results longer than 99bytes when represented in hexadecimal form. For this reason extend the result array to accommodate longer strings. At the same time make memset() parametric to avoid bugs in the future. Signed-off-by: Antonio Quartulli <antonio@openvpn.net>
88 lines
2.4 KiB
Plaintext
88 lines
2.4 KiB
Plaintext
/* BEGIN_HEADER */
|
|
#include "mbedtls/pkcs5.h"
|
|
/* END_HEADER */
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
* depends_on:MBEDTLS_PKCS5_C
|
|
* END_DEPENDENCIES
|
|
*/
|
|
|
|
/* BEGIN_CASE */
|
|
void pbkdf2_hmac( int hash, char *hex_password_string,
|
|
char *hex_salt_string, int it_cnt, int key_len,
|
|
char *result_key_string )
|
|
{
|
|
unsigned char pw_str[100];
|
|
unsigned char salt_str[100];
|
|
unsigned char dst_str[200];
|
|
|
|
mbedtls_md_context_t ctx;
|
|
const mbedtls_md_info_t *info;
|
|
|
|
int pw_len, salt_len;
|
|
unsigned char key[100];
|
|
|
|
mbedtls_md_init( &ctx );
|
|
|
|
memset(pw_str, 0x00, sizeof(pw_str));
|
|
memset(salt_str, 0x00, sizeof(salt_str));
|
|
memset(dst_str, 0x00, sizeof(dst_str));
|
|
|
|
pw_len = unhexify( pw_str, hex_password_string );
|
|
salt_len = unhexify( salt_str, hex_salt_string );
|
|
|
|
|
|
info = mbedtls_md_info_from_type( hash );
|
|
TEST_ASSERT( info != NULL );
|
|
TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
|
|
TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
|
|
it_cnt, key_len, key ) == 0 );
|
|
|
|
hexify( dst_str, key, key_len );
|
|
TEST_ASSERT( strcmp( (char *) dst_str, result_key_string ) == 0 );
|
|
|
|
exit:
|
|
mbedtls_md_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void mbedtls_pkcs5_pbes2( int params_tag, char *params_hex, char *pw_hex,
|
|
char *data_hex, int ref_ret, char *ref_out_hex )
|
|
{
|
|
int my_ret;
|
|
mbedtls_asn1_buf params;
|
|
unsigned char *my_out = NULL, *ref_out = NULL, *data = NULL, *pw = NULL;
|
|
size_t ref_out_len, data_len, pw_len;
|
|
|
|
params.tag = params_tag;
|
|
params.p = unhexify_alloc( params_hex, ¶ms.len );
|
|
|
|
data = unhexify_alloc( data_hex, &data_len );
|
|
pw = unhexify_alloc( pw_hex, &pw_len );
|
|
ref_out = unhexify_alloc( ref_out_hex, &ref_out_len );
|
|
my_out = zero_alloc( ref_out_len );
|
|
|
|
my_ret = mbedtls_pkcs5_pbes2( ¶ms, MBEDTLS_PKCS5_DECRYPT,
|
|
pw, pw_len, data, data_len, my_out );
|
|
TEST_ASSERT( my_ret == ref_ret );
|
|
|
|
if( ref_ret == 0 )
|
|
TEST_ASSERT( memcmp( my_out, ref_out, ref_out_len ) == 0 );
|
|
|
|
exit:
|
|
mbedtls_free( params.p );
|
|
mbedtls_free( data );
|
|
mbedtls_free( pw );
|
|
mbedtls_free( ref_out );
|
|
mbedtls_free( my_out );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
|
|
void pkcs5_selftest( )
|
|
{
|
|
TEST_ASSERT( mbedtls_pkcs5_self_test( 1 ) == 0 );
|
|
}
|
|
/* END_CASE */
|