/* Copyright (c) 2015, Google Inc. * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include <gtest/gtest.h> #include <openssl/digest.h> #include <openssl/evp.h> #include "../internal.h" #include "../test/test_util.h" // Tests deriving a key using an empty password (specified both as NULL and as // non-NULL). Note that NULL has special meaning to HMAC initialization. TEST(PBKDFTest, EmptyPassword) { … } // Tests deriving a key using an empty salt. Note that the expectation was // generated using OpenSSL itself, and hence is not verified. TEST(PBKDFTest, EmptySalt) { … } // Exercises test vectors taken from https://tools.ietf.org/html/rfc6070. // Note that each of these test vectors uses SHA-1 as the digest. TEST(PBKDFTest, RFC6070Vectors) { … } // Tests key derivation using SHA-2 digests. TEST(PBKDFTest, SHA2) { … } // Tests key derivation using iterations=0. // // RFC 2898 defines the iteration count (c) as a "positive integer". So doing a // key derivation with iterations=0 is ill-defined and should result in a // failure. TEST(PBKDFTest, ZeroIterations) { … }