evppbe.txt 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256
  1. #
  2. # Copyright 2001-2017 The OpenSSL Project Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License 2.0 (the "License"). You may not use
  5. # this file except in compliance with the License. You can obtain a copy
  6. # in the file LICENSE in the source distribution or at
  7. # https://www.openssl.org/source/license.html
  8. # Tests start with one of these keywords
  9. # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
  10. # PrivPubKeyPair Sign Verify VerifyRecover
  11. # and continue until a blank line. Lines starting with a pound sign,
  12. # like this prolog, are ignored.
  13. Title = scrypt tests (from draft-josefsson-scrypt-kdf-03 and others)
  14. PBE = scrypt
  15. Password = ""
  16. Salt = ""
  17. N = 16
  18. r = 1
  19. p = 1
  20. Key = 77d6576238657b203b19ca42c18a0497f16b4844e3074ae8dfdffa3fede21442fcd0069ded0948f8326a753a0fc81f17e8d3e0fb2e0d3628cf35e20c38d18906
  21. PBE = scrypt
  22. Password = "password"
  23. Salt = "NaCl"
  24. N = 1024
  25. r = 8
  26. p = 16
  27. Key = fdbabe1c9d3472007856e7190d01e9fe7c6ad7cbc8237830e77376634b3731622eaf30d92e22a3886ff109279d9830dac727afb94a83ee6d8360cbdfa2cc0640
  28. PBE = scrypt
  29. Password = "pleaseletmein"
  30. Salt = "SodiumChloride"
  31. N = 16384
  32. r = 8
  33. p = 1
  34. Key = 7023bdcb3afd7348461c06cd81fd38ebfda8fbba904f8e3ea9b543f6545da1f2d5432955613f0fcf62d49705242a9af9e61e85dc0d651e40dfcf017b45575887
  35. # NB: this test requires more than 1GB of memory to run so it will hit the
  36. # scrypt memory limit and return an error. To run this test without error
  37. # uncomment out the "maxmem" line and comment out the "Result"
  38. # line
  39. PBE = scrypt
  40. Password = "pleaseletmein"
  41. Salt = "SodiumChloride"
  42. N = 1048576
  43. r = 8
  44. p = 1
  45. Key = 2101cb9b6a511aaeaddbbe09cf70f881ec568d574a2ffd4dabe5ee9820adaa478e56fd8f4ba5d09ffa1c6d927c40f4c337304049e8a952fbcbf45c6fa77a41a4
  46. Result = SCRYPT_ERROR
  47. #maxmem = 10000000000
  48. Title = PKCS12 tests
  49. PBE = pkcs12
  50. id = 1
  51. iter = 1
  52. MD = SHA1
  53. Password = 0073006D006500670000
  54. Salt = 0A58CF64530D823F
  55. Key = 8AAAE6297B6CB04642AB5B077851284EB7128F1A2A7FBCA3
  56. PBE = pkcs12
  57. id = 2
  58. iter = 1
  59. MD = SHA1
  60. Password = 0073006D006500670000
  61. Salt = 0A58CF64530D823F
  62. Key = 79993DFE048D3B76
  63. PBE = pkcs12
  64. id = 3
  65. iter = 1
  66. MD = SHA1
  67. Password = 0073006D006500670000
  68. Salt = 3D83C0E4546AC140
  69. Key = 8D967D88F6CAA9D714800AB3D48051D63F73A312
  70. PBE = pkcs12
  71. id = 1
  72. iter = 1000
  73. MD = SHA1
  74. Password = 007100750065006500670000
  75. Salt = 1682C0FC5B3F7EC5
  76. Key = 483DD6E919D7DE2E8E648BA8F862F3FBFBDC2BCB2C02957F
  77. PBE = pkcs12
  78. id = 2
  79. iter = 1000
  80. MD = SHA1
  81. Password = 007100750065006500670000
  82. Salt = 1682C0FC5B3F7EC5
  83. Key = 9D461D1B00355C50
  84. PBE = pkcs12
  85. id = 3
  86. iter = 1000
  87. MD = SHA1
  88. Password = 007100750065006500670000
  89. Salt = 263216FCC2FAB31C
  90. Key = 5EC4C7A80DF652294C3925B6489A7AB857C83476
  91. Title = PBKDF2 tests
  92. PBE = pbkdf2
  93. Password = "password"
  94. Salt = "salt"
  95. iter = 1
  96. MD = sha1
  97. Key = 0c60c80f961f0e71f3a9b524af6012062fe037a6
  98. PBE = pbkdf2
  99. Password = "password"
  100. Salt = "salt"
  101. iter = 1
  102. MD = sha256
  103. Key = 120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b
  104. PBE = pbkdf2
  105. Password = "password"
