|  | BEGIN_HEADER | 
|  | #include <polarssl/pbkdf2.h> | 
|  | END_HEADER | 
|  |  | 
|  | BEGIN_DEPENDENCIES | 
|  | depends_on:POLARSSL_PBKDF2_C | 
|  | END_DEPENDENCIES | 
|  |  | 
|  | BEGIN_CASE | 
|  | pbkdf2_hmac:hash:hex_password_string:hex_salt_string:it_cnt:key_len:result_key_string | 
|  | { | 
|  | unsigned char pw_str[100]; | 
|  | unsigned char salt_str[100]; | 
|  | unsigned char dst_str[100]; | 
|  |  | 
|  | md_context_t ctx; | 
|  | const md_info_t *info; | 
|  |  | 
|  | int pw_len, salt_len; | 
|  | unsigned char key[100]; | 
|  |  | 
|  | memset(pw_str, 0x00, 100); | 
|  | memset(salt_str, 0x00, 100); | 
|  | memset(dst_str, 0x00, 100); | 
|  |  | 
|  | pw_len = unhexify( pw_str, {hex_password_string} ); | 
|  | salt_len = unhexify( salt_str, {hex_salt_string} ); | 
|  |  | 
|  |  | 
|  | info = md_info_from_type( {hash} ); | 
|  | TEST_ASSERT( info != NULL ); | 
|  | TEST_ASSERT( md_init_ctx( &ctx, info ) == 0 ); | 
|  | TEST_ASSERT( pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len, | 
|  | {it_cnt}, {key_len}, key ) == 0 ); | 
|  |  | 
|  | hexify( dst_str, key, {key_len} ); | 
|  | TEST_ASSERT( strcmp( (char *) dst_str, {result_key_string} ) == 0 ); | 
|  | } | 
|  | END_CASE |