mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-03 20:22:59 -05:00 
			
		
		
		
	Switch pkparse to use new mbedtls_pkcs5_pbes2_ext function and deprecate mbedtls_pkcs5_pbes2 function. Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
		
			
				
	
	
		
			137 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			137 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* BEGIN_HEADER */
 | 
						|
#include "mbedtls/pkcs5.h"
 | 
						|
#include "mbedtls/cipher.h"
 | 
						|
/* END_HEADER */
 | 
						|
 | 
						|
/* BEGIN_DEPENDENCIES
 | 
						|
 * depends_on:MBEDTLS_PKCS5_C
 | 
						|
 * END_DEPENDENCIES
 | 
						|
 */
 | 
						|
 | 
						|
/* BEGIN_CASE */
 | 
						|
void pbkdf2_hmac(int hash, data_t *pw_str, data_t *salt_str,
 | 
						|
                 int it_cnt, int key_len, data_t *result_key_string)
 | 
						|
{
 | 
						|
    unsigned char key[100];
 | 
						|
 | 
						|
    MD_PSA_INIT();
 | 
						|
    TEST_ASSERT(mbedtls_pkcs5_pbkdf2_hmac_ext(hash, pw_str->x, pw_str->len,
 | 
						|
                                              salt_str->x, salt_str->len,
 | 
						|
                                              it_cnt, key_len, key) == 0);
 | 
						|
 | 
						|
    TEST_ASSERT(mbedtls_test_hexcmp(key, result_key_string->x,
 | 
						|
                                    key_len, result_key_string->len) == 0);
 | 
						|
 | 
						|
exit:
 | 
						|
    MD_PSA_DONE();
 | 
						|
}
 | 
						|
/* END_CASE */
 | 
						|
 | 
						|
/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
 | 
						|
void pbes2_encrypt(int params_tag, data_t *params_hex, data_t *pw,
 | 
						|
                   data_t *data, int outsize, int ref_ret,
 | 
						|
                   data_t *ref_out)
 | 
						|
{
 | 
						|
    int my_ret;
 | 
						|
    mbedtls_asn1_buf params;
 | 
						|
    unsigned char *my_out = NULL;
 | 
						|
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
 | 
						|
    size_t my_out_len = 0;
 | 
						|
#endif
 | 
						|
    MD_PSA_INIT();
 | 
						|
 | 
						|
    params.tag = params_tag;
 | 
						|
    params.p = params_hex->x;
 | 
						|
    params.len = params_hex->len;
 | 
						|
 | 
						|
    ASSERT_ALLOC(my_out, outsize);
 | 
						|
 | 
						|
#if defined(MBEDTLS_TEST_DEPRECATED)
 | 
						|
    if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
 | 
						|
        my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_ENCRYPT,
 | 
						|
                                     pw->x, pw->len, data->x, data->len, my_out);
 | 
						|
        TEST_EQUAL(my_ret, ref_ret);
 | 
						|
    }
 | 
						|
    if (ref_ret == 0) {
 | 
						|
        ASSERT_COMPARE(my_out, ref_out->len,
 | 
						|
                       ref_out->x, ref_out->len);
 | 
						|
    }
 | 
						|
#endif
 | 
						|
 | 
						|
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
 | 
						|
    my_ret = mbedtls_pkcs5_pbes2_ext(¶ms, MBEDTLS_PKCS5_ENCRYPT,
 | 
						|
                                     pw->x, pw->len, data->x, data->len, my_out,
 | 
						|
                                     outsize, &my_out_len);
 | 
						|
    TEST_EQUAL(my_ret, ref_ret);
 | 
						|
    if (ref_ret == 0) {
 | 
						|
        ASSERT_COMPARE(my_out, my_out_len,
 | 
						|
                       ref_out->x, ref_out->len);
 | 
						|
    }
 | 
						|
#endif
 | 
						|
 | 
						|
exit:
 | 
						|
    mbedtls_free(my_out);
 | 
						|
    MD_PSA_DONE();
 | 
						|
}
 | 
						|
/* END_CASE */
 | 
						|
 | 
						|
/* BEGIN_CASE depends_on:MBEDTLS_ASN1_PARSE_C */
 | 
						|
void pbes2_decrypt(int params_tag, data_t *params_hex, data_t *pw,
 | 
						|
                   data_t *data, int outsize, int ref_ret,
 | 
						|
                   data_t *ref_out)
 | 
						|
{
 | 
						|
    int my_ret;
 | 
						|
    mbedtls_asn1_buf params;
 | 
						|
    unsigned char *my_out = NULL;
 | 
						|
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
 | 
						|
    size_t my_out_len = 0;
 | 
						|
#endif
 | 
						|
 | 
						|
    MD_PSA_INIT();
 | 
						|
 | 
						|
    params.tag = params_tag;
 | 
						|
    params.p = params_hex->x;
 | 
						|
    params.len = params_hex->len;
 | 
						|
 | 
						|
    ASSERT_ALLOC(my_out, outsize);
 | 
						|
 | 
						|
#if defined(MBEDTLS_TEST_DEPRECATED)
 | 
						|
    if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
 | 
						|
        my_ret = mbedtls_pkcs5_pbes2(¶ms, MBEDTLS_PKCS5_DECRYPT,
 | 
						|
                                     pw->x, pw->len, data->x, data->len, my_out);
 | 
						|
        TEST_EQUAL(my_ret, ref_ret);
 | 
						|
    }
 | 
						|
    if (ref_ret == 0) {
 | 
						|
        ASSERT_COMPARE(my_out, ref_out->len,
 | 
						|
                       ref_out->x, ref_out->len);
 | 
						|
    }
 | 
						|
#endif
 | 
						|
 | 
						|
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
 | 
						|
    my_ret = mbedtls_pkcs5_pbes2_ext(¶ms, MBEDTLS_PKCS5_DECRYPT,
 | 
						|
                                     pw->x, pw->len, data->x, data->len, my_out,
 | 
						|
                                     outsize, &my_out_len);
 | 
						|
    TEST_EQUAL(my_ret, ref_ret);
 | 
						|
    if (ref_ret == 0) {
 | 
						|
        ASSERT_COMPARE(my_out, my_out_len,
 | 
						|
                       ref_out->x, ref_out->len);
 | 
						|
    }
 | 
						|
#endif
 | 
						|
 | 
						|
exit:
 | 
						|
    mbedtls_free(my_out);
 | 
						|
    MD_PSA_DONE();
 | 
						|
}
 | 
						|
/* END_CASE */
 | 
						|
 | 
						|
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
 | 
						|
void pkcs5_selftest()
 | 
						|
{
 | 
						|
    MD_PSA_INIT();
 | 
						|
    TEST_ASSERT(mbedtls_pkcs5_self_test(1) == 0);
 | 
						|
 | 
						|
exit:
 | 
						|
    MD_PSA_DONE();
 | 
						|
}
 | 
						|
/* END_CASE */
 |