diff options
author | iphydf <iphydf@users.noreply.github.com> | 2016-09-30 15:15:50 +0100 |
---|---|---|
committer | iphydf <iphydf@users.noreply.github.com> | 2016-09-30 19:06:44 +0100 |
commit | 1977d56caaff40ea9bbf6754b69bec9539a5a969 (patch) | |
tree | db9c6d6c59dc0f91900dafe85dea1ab90f0ca8d9 /auto_tests/encryptsave_test.c | |
parent | 949ef785a4e7aa7868c9605b6bbed15c3f4beab9 (diff) |
Remove return after no-return situation (and other cleanups).
Cleanups:
- Fix header guards to not use reserved names.
- Avoid name shadowing.
- Removed an unused variable found by avoiding name shadowing.
Diffstat (limited to 'auto_tests/encryptsave_test.c')
-rw-r--r-- | auto_tests/encryptsave_test.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/auto_tests/encryptsave_test.c b/auto_tests/encryptsave_test.c index 5841f43f..2a2827da 100644 --- a/auto_tests/encryptsave_test.c +++ b/auto_tests/encryptsave_test.c | |||
@@ -19,7 +19,7 @@ | |||
19 | #include "../toxencryptsave/crypto_pwhash_scryptsalsa208sha256/crypto_pwhash_scryptsalsa208sha256.h" | 19 | #include "../toxencryptsave/crypto_pwhash_scryptsalsa208sha256/crypto_pwhash_scryptsalsa208sha256.h" |
20 | #endif | 20 | #endif |
21 | 21 | ||
22 | static unsigned char salt[32] = {0xB1, 0xC2, 0x09, 0xEE, 0x50, 0x6C, 0xF0, 0x20, 0xC4, 0xD6, 0xEB, 0xC0, 0x44, 0x51, 0x3B, 0x60, 0x4B, 0x39, 0x4A, 0xCF, 0x09, 0x53, 0x4F, 0xEA, 0x08, 0x41, 0xFA, 0xCA, 0x66, 0xD2, 0x68, 0x7F}; | 22 | static unsigned char test_salt[32] = {0xB1, 0xC2, 0x09, 0xEE, 0x50, 0x6C, 0xF0, 0x20, 0xC4, 0xD6, 0xEB, 0xC0, 0x44, 0x51, 0x3B, 0x60, 0x4B, 0x39, 0x4A, 0xCF, 0x09, 0x53, 0x4F, 0xEA, 0x08, 0x41, 0xFA, 0xCA, 0x66, 0xD2, 0x68, 0x7F}; |
23 | static unsigned char known_key[crypto_box_BEFORENMBYTES] = {0x29, 0x36, 0x1c, 0x9e, 0x65, 0xbb, 0x46, 0x8b, 0xde, 0xa1, 0xac, 0xf, 0xd5, 0x11, 0x81, 0xc8, 0x29, 0x28, 0x17, 0x23, 0xa6, 0xc3, 0x6b, 0x77, 0x2e, 0xd7, 0xd3, 0x10, 0xeb, 0xd2, 0xf7, 0xc8}; | 23 | static unsigned char known_key[crypto_box_BEFORENMBYTES] = {0x29, 0x36, 0x1c, 0x9e, 0x65, 0xbb, 0x46, 0x8b, 0xde, 0xa1, 0xac, 0xf, 0xd5, 0x11, 0x81, 0xc8, 0x29, 0x28, 0x17, 0x23, 0xa6, 0xc3, 0x6b, 0x77, 0x2e, 0xd7, 0xd3, 0x10, 0xeb, 0xd2, 0xf7, 0xc8}; |
24 | static const char *pw = "hunter2"; | 24 | static const char *pw = "hunter2"; |
25 | static unsigned int pwlen = 7; | 25 | static unsigned int pwlen = 7; |
@@ -46,7 +46,7 @@ START_TEST(test_known_kdf) | |||
46 | crypto_box_BEFORENMBYTES, | 46 | crypto_box_BEFORENMBYTES, |
47 | pw, | 47 | pw, |
48 | pwlen, | 48 | pwlen, |
49 | salt, | 49 | test_salt, |
50 | crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVE * 8, | 50 | crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVE * 8, |
51 | crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVE); | 51 | crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVE); |
52 | ck_assert_msg(res != -1, "crypto function failed"); | 52 | ck_assert_msg(res != -1, "crypto function failed"); |
@@ -103,7 +103,7 @@ START_TEST(test_save_friend) | |||
103 | uint8_t data2[size]; | 103 | uint8_t data2[size]; |
104 | tox_get_savedata(tox3, data2); | 104 | tox_get_savedata(tox3, data2); |
105 | TOX_PASS_KEY key; | 105 | TOX_PASS_KEY key; |
106 | memcpy(key.salt, salt, 32); | 106 | memcpy(key.salt, test_salt, 32); |
107 | memcpy(key.key, known_key2, crypto_box_BEFORENMBYTES); | 107 | memcpy(key.key, known_key2, crypto_box_BEFORENMBYTES); |
108 | size2 = size + TOX_PASS_ENCRYPTION_EXTRA_LENGTH; | 108 | size2 = size + TOX_PASS_ENCRYPTION_EXTRA_LENGTH; |
109 | uint8_t encdata2[size2]; | 109 | uint8_t encdata2[size2]; |