summaryrefslogtreecommitdiff
path: root/auto_tests/encryptsave_test.c
diff options
context:
space:
mode:
authordubslow <bunslow@gmail.com>2014-10-07 20:17:54 -0500
committerdubslow <bunslow@gmail.com>2014-10-07 21:53:04 -0500
commiteee37b5767488b8d21c0fb918ae8bf974e66d27d (patch)
treed50f2cb7d0ef5632934059c4f3100d7b141ced28 /auto_tests/encryptsave_test.c
parent116c7f7c7a57e7137be01f49516fe3fa2e50b2f0 (diff)
fix #1104
Diffstat (limited to 'auto_tests/encryptsave_test.c')
-rw-r--r--auto_tests/encryptsave_test.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/auto_tests/encryptsave_test.c b/auto_tests/encryptsave_test.c
index 30670b84..7661cbc7 100644
--- a/auto_tests/encryptsave_test.c
+++ b/auto_tests/encryptsave_test.c
@@ -21,7 +21,7 @@
21#endif 21#endif
22 22
23unsigned char salt[32] = {0xB1,0xC2,0x09,0xEE,0x50,0x6C,0xF0,0x20,0xC4,0xD6,0xEB,0xC0,0x44,0x51,0x3B,0x60,0x4B,0x39,0x4A,0xCF,0x09,0x53,0x4F,0xEA,0x08,0x41,0xFA,0xCA,0x66,0xD2,0x68,0x7F}; 23unsigned char salt[32] = {0xB1,0xC2,0x09,0xEE,0x50,0x6C,0xF0,0x20,0xC4,0xD6,0xEB,0xC0,0x44,0x51,0x3B,0x60,0x4B,0x39,0x4A,0xCF,0x09,0x53,0x4F,0xEA,0x08,0x41,0xFA,0xCA,0x66,0xD2,0x68,0x7F};
24unsigned char key[crypto_box_BEFORENMBYTES] = {0xd1, 0x7, 0x4e, 0xfc, 0x49, 0x2d, 0x99, 0x16, 0xba, 0x4a, 0x4c, 0xc4, 0x92, 0x9, 0xb0, 0x9a, 0xa1, 0xa2, 0xe8, 0xe3, 0x45, 0xe7, 0xf5, 0x50, 0x54, 0x61, 0xd7, 0x3e, 0x2, 0x38, 0xe6, 0xa4}; 24unsigned char known_key[crypto_box_BEFORENMBYTES] = {0x29, 0x36, 0x1c, 0x9e, 0x65, 0xbb, 0x46, 0x8b, 0xde, 0xa1, 0xac, 0xf, 0xd5, 0x11, 0x81, 0xc8, 0x29, 0x28, 0x17, 0x23, 0xa6, 0xc3, 0x6b, 0x77, 0x2e, 0xd7, 0xd3, 0x10, 0xeb, 0xd2, 0xf7, 0xc8};
25char* pw = "hunter2"; 25char* pw = "hunter2";
26unsigned int pwlen = 7; 26unsigned int pwlen = 7;
27 27
@@ -44,9 +44,9 @@ START_TEST(test_known_kdf)
44 pw, 44 pw,
45 pwlen, 45 pwlen,
46 salt, 46 salt,
47 crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_SENSITIVE, 47 crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVE * 8,
48 crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_SENSITIVE); 48 crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVE);
49 ck_assert_msg(memcmp(out, key, crypto_box_BEFORENMBYTES) == 0, "derived key is wrong"); 49 ck_assert_msg(memcmp(out, known_key, crypto_box_BEFORENMBYTES) == 0, "derived key is wrong");
50} 50}
51END_TEST 51END_TEST
52 52