1 // Copyright 2015-2017 Brian Smith.
2 //
3 // Permission to use, copy, modify, and/or distribute this software for any
4 // purpose with or without fee is hereby granted, provided that the above
5 // copyright notice and this permission notice appear in all copies.
6 //
7 // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES
8 // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9 // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
10 // SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11 // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12 // OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13 // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
14 
15 use core::num::NonZeroU32;
16 use ring::{digest, error, pbkdf2, test, test_file};
17 
18 #[cfg(target_arch = "wasm32")]
19 use wasm_bindgen_test::{wasm_bindgen_test as test, wasm_bindgen_test_configure};
20 
21 #[cfg(target_arch = "wasm32")]
22 wasm_bindgen_test_configure!(run_in_browser);
23 
24 /// Test vectors from BoringSSL, Go, and other sources.
25 #[test]
pbkdf2_tests()26 pub fn pbkdf2_tests() {
27     test::run(test_file!("pbkdf2_tests.txt"), |section, test_case| {
28         assert_eq!(section, "");
29         let algorithm = {
30             let digest_alg = test_case.consume_digest_alg("Hash").unwrap();
31             if digest_alg == &digest::SHA1_FOR_LEGACY_USE_ONLY {
32                 pbkdf2::PBKDF2_HMAC_SHA1
33             } else if digest_alg == &digest::SHA256 {
34                 pbkdf2::PBKDF2_HMAC_SHA256
35             } else if digest_alg == &digest::SHA384 {
36                 pbkdf2::PBKDF2_HMAC_SHA384
37             } else if digest_alg == &digest::SHA512 {
38                 pbkdf2::PBKDF2_HMAC_SHA512
39             } else {
40                 unreachable!()
41             }
42         };
43         let iterations = test_case.consume_usize("c");
44         let iterations = NonZeroU32::new(iterations as u32).unwrap();
45         let secret = test_case.consume_bytes("P");
46         let salt = test_case.consume_bytes("S");
47         let dk = test_case.consume_bytes("DK");
48         let verify_expected_result = test_case.consume_string("Verify");
49         let verify_expected_result = match verify_expected_result.as_str() {
50             "OK" => Ok(()),
51             "Err" => Err(error::Unspecified),
52             _ => panic!("Unsupported value of \"Verify\""),
53         };
54 
55         {
56             let mut out = vec![0u8; dk.len()];
57             pbkdf2::derive(algorithm, iterations, &salt, &secret, &mut out);
58             assert_eq!(dk == out, verify_expected_result.is_ok() || dk.is_empty());
59         }
60 
61         assert_eq!(
62             pbkdf2::verify(algorithm, iterations, &salt, &secret, &dk),
63             verify_expected_result
64         );
65 
66         Ok(())
67     });
68 }
69