// Copyright 2015-2017 Brian Smith. // // Permission to use, copy, modify, and/or distribute this software for any // purpose with or without fee is hereby granted, provided that the above // copyright notice and this permission notice appear in all copies. // // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY // SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION // OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. #![forbid( anonymous_parameters, box_pointers, legacy_directory_ownership, missing_copy_implementations, missing_debug_implementations, missing_docs, trivial_casts, trivial_numeric_casts, unsafe_code, unstable_features, unused_extern_crates, unused_import_braces, unused_qualifications, unused_results, variant_size_differences, warnings, )] extern crate ring; use ring::{digest, error, pbkdf2, test}; #[test] pub fn pbkdf2_tests() { test::from_file("tests/pbkdf2_tests.txt", |section, test_case| { assert_eq!(section, ""); let digest_alg = &test_case.consume_digest_alg("Hash").unwrap(); let iterations = test_case.consume_usize("c"); let secret = test_case.consume_bytes("P"); let salt = test_case.consume_bytes("S"); let dk = test_case.consume_bytes("DK"); let verify_expected_result = test_case.consume_string("Verify"); let verify_expected_result = match verify_expected_result.as_str() { "OK" => Ok(()), "Err" => Err(error::Unspecified), _ => panic!("Unsupported value of \"Verify\""), }; { let mut out = vec![0u8; dk.len()]; pbkdf2::derive(digest_alg, iterations as u32, &salt, &secret, &mut out); assert_eq!(dk == out, verify_expected_result.is_ok() || dk.is_empty()); } assert_eq!(pbkdf2::verify(digest_alg, iterations as u32, &salt, &secret, &dk), verify_expected_result); Ok(()) }); } #[test] #[should_panic] pub fn pbkdf2_zero_iterations() { let secret = "ZeroIterationsTest".as_bytes(); let iterations: u32 = 0; let salt = "salt".as_bytes(); let mut out = vec![0u8; 2]; pbkdf2::derive(&digest::SHA256, iterations, &salt, &secret, &mut out); } // Control for pkbdf2_zero_iterations #[test] pub fn pbkdf2_one_iteration() { let secret = "ZeroIterationsTest".as_bytes(); let iterations: u32 = 1; let salt = "salt".as_bytes(); let mut out = vec![0u8; 2]; pbkdf2::derive(&digest::SHA256, iterations, &salt, &secret, &mut out); }