2013-06-24 17:26:38 +00:00
|
|
|
BEGIN_HEADER
|
|
|
|
#include <polarssl/pkcs5.h>
|
|
|
|
END_HEADER
|
|
|
|
|
|
|
|
BEGIN_DEPENDENCIES
|
|
|
|
depends_on:POLARSSL_PKCS5_C
|
|
|
|
END_DEPENDENCIES
|
|
|
|
|
|
|
|
BEGIN_CASE
|
2013-08-16 11:38:47 +00:00
|
|
|
pbkdf2_hmac:#hash:hex_password_string:hex_salt_string:#it_cnt:#key_len:result_key_string
|
2013-06-24 17:26:38 +00:00
|
|
|
{
|
|
|
|
unsigned char pw_str[100];
|
|
|
|
unsigned char salt_str[100];
|
|
|
|
unsigned char dst_str[100];
|
|
|
|
|
|
|
|
md_context_t ctx;
|
|
|
|
const md_info_t *info;
|
|
|
|
|
|
|
|
int pw_len, salt_len;
|
|
|
|
unsigned char key[100];
|
|
|
|
|
|
|
|
memset(pw_str, 0x00, 100);
|
|
|
|
memset(salt_str, 0x00, 100);
|
|
|
|
memset(dst_str, 0x00, 100);
|
|
|
|
|
|
|
|
pw_len = unhexify( pw_str, {hex_password_string} );
|
|
|
|
salt_len = unhexify( salt_str, {hex_salt_string} );
|
|
|
|
|
|
|
|
|
|
|
|
info = md_info_from_type( {hash} );
|
|
|
|
TEST_ASSERT( info != NULL );
|
|
|
|
TEST_ASSERT( md_init_ctx( &ctx, info ) == 0 );
|
|
|
|
TEST_ASSERT( pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
|
|
|
|
{it_cnt}, {key_len}, key ) == 0 );
|
2013-07-03 12:45:46 +00:00
|
|
|
TEST_ASSERT( md_free_ctx( &ctx ) == 0 );
|
2013-06-24 17:26:38 +00:00
|
|
|
|
|
|
|
hexify( dst_str, key, {key_len} );
|
|
|
|
TEST_ASSERT( strcmp( (char *) dst_str, {result_key_string} ) == 0 );
|
|
|
|
}
|
|
|
|
END_CASE
|