1/* $NetBSD: test_pkcs12.c,v 1.2 2017/01/28 21:31:47 christos Exp $ */ 2 3/* 4 * Copyright (c) 2006 Kungliga Tekniska H��gskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36#include <config.h> 37#include <krb5/roken.h> 38 39#include <pkcs12.h> 40#include <evp.h> 41 42struct tests { 43 int id; 44 const char *password; 45 void *salt; 46 size_t saltsize; 47 int iterations; 48 size_t keylen; 49 const EVP_MD * (*md)(void); 50 void *key; 51}; 52 53struct tests p12_pbe_tests[] = { 54 { PKCS12_KEY_ID, 55 NULL, 56 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 57 16, 58 100, 59 16, 60 EVP_sha1, 61 "\xd7\x2d\xd4\xcf\x7e\xe1\x89\xc5\xb5\xe5\x31\xa7\x63\x2c\xf0\x4b" 62 }, 63 { PKCS12_KEY_ID, 64 "", 65 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 66 16, 67 100, 68 16, 69 EVP_sha1, 70 "\x00\x54\x91\xaf\xc0\x6a\x76\xc3\xf9\xb6\xf2\x28\x1a\x15\xd9\xfe" 71 }, 72 { PKCS12_KEY_ID, 73 "foobar", 74 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 75 16, 76 100, 77 16, 78 EVP_sha1, 79 "\x79\x95\xbf\x3f\x1c\x6d\xe\xe8\xd3\x71\xc4\x94\xd\xb\x18\xb5" 80 }, 81 { PKCS12_KEY_ID, 82 "foobar", 83 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 84 16, 85 2048, 86 24, 87 EVP_sha1, 88 "\x0b\xb5\xe\xa6\x71\x0d\x0c\xf7\x44\xe\xe1\x9b\xb5\xdf\xf1\xdc\x4f\xb0\xca\xe\xee\x4f\xb9\xfd" 89 }, 90 { PKCS12_IV_ID, 91 "foobar", 92 "\x3c\xdf\x84\x32\x59\xd3\xda\x69", 93 8, 94 2048, 95 8, 96 EVP_sha1, 97 "\xbf\x9a\x12\xb7\x26\x69\xfd\x05" 98 } 99 100}; 101 102static int 103test_pkcs12_pbe(struct tests *t) 104{ 105 void *key; 106 size_t pwlen = 0; 107 108 key = malloc(t->keylen); 109 if (t->password) 110 pwlen = strlen(t->password); 111 112 if (!PKCS12_key_gen(t->password, pwlen, 113 t->salt, t->saltsize, 114 t->id, t->iterations, t->keylen, 115 key, t->md())) 116 { 117 printf("key_gen failed\n"); 118 return 1; 119 } 120 121 if (memcmp(t->key, key, t->keylen) != 0) { 122 printf("incorrect key\n"); 123 free(key); 124 return 1; 125 } 126 free(key); 127 return 0; 128} 129 130int 131main(int argc, char **argv) 132{ 133 int ret = 0; 134 int i; 135 136 for (i = 0; i < sizeof(p12_pbe_tests)/sizeof(p12_pbe_tests[0]); i++) 137 ret += test_pkcs12_pbe(&p12_pbe_tests[i]); 138 139 return ret; 140} 141