xref: /freebsd/crypto/openssl/test/recipes/30-test_evp_data/evpkdf_pbkdf1.txt (revision aa1a8ff2d6dbc51ef058f46f3db5a8bb77967145)
1#
2# Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
3#
4# Licensed under the Apache License 2.0 (the "License").  You may not use
5# this file except in compliance with the License.  You can obtain a copy
6# in the file LICENSE in the source distribution or at
7# https://www.openssl.org/source/license.html
8
9# Tests start with one of these keywords
10#       Cipher Decrypt Derive Digest Encoding KDF MAC PBE
11#       PrivPubKeyPair Sign Verify VerifyRecover
12# and continue until a blank line. Lines starting with a pound sign are ignored.
13
14Title = PBKDF1 tests
15
16Availablein = legacy
17KDF = PBKDF1
18Ctrl.pass = pass:password
19Ctrl.salt = salt:saltsalt
20Ctrl.iter = iter:1
21Ctrl.digest = digest:md2
22Output = 2C5DAEBD49984F34642ACC09BAD696D7
23
24Availablein = legacy
25KDF = PBKDF1
26Ctrl.pass = pass:password
27Ctrl.salt = salt:saltsalt
28Ctrl.iter = iter:1
29Ctrl.digest = digest:md5
30Output = FDBDF3419FFF98BDB0241390F62A9DB3
31
32Availablein = legacy
33KDF = PBKDF1
34Ctrl.pass = pass:password
35Ctrl.salt = salt:saltsalt
36Ctrl.iter = iter:1
37Ctrl.digest = digest:sha1
38Output = CAB86DD6261710891E8CB56EE3625691
39
40Availablein = legacy
41KDF = PBKDF1
42Ctrl.pass = pass:password
43Ctrl.salt = salt:saltsalt
44Ctrl.iter = iter:2
45Ctrl.digest = digest:md2
46Output = FD7999A1AB54B01B4FC39389A5FE820D
47
48Availablein = legacy
49KDF = PBKDF1
50Ctrl.pass = pass:password
51Ctrl.salt = salt:saltsalt
52Ctrl.iter = iter:2
53Ctrl.digest = digest:md5
54Output = 3D4A8D4FB4C6E8686B21D36142902966
55
56Availablein = legacy
57KDF = PBKDF1
58Ctrl.pass = pass:password
59Ctrl.salt = salt:saltsalt
60Ctrl.iter = iter:2
61Ctrl.digest = digest:sha1
62Output = E3A8DFCF2EEA6DC81D2AD154274FAAE9
63
64Availablein = legacy
65KDF = PBKDF1
66Ctrl.pass = pass:password
67Ctrl.salt = salt:saltsalt
68Ctrl.iter = iter:4096
69Ctrl.digest = digest:md2
70Output = 94E4671F438BD6C441C5B120C6CC79CA
71
72Availablein = legacy
73KDF = PBKDF1
74Ctrl.pass = pass:password
75Ctrl.salt = salt:saltsalt
76Ctrl.iter = iter:4096
77Ctrl.digest = digest:md5
78Output = 3283ED8F8D037045157DA055BFF84A02
79
80Availablein = legacy
81KDF = PBKDF1
82Ctrl.pass = pass:password
83Ctrl.salt = salt:saltsalt
84Ctrl.iter = iter:4096
85Ctrl.digest = digest:sha1
86Output = 3CB0C21E81127F5BFF2EEA2B5DC3F31D
87
88Availablein = legacy
89KDF = PBKDF1
90Ctrl.pass = pass:passwordPASSWORDpassword
91Ctrl.salt = salt:saltSALT
92Ctrl.iter = iter:65537
93Ctrl.digest = digest:md2
94Output = 36DAA8DEB8B471B26AA8CE064A81E54F
95
96Availablein = legacy
97KDF = PBKDF1
98Ctrl.pass = pass:passwordPASSWORDpassword
99Ctrl.salt = salt:saltSALT
100Ctrl.iter = iter:65537
101Ctrl.digest = digest:md5
102Output = 763F3BA457E3F9ED088B04B5361D7CCA
103
104Availablein = legacy
105KDF = PBKDF1
106Ctrl.pass = pass:passwordPASSWORDpassword
107Ctrl.salt = salt:saltSALT
108Ctrl.iter = iter:65537
109Ctrl.digest = digest:sha1
110Output = B2B4635718AAAD9FEF23FE328EB83ECF
111
112Title = PBKDF1 tests for empty inputs
113
114Availablein = legacy
115KDF = PBKDF1
116Ctrl.pass = pass:
117Ctrl.salt = salt:saltsalt
118Ctrl.iter = iter:1
119Ctrl.digest = digest:md2
120Output = 8ECD1C4C1D57C415295784CCD4686905
121
122Availablein = legacy
123KDF = PBKDF1
124Ctrl.pass = pass:
125Ctrl.salt = salt:saltsalt
126Ctrl.iter = iter:1
127Ctrl.digest = digest:md5
128Output = F3D07DE5EFB5E2C3EAFC16B0CF7E07FA
129
130Availablein = legacy
131KDF = PBKDF1
132Ctrl.pass = pass:
133Ctrl.salt = salt:saltsalt
134Ctrl.iter = iter:1
135Ctrl.digest = digest:sha1
136Output = 2C2ABACE4BD8BB19F67113DA146DBB8C
137