| /* Written by Christian Heimes, 2013 */ |
| /* |
| * Copyright (c) 2013 The OpenSSL Project. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. All advertising materials mentioning features or use of this |
| * software must display the following acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" |
| * |
| * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
| * endorse or promote products derived from this software without |
| * prior written permission. For written permission, please contact |
| * openssl-core@openssl.org. |
| * |
| * 5. Products derived from this software may not be called "OpenSSL" |
| * nor may "OpenSSL" appear in their names without prior written |
| * permission of the OpenSSL Project. |
| * |
| * 6. Redistributions of any form whatsoever must retain the following |
| * acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit (http://www.openssl.org/)" |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
| * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| * OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include <stdio.h> |
| #include <string.h> |
| |
| #include "../e_os.h" |
| |
| #include <openssl/opensslconf.h> |
| #include <openssl/evp.h> |
| #ifndef OPENSSL_NO_ENGINE |
| # include <openssl/engine.h> |
| #endif |
| #include <openssl/err.h> |
| #include <openssl/conf.h> |
| |
| typedef struct { |
| const char *pass; |
| int passlen; |
| const char *salt; |
| int saltlen; |
| int iter; |
| } testdata; |
| |
| static testdata test_cases[] = { |
| {"password", 8, "salt", 4, 1}, |
| {"password", 8, "salt", 4, 2}, |
| {"password", 8, "salt", 4, 4096}, |
| {"passwordPASSWORDpassword", 24, |
| "saltSALTsaltSALTsaltSALTsaltSALTsalt", 36, 4096}, |
| {"pass\0word", 9, "sa\0lt", 5, 4096}, |
| {NULL}, |
| }; |
| |
| static const char *sha1_results[] = { |
| "0c60c80f961f0e71f3a9b524af6012062fe037a6", |
| "ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957", |
| "4b007901b765489abead49d926f721d065a429c1", |
| "3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038", |
| "56fa6aa75548099dcc37d7f03425e0c3", |
| }; |
| |
| static const char *sha256_results[] = { |
| "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b", |
| "ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43", |
| "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a", |
| "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c63551" |
| "8c7dac47e9", |
| "89b69d0516f829893c696226650a8687", |
| }; |
| |
| static const char *sha512_results[] = { |
| "867f70cf1ade02cff3752599a3a53dc4af34c7a669815ae5d513554e1c8cf252c02d47" |
| "0a285a0501bad999bfe943c08f050235d7d68b1da55e63f73b60a57fce", |
| "e1d9c16aa681708a45f5c7c4e215ceb66e011a2e9f0040713f18aefdb866d53cf76cab" |
| "2868a39b9f7840edce4fef5a82be67335c77a6068e04112754f27ccf4e", |
| "d197b1b33db0143e018b12f3d1d1479e6cdebdcc97c5c0f87f6902e072f457b5143f30" |
| "602641b3d55cd335988cb36b84376060ecd532e039b742a239434af2d5", |
| "8c0511f4c6e597c6ac6315d8f0362e225f3c501495ba23b868c005174dc4ee71115b59" |
| "f9e60cd9532fa33e0f75aefe30225c583a186cd82bd4daea9724a3d3b8", |
| "9d9e9c4cd21fe4be24d5b8244c759665", |
| }; |
| |
| static void hexdump(FILE *f, const char *title, const unsigned char *s, int l) |
| { |
| int i; |
| fprintf(f, "%s", title); |
| for (i = 0; i < l; i++) { |
| fprintf(f, "%02x", s[i]); |
| } |
| fprintf(f, "\n"); |
| } |
| |
| static void convert(unsigned char *dst, const unsigned char *src, int len) |
| { |
| int i; |
| for (i = 0; i < len; i++, dst++, src += 2) { |
| unsigned int n; |
| sscanf((char *)src, "%2x", &n); |
| *dst = (unsigned char)n; |
| } |
| *dst = 0; |
| } |
| |
| static void |
| test_p5_pbkdf2(int i, char *digestname, testdata *test, const char *hex) |
| { |
| const EVP_MD *digest; |
| unsigned char *out; |
| unsigned char *expected; |
| int keylen, r; |
| |
| digest = EVP_get_digestbyname(digestname); |
| if (digest == NULL) { |
| fprintf(stderr, "unknown digest %s\n", digestname); |
| EXIT(5); |
| } |
| |
| if ((strlen(hex) % 2) != 0) { |
| fprintf(stderr, "odd hex digest %s %i\n", digestname, i); |
| EXIT(5); |
| } |
| keylen = strlen(hex) / 2; |
| expected = OPENSSL_malloc(keylen + 1); |
| out = OPENSSL_malloc(keylen + 1); |
| if ((expected == NULL) || (out == NULL)) { |
| fprintf(stderr, "malloc() failed\n"); |
| EXIT(5); |
| } |
| convert(expected, (const unsigned char *)hex, keylen); |
| |
| r = PKCS5_PBKDF2_HMAC(test->pass, test->passlen, |
| (const unsigned char *)test->salt, test->saltlen, |
| test->iter, digest, keylen, out); |
| |
| if (r == 0) { |
| fprintf(stderr, "PKCS5_PBKDF2_HMAC(%s) failure test %i\n", |
| digestname, i); |
| EXIT(3); |
| } |
| if (memcmp(expected, out, keylen) != 0) { |
| fprintf(stderr, "Wrong result for PKCS5_PBKDF2_HMAC(%s) test %i\n", |
| digestname, i); |
| hexdump(stderr, "expected: ", expected, keylen); |
| hexdump(stderr, "result: ", out, keylen); |
| EXIT(2); |
| } |
| OPENSSL_free(expected); |
| OPENSSL_free(out); |
| } |
| |
| int main(int argc, char **argv) |
| { |
| int i; |
| testdata *test = test_cases; |
| |
| CRYPTO_set_mem_debug(1); |
| CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); |
| |
| OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_ALL_BUILTIN, NULL); |
| |
| printf("PKCS5_PBKDF2_HMAC() tests "); |
| for (i = 0; test->pass != NULL; i++, test++) { |
| test_p5_pbkdf2(i, "sha1", test, sha1_results[i]); |
| test_p5_pbkdf2(i, "sha256", test, sha256_results[i]); |
| test_p5_pbkdf2(i, "sha512", test, sha512_results[i]); |
| printf("."); |
| } |
| printf(" done\n"); |
| |
| #ifndef OPENSSL_NO_CRYPTO_MDEBUG |
| if (CRYPTO_mem_leaks_fp(stderr) <= 0) |
| return 1; |
| # endif |
| return 0; |
| } |