1 # 2 # Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. 3 # 4 # Licensed under the Apache License 2.0 (the "License"). You may not use 5 # this file except in compliance with the License. You can obtain a copy 6 # in the file LICENSE in the source distribution or at 7 # https://www.openssl.org/source/license.html 8 9 # Tests start with one of these keywords 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 11 # PrivPubKeyPair Sign Verify VerifyRecover 12 # and continue until a blank line. Lines starting with a pound sign are ignored. 13 14 Title = PBKDF1 tests 15 16 Availablein = legacy 17 KDF = PBKDF1 18 Ctrl.pass = pass:password 19 Ctrl.salt = salt:saltsalt 20 Ctrl.iter = iter:1 21 Ctrl.digest = digest:md2 22 Output = 2C5DAEBD49984F34642ACC09BAD696D7 23 24 Availablein = legacy 25 KDF = PBKDF1 26 Ctrl.pass = pass:password 27 Ctrl.salt = salt:saltsalt 28 Ctrl.iter = iter:1 29 Ctrl.digest = digest:md5 30 Output = FDBDF3419FFF98BDB0241390F62A9DB3 31 32 Availablein = legacy 33 KDF = PBKDF1 34 Ctrl.pass = pass:password 35 Ctrl.salt = salt:saltsalt 36 Ctrl.iter = iter:1 37 Ctrl.digest = digest:sha1 38 Output = CAB86DD6261710891E8CB56EE3625691 39 40 Availablein = legacy 41 KDF = PBKDF1 42 Ctrl.pass = pass:password 43 Ctrl.salt = salt:saltsalt 44 Ctrl.iter = iter:2 45 Ctrl.digest = digest:md2 46 Output = FD7999A1AB54B01B4FC39389A5FE820D 47 48 Availablein = legacy 49 KDF = PBKDF1 50 Ctrl.pass = pass:password 51 Ctrl.salt = salt:saltsalt 52 Ctrl.iter = iter:2 53 Ctrl.digest = digest:md5 54 Output = 3D4A8D4FB4C6E8686B21D36142902966 55 56 Availablein = legacy 57 KDF = PBKDF1 58 Ctrl.pass = pass:password 59 Ctrl.salt = salt:saltsalt 60 Ctrl.iter = iter:2 61 Ctrl.digest = digest:sha1 62 Output = E3A8DFCF2EEA6DC81D2AD154274FAAE9 63 64 Availablein = legacy 65 KDF = PBKDF1 66 Ctrl.pass = pass:password 67 Ctrl.salt = salt:saltsalt 68 Ctrl.iter = iter:4096 69 Ctrl.digest = digest:md2 70 Output = 94E4671F438BD6C441C5B120C6CC79CA 71 72 Availablein = legacy 73 KDF = PBKDF1 74 Ctrl.pass = pass:password 75 Ctrl.salt = salt:saltsalt 76 Ctrl.iter = iter:4096 77 Ctrl.digest = digest:md5 78 Output = 3283ED8F8D037045157DA055BFF84A02 79 80 Availablein = legacy 81 KDF = PBKDF1 82 Ctrl.pass = pass:password 83 Ctrl.salt = salt:saltsalt 84 Ctrl.iter = iter:4096 85 Ctrl.digest = digest:sha1 86 Output = 3CB0C21E81127F5BFF2EEA2B5DC3F31D 87 88 Availablein = legacy 89 KDF = PBKDF1 90 Ctrl.pass = pass:passwordPASSWORDpassword 91 Ctrl.salt = salt:saltSALT 92 Ctrl.iter = iter:65537 93 Ctrl.digest = digest:md2 94 Output = 36DAA8DEB8B471B26AA8CE064A81E54F 95 96 Availablein = legacy 97 KDF = PBKDF1 98 Ctrl.pass = pass:passwordPASSWORDpassword 99 Ctrl.salt = salt:saltSALT 100 Ctrl.iter = iter:65537 101 Ctrl.digest = digest:md5 102 Output = 763F3BA457E3F9ED088B04B5361D7CCA 103 104 Availablein = legacy 105 KDF = PBKDF1 106 Ctrl.pass = pass:passwordPASSWORDpassword 107 Ctrl.salt = salt:saltSALT 108 Ctrl.iter = iter:65537 109 Ctrl.digest = digest:sha1 110 Output = B2B4635718AAAD9FEF23FE328EB83ECF 111 112 Title = PBKDF1 tests for empty inputs 113 114 Availablein = legacy 115 KDF = PBKDF1 116 Ctrl.pass = pass: 117 Ctrl.salt = salt:saltsalt 118 Ctrl.iter = iter:1 119 Ctrl.digest = digest:md2 120 Output = 8ECD1C4C1D57C415295784CCD4686905 121 122 Availablein = legacy 123 KDF = PBKDF1 124 Ctrl.pass = pass: 125 Ctrl.salt = salt:saltsalt 126 Ctrl.iter = iter:1 127 Ctrl.digest = digest:md5 128 Output = F3D07DE5EFB5E2C3EAFC16B0CF7E07FA 129 130 Availablein = legacy 131 KDF = PBKDF1 132 Ctrl.pass = pass: 133 Ctrl.salt = salt:saltsalt 134 Ctrl.iter = iter:1 135 Ctrl.digest = digest:sha1 136 Output = 2C2ABACE4BD8BB19F67113DA146DBB8C 137