  106. Salt = "salt"
  107. iter = 1
  108. MD = sha512
  109. Key = 867f70cf1ade02cff3752599a3a53dc4af34c7a669815ae5d513554e1c8cf252c02d470a285a0501bad999bfe943c08f050235d7d68b1da55e63f73b60a57fce
  110. PBE = pbkdf2
  111. Password = "password"
  112. Salt = "salt"
  113. iter = 2
  114. MD = sha1
  115. Key = ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957
  116. PBE = pbkdf2
  117. Password = "password"
  118. Salt = "salt"
  119. iter = 2
  120. MD = sha256
  121. Key = ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43
  122. PBE = pbkdf2
  123. Password = "password"
  124. Salt = "salt"
  125. iter = 2
  126. MD = sha512
  127. Key = e1d9c16aa681708a45f5c7c4e215ceb66e011a2e9f0040713f18aefdb866d53cf76cab2868a39b9f7840edce4fef5a82be67335c77a6068e04112754f27ccf4e
  128. PBE = pbkdf2
  129. Password = "password"
  130. Salt = "salt"
  131. iter = 4096
  132. MD = sha1
  133. Key = 4b007901b765489abead49d926f721d065a429c1
  134. PBE = pbkdf2
  135. Password = "password"
  136. Salt = "salt"
  137. iter = 4096
  138. MD = sha256
  139. Key = c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a
  140. PBE = pbkdf2
  141. Password = "password"
  142. Salt = "salt"
  143. iter = 4096
  144. MD = sha512
  145. Key = d197b1b33db0143e018b12f3d1d1479e6cdebdcc97c5c0f87f6902e072f457b5143f30602641b3d55cd335988cb36b84376060ecd532e039b742a239434af2d5
  146. PBE = pbkdf2
  147. Password = "passwordPASSWORDpassword"
  148. Salt = "saltSALTsaltSALTsaltSALTsaltSALTsalt"
  149. iter = 4096
  150. MD = sha1
  151. Key = 3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038
  152. PBE = pbkdf2
  153. Password = "passwordPASSWORDpassword"
  154. Salt = "saltSALTsaltSALTsaltSALTsaltSALTsalt"
  155. iter = 4096
  156. MD = sha256
  157. Key = 348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47e9
  158. PBE = pbkdf2
  159. Password = "passwordPASSWORDpassword"
  160. Salt = "saltSALTsaltSALTsaltSALTsaltSALTsalt"
  161. iter = 4096
  162. MD = sha512
  163. Key = 8c0511f4c6e597c6ac6315d8f0362e225f3c501495ba23b868c005174dc4ee71115b59f9e60cd9532fa33e0f75aefe30225c583a186cd82bd4daea9724a3d3b8
  164. PBE = pbkdf2
  165. Password = 7061737300776f7264
  166. Salt = 7361006c74
  167. iter = 4096
  168. MD = sha1
  169. Key = 56fa6aa75548099dcc37d7f03425e0c3
  170. PBE = pbkdf2
  171. Password = 7061737300776f7264
  172. Salt = 7361006c74
  173. iter = 4096
  174. MD = sha256
  175. Key = 89b69d0516f829893c696226650a8687
  176. PBE = pbkdf2
  177. Password = 7061737300776f7264
  178. Salt = 7361006c74
  179. iter = 4096
  180. MD = sha512
  181. Key = 9d9e9c4cd21fe4be24d5b8244c759665
  182. Title = PBKDF2 tests for empty and NULL inputs
  183. PBE = pbkdf2
  184. Password = ""
  185. Salt = "salt"
  186. iter = 1
  187. MD = sha1
  188. Key = a33dddc30478185515311f8752895d36ea4363a2
  189. PBE = pbkdf2
  190. Password = ""
  191. Salt = "salt"
  192. iter = 1
  193. MD = sha256
  194. Key = f135c27993baf98773c5cdb40a5706ce6a345cde
  195. PBE = pbkdf2
  196. Password = ""
  197. Salt = "salt"
  198. iter = 1
  199. MD = sha512
  200. Key = 00ef42cdbfc98d29db20976608e455567fdddf14
  201. PBE = pbkdf2
  202. Password = NULL
  203. Salt = "salt"
  204. iter = 1
  205. MD = sha1
  206. Key = a33dddc30478185515311f8752895d36ea4363a2
  207. PBE = pbkdf2
  208. Password = NULL
  209. Salt = "salt"
  210. iter = 1
  211. MD = sha256
  212. Key = f135c27993baf98773c5cdb40a5706ce6a345cde
  213. PBE = pbkdf2
  214. Password = NULL
  215. Salt = "salt"
  216. iter = 1
  217. MD = sha512
  218. Key = 00ef42cdbfc98d29db20976608e455567fdddf14