1# 2# Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. 3# 4# Licensed under the Apache License 2.0 (the "License"). You may not use 5# this file except in compliance with the License. You can obtain a copy 6# in the file LICENSE in the source distribution or at 7# https://www.openssl.org/source/license.html 8 9# Tests start with one of these keywords 10# Cipher Decrypt Derive Digest Encoding KDF MAC PBE 11# PrivPubKeyPair Sign Verify VerifyRecover 12# and continue until a blank line. Lines starting with a pound sign are ignored. 13 14Title = PBKDF1 tests 15 16Availablein = legacy 17KDF = PBKDF1 18Ctrl.pass = pass:password 19Ctrl.salt = salt:saltsalt 20Ctrl.iter = iter:1 21Ctrl.digest = digest:md2 22Output = 2C5DAEBD49984F34642ACC09BAD696D7 23 24Availablein = legacy 25KDF = PBKDF1 26Ctrl.pass = pass:password 27Ctrl.salt = salt:saltsalt 28Ctrl.iter = iter:1 29Ctrl.digest = digest:md5 30Output = FDBDF3419FFF98BDB0241390F62A9DB3 31 32Availablein = legacy 33KDF = PBKDF1 34Ctrl.pass = pass:password 35Ctrl.salt = salt:saltsalt 36Ctrl.iter = iter:1 37Ctrl.digest = digest:sha1 38Output = CAB86DD6261710891E8CB56EE3625691 39 40Availablein = legacy 41KDF = PBKDF1 42Ctrl.pass = pass:password 43Ctrl.salt = salt:saltsalt 44Ctrl.iter = iter:2 45Ctrl.digest = digest:md2 46Output = FD7999A1AB54B01B4FC39389A5FE820D 47 48Availablein = legacy 49KDF = PBKDF1 50Ctrl.pass = pass:password 51Ctrl.salt = salt:saltsalt 52Ctrl.iter = iter:2 53Ctrl.digest = digest:md5 54Output = 3D4A8D4FB4C6E8686B21D36142902966 55 56Availablein = legacy 57KDF = PBKDF1 58Ctrl.pass = pass:password 59Ctrl.salt = salt:saltsalt 60Ctrl.iter = iter:2 61Ctrl.digest = digest:sha1 62Output = E3A8DFCF2EEA6DC81D2AD154274FAAE9 63 64Availablein = legacy 65KDF = PBKDF1 66Ctrl.pass = pass:password 67Ctrl.salt = salt:saltsalt 68Ctrl.iter = iter:4096 69Ctrl.digest = digest:md2 70Output = 94E4671F438BD6C441C5B120C6CC79CA 71 72Availablein = legacy 73KDF = PBKDF1 74Ctrl.pass = pass:password 75Ctrl.salt = salt:saltsalt 76Ctrl.iter = iter:4096 77Ctrl.digest = digest:md5 78Output = 3283ED8F8D037045157DA055BFF84A02 79 80Availablein = legacy 81KDF = PBKDF1 82Ctrl.pass = pass:password 83Ctrl.salt = salt:saltsalt 84Ctrl.iter = iter:4096 85Ctrl.digest = digest:sha1 86Output = 3CB0C21E81127F5BFF2EEA2B5DC3F31D 87 88Availablein = legacy 89KDF = PBKDF1 90Ctrl.pass = pass:passwordPASSWORDpassword 91Ctrl.salt = salt:saltSALT 92Ctrl.iter = iter:65537 93Ctrl.digest = digest:md2 94Output = 36DAA8DEB8B471B26AA8CE064A81E54F 95 96Availablein = legacy 97KDF = PBKDF1 98Ctrl.pass = pass:passwordPASSWORDpassword 99Ctrl.salt = salt:saltSALT 100Ctrl.iter = iter:65537 101Ctrl.digest = digest:md5 102Output = 763F3BA457E3F9ED088B04B5361D7CCA 103 104Availablein = legacy 105KDF = PBKDF1 106Ctrl.pass = pass:passwordPASSWORDpassword 107Ctrl.salt = salt:saltSALT 108Ctrl.iter = iter:65537 109Ctrl.digest = digest:sha1 110Output = B2B4635718AAAD9FEF23FE328EB83ECF 111 112Title = PBKDF1 tests for empty inputs 113 114Availablein = legacy 115KDF = PBKDF1 116Ctrl.pass = pass: 117Ctrl.salt = salt:saltsalt 118Ctrl.iter = iter:1 119Ctrl.digest = digest:md2 120Output = 8ECD1C4C1D57C415295784CCD4686905 121 122Availablein = legacy 123KDF = PBKDF1 124Ctrl.pass = pass: 125Ctrl.salt = salt:saltsalt 126Ctrl.iter = iter:1 127Ctrl.digest = digest:md5 128Output = F3D07DE5EFB5E2C3EAFC16B0CF7E07FA 129 130Availablein = legacy 131KDF = PBKDF1 132Ctrl.pass = pass: 133Ctrl.salt = salt:saltsalt 134Ctrl.iter = iter:1 135Ctrl.digest = digest:sha1 136Output = 2C2ABACE4BD8BB19F67113DA146DBB8C 137