2
0

evppbe_pbkdf2.txt 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. #
  2. # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License 2.0 (the "License"). You may not use
  5. # this file except in compliance with the License. You can obtain a copy
  6. # in the file LICENSE in the source distribution or at
  7. # https://www.openssl.org/source/license.html
  8. # Tests start with one of these keywords
  9. # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
  10. # PrivPubKeyPair Sign Verify VerifyRecover
  11. # and continue until a blank line. Lines starting with a pound sign are ignored.
  12. Title = PBKDF2 tests (using PBE)
  13. PBE = pbkdf2
  14. Password = "password"
  15. Salt = "salt"
  16. iter = 1
  17. MD = sha1
  18. Key = 0c60c80f961f0e71f3a9b524af6012062fe037a6
  19. PBE = pbkdf2
  20. Password = "password"
  21. Salt = "salt"
  22. iter = 1
  23. MD = sha256
  24. Key = 120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b
  25. PBE = pbkdf2
  26. Password = "password"
  27. Salt = "salt"
  28. iter = 1
  29. MD = sha512
  30. Key = 867f70cf1ade02cff3752599a3a53dc4af34c7a669815ae5d513554e1c8cf252c02d470a285a0501bad999bfe943c08f050235d7d68b1da55e63f73b60a57fce
  31. PBE = pbkdf2
  32. Password = "password"
  33. Salt = "salt"
  34. iter = 2
  35. MD = sha1
  36. Key = ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957
  37. PBE = pbkdf2
  38. Password = "password"
  39. Salt = "salt"
  40. iter = 2
  41. MD = sha256
  42. Key = ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43
  43. PBE = pbkdf2
  44. Password = "password"
  45. Salt = "salt"
  46. iter = 2
  47. MD = sha512
  48. Key = e1d9c16aa681708a45f5c7c4e215ceb66e011a2e9f0040713f18aefdb866d53cf76cab2868a39b9f7840edce4fef5a82be67335c77a6068e04112754f27ccf4e
  49. PBE = pbkdf2
  50. Password = "password"
  51. Salt = "salt"
  52. iter = 4096
  53. MD = sha1
  54. Key = 4b007901b765489abead49d926f721d065a429c1
  55. PBE = pbkdf2
  56. Password = "password"
  57. Salt = "salt"
  58. iter = 4096
  59. MD = sha256
  60. Key = c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a
  61. PBE = pbkdf2
  62. Password = "password"
  63. Salt = "salt"
  64. iter = 4096
  65. MD = sha512
  66. Key = d197b1b33db0143e018b12f3d1d1479e6cdebdcc97c5c0f87f6902e072f457b5143f30602641b3d55cd335988cb36b84376060ecd532e039b742a239434af2d5
  67. PBE = pbkdf2
  68. Password = "passwordPASSWORDpassword"
  69. Salt = "saltSALTsaltSALTsaltSALTsaltSALTsalt"
  70. iter = 4096
  71. MD = sha1
  72. Key = 3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038
  73. PBE = pbkdf2
  74. Password = "passwordPASSWORDpassword"
  75. Salt = "saltSALTsaltSALTsaltSALTsaltSALTsalt"
  76. iter = 4096
  77. MD = sha256
  78. Key = 348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47e9
  79. PBE = pbkdf2
  80. Password = "passwordPASSWORDpassword"
  81. Salt = "saltSALTsaltSALTsaltSALTsaltSALTsalt"
  82. iter = 4096
  83. MD = sha512
  84. Key = 8c0511f4c6e597c6ac6315d8f0362e225f3c501495ba23b868c005174dc4ee71115b59f9e60cd9532fa33e0f75aefe30225c583a186cd82bd4daea9724a3d3b8
  85. PBE = pbkdf2
  86. Password = 7061737300776f7264
  87. Salt = 7361006c74
  88. iter = 4096
  89. MD = sha1
  90. Key = 56fa6aa75548099dcc37d7f03425e0c3
  91. PBE = pbkdf2
  92. Password = 7061737300776f7264
  93. Salt = 7361006c74
  94. iter = 4096
  95. MD = sha256
  96. Key = 89b69d0516f829893c696226650a8687
  97. PBE = pbkdf2
  98. Password = 7061737300776f7264
  99. Salt = 7361006c74
  100. iter = 4096
  101. MD = sha512
  102. Key = 9d9e9c4cd21fe4be24d5b8244c759665
  103. PBE = pbkdf2
  104. Password = "password"
  105. Salt = "salt"
  106. iter = 4096
  107. MD = sha3-224
  108. Key = 691292bc3683d7d41ea2910f5b3eed23
  109. PBE = pbkdf2
  110. Password = "password"
  111. Salt = "salt"
  112. iter = 4096
  113. MD = sha3-256
  114. Key = 778b6e237a0f49621549ff70d218d208
  115. PBE = pbkdf2
  116. Password = "password"
  117. Salt = "salt"
  118. iter = 4096
  119. MD = sha3-384
  120. Key = 9a5f1e45e8b83f1b259ba72d11c59087
  121. PBE = pbkdf2
  122. Password = "password"
  123. Salt = "salt"
  124. iter = 4096
  125. MD = sha3-512
  126. Key = 2bfaf2d5ceb6d10f5e262cd902488cfd
  127. Title = PBKDF2 tests for empty and NULL inputs
  128. PBE = pbkdf2
  129. Password = ""
  130. Salt = "salt"
  131. iter = 1
  132. MD = sha1
  133. Key = a33dddc30478185515311f8752895d36ea4363a2
  134. PBE = pbkdf2
  135. Password = ""
  136. Salt = "salt"
  137. iter = 1
  138. MD = sha256
  139. Key = f135c27993baf98773c5cdb40a5706ce6a345cde
  140. PBE = pbkdf2
  141. Password = ""
  142. Salt = "salt"
  143. iter = 1
  144. MD = sha512
  145. Key = 00ef42cdbfc98d29db20976608e455567fdddf14
  146. PBE = pbkdf2
  147. Password = NULL
  148. Salt = "salt"
  149. iter = 1
  150. MD = sha1
  151. Key = a33dddc30478185515311f8752895d36ea4363a2
  152. PBE = pbkdf2
  153. Password = NULL
  154. Salt = "salt"
  155. iter = 1
  156. MD = sha256
  157. Key = f135c27993baf98773c5cdb40a5706ce6a345cde
  158. PBE = pbkdf2
  159. Password = NULL
  160. Salt = "salt"
  161. iter = 1
  162. MD = sha512
  163. Key = 00ef42cdbfc98d29db20976608e455567fdddf